mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
33847 lines
2.7 MiB
33847 lines
2.7 MiB
CVE-2020-0009 - http://packetstormsecurity.com/files/155903/Android-ashmem-Read-Only-Bypasses.html
|
|
CVE-2020-0022 - http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html
|
|
CVE-2020-0022 - http://seclists.org/fulldisclosure/2020/Feb/10
|
|
CVE-2020-0067 - http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html
|
|
CVE-2020-0258 - http://packetstormsecurity.com/files/158869/Android-App-Zygotes-Improper-Guarding.html
|
|
CVE-2020-0404 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-0427 - http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html
|
|
CVE-2020-0510 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html
|
|
CVE-2020-0512 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html
|
|
CVE-2020-0513 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html
|
|
CVE-2020-0515 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html
|
|
CVE-2020-0516 - http://packetstormsecurity.com/files/156761/ShaderCache-Arbitrary-File-Creation-Privilege-Escalation.html
|
|
CVE-2020-0531 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0532 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0533 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0534 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0535 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0536 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0537 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0538 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0539 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0540 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0541 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0542 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0543 - https://usn.ubuntu.com/4385-1/
|
|
CVE-2020-0545 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0548 - https://usn.ubuntu.com/4385-1/
|
|
CVE-2020-0548 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html
|
|
CVE-2020-0549 - https://usn.ubuntu.com/4385-1/
|
|
CVE-2020-0549 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html
|
|
CVE-2020-0566 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0586 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0594 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0594 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-0595 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0595 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-0596 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0597 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-0597 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-0601 - http://packetstormsecurity.com/files/155960/CurveBall-Microsoft-Windows-CryptoAPI-Spoofing-Proof-Of-Concept.html
|
|
CVE-2020-0601 - http://packetstormsecurity.com/files/155961/CurveBall-Microsoft-Windows-CryptoAPI-Spoofing-Proof-Of-Concept.html
|
|
CVE-2020-0618 - http://packetstormsecurity.com/files/156707/SQL-Server-Reporting-Services-SSRS-ViewState-Deserialization.html
|
|
CVE-2020-0618 - http://packetstormsecurity.com/files/159216/Microsoft-SQL-Server-Reporting-Services-2016-Remote-Code-Execution.html
|
|
CVE-2020-0642 - http://packetstormsecurity.com/files/158729/Microsoft-Windows-Win32k-Privilege-Escalation.html
|
|
CVE-2020-0646 - http://packetstormsecurity.com/files/156930/SharePoint-Workflows-XOML-Injection.html
|
|
CVE-2020-0668 - http://packetstormsecurity.com/files/156576/Microsoft-Windows-Kernel-Privilege-Escalation.html
|
|
CVE-2020-0668 - http://packetstormsecurity.com/files/157615/Service-Tracing-Privilege-Escalation.html
|
|
CVE-2020-0674 - http://packetstormsecurity.com/files/159137/Microsoft-Internet-Explorer-11-Use-After-Free.html
|
|
CVE-2020-0674 - http://packetstormsecurity.com/files/161309/Microsoft-Internet-Explorer-11-Use-After-Free.html
|
|
CVE-2020-0674 - http://packetstormsecurity.com/files/162565/Microsoft-Internet-Explorer-8-11-Use-After-Free.html
|
|
CVE-2020-0683 - http://packetstormsecurity.com/files/156373/Microsoft-Windows-10-MSI-Privilege-Escalation.html
|
|
CVE-2020-0683 - https://github.com/nu11secur1ty/Windows10Exploits/blob/master/Undefined/CVE-2020-0683/README.md
|
|
CVE-2020-0688 - http://packetstormsecurity.com/files/156592/Microsoft-Exchange-2019-15.2.221.12-Remote-Code-Execution.html
|
|
CVE-2020-0688 - http://packetstormsecurity.com/files/156620/Exchange-Control-Panel-Viewstate-Deserialization.html
|
|
CVE-2020-0728 - http://packetstormsecurity.com/files/156394/Microsoft-Windows-Modules-Installer-Service-Information-Disclosure.html
|
|
CVE-2020-0728 - http://seclists.org/fulldisclosure/2020/Feb/16
|
|
CVE-2020-0728 - https://seclists.org/bugtraq/2020/Feb/21
|
|
CVE-2020-0787 - http://packetstormsecurity.com/files/158056/Background-Intelligent-Transfer-Service-Privilege-Escalation.html
|
|
CVE-2020-0796 - http://packetstormsecurity.com/files/156731/CoronaBlue-SMBGhost-Microsoft-Windows-10-SMB-3.1.1-Proof-Of-Concept.html
|
|
CVE-2020-0796 - http://packetstormsecurity.com/files/156732/Microsoft-Windows-SMB-3.1.1-Remote-Code-Execution.html
|
|
CVE-2020-0796 - http://packetstormsecurity.com/files/156980/Microsoft-Windows-10-SMB-3.1.1-Local-Privilege-Escalation.html
|
|
CVE-2020-0796 - http://packetstormsecurity.com/files/157110/SMBv3-Compression-Buffer-Overflow.html
|
|
CVE-2020-0796 - http://packetstormsecurity.com/files/157901/Microsoft-Windows-SMBGhost-Remote-Code-Execution.html
|
|
CVE-2020-0796 - http://packetstormsecurity.com/files/158054/SMBleed-SMBGhost-Pre-Authentication-Remote-Code-Execution-Proof-Of-Concept.html
|
|
CVE-2020-0938 - http://packetstormsecurity.com/files/161299/Apple-CoreText-libFontParser.dylib-Stack-Corruption.html
|
|
CVE-2020-0981 - http://packetstormsecurity.com/files/157248/Microsoft-Windows-NtFilterToken-ParentTokenId-Incorrect-Setting-Privilege-Escalation.html
|
|
CVE-2020-0986 - http://packetstormsecurity.com/files/160698/Microsoft-Windows-splWOW64-Privilege-Escalation.html
|
|
CVE-2020-10005 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1246
|
|
CVE-2020-10019 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25
|
|
CVE-2020-10021 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-26
|
|
CVE-2020-10022 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28
|
|
CVE-2020-10023 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29
|
|
CVE-2020-10024 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30
|
|
CVE-2020-10027 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-35
|
|
CVE-2020-10028 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-32
|
|
CVE-2020-10029 - https://sourceware.org/bugzilla/show_bug.cgi?id=25487
|
|
CVE-2020-10057 - https://github.com/J3rryBl4nks/GenixCMS/blob/master/CreateAdminBAC.md
|
|
CVE-2020-10058 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-34
|
|
CVE-2020-10059 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-36
|
|
CVE-2020-10060 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37
|
|
CVE-2020-10061 - https://github.com/zephyrproject-rtos/zephyr/pull/23091
|
|
CVE-2020-10061 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-75
|
|
CVE-2020-10062 - https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment
|
|
CVE-2020-10062 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-84
|
|
CVE-2020-10063 - https://github.com/zephyrproject-rtos/zephyr/pull/24535
|
|
CVE-2020-10063 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-55
|
|
CVE-2020-10067 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27
|
|
CVE-2020-10068 - https://github.com/zephyrproject-rtos/zephyr/pull/23091
|
|
CVE-2020-10068 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-78
|
|
CVE-2020-10070 - https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment
|
|
CVE-2020-10070 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-85
|
|
CVE-2020-10071 - https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment
|
|
CVE-2020-10071 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-86
|
|
CVE-2020-10108 - https://know.bishopfox.com/advisories
|
|
CVE-2020-10108 - https://know.bishopfox.com/advisories/twisted-version-19.10.0
|
|
CVE-2020-10108 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-10109 - https://know.bishopfox.com/advisories
|
|
CVE-2020-10109 - https://know.bishopfox.com/advisories/twisted-version-19.10.0
|
|
CVE-2020-10110 - http://packetstormsecurity.com/files/156656/Citrix-Gateway-11.1-12.0-12.1-Information-Disclosure.html
|
|
CVE-2020-10110 - https://seclists.org/fulldisclosure/2020/Mar/7
|
|
CVE-2020-10111 - http://packetstormsecurity.com/files/156661/Citrix-Gateway-11.1-12.0-12.1-Cache-Bypass.html
|
|
CVE-2020-10111 - http://seclists.org/fulldisclosure/2020/Mar/11
|
|
CVE-2020-10112 - http://packetstormsecurity.com/files/156660/Citrix-Gateway-11.1-12.0-12.1-Cache-Poisoning.html
|
|
CVE-2020-10112 - http://seclists.org/fulldisclosure/2020/Mar/8
|
|
CVE-2020-10135 - http://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html
|
|
CVE-2020-10135 - http://seclists.org/fulldisclosure/2020/Jun/5
|
|
CVE-2020-10136 - https://kb.cert.org/vuls/id/636397/
|
|
CVE-2020-10136 - https://www.digi.com/resources/security
|
|
CVE-2020-10136 - https://www.kb.cert.org/vuls/id/636397
|
|
CVE-2020-10137 - https://github.com/CNK2100/VFuzz-public
|
|
CVE-2020-10146 - https://github.com/oskarsve/ms-teams-rce
|
|
CVE-2020-10173 - https://www.exploit-db.com/exploits/48142
|
|
CVE-2020-10174 - http://www.openwall.com/lists/oss-security/2020/03/06/3
|
|
CVE-2020-10174 - https://bugzilla.suse.com/show_bug.cgi?id=1165802
|
|
CVE-2020-10180 - https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html
|
|
CVE-2020-10181 - http://packetstormsecurity.com/files/156746/Enhanced-Multimedia-Router-3.0.4.27-Cross-Site-Request-Forgery.html
|
|
CVE-2020-10181 - https://www.youtube.com/watch?v=Ufcj4D9eA5o
|
|
CVE-2020-10188 - https://appgateresearch.blogspot.com/2020/02/bravestarr-fedora-31-netkit-telnetd_28.html
|
|
CVE-2020-10188 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-telnetd-EFJrEzPx
|
|
CVE-2020-10188 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-10189 - http://packetstormsecurity.com/files/156730/ManageEngine-Desktop-Central-Java-Deserialization.html
|
|
CVE-2020-10189 - https://srcincite.io/advisories/src-2020-0011/
|
|
CVE-2020-10189 - https://srcincite.io/pocs/src-2020-0011.py.txt
|
|
CVE-2020-10189 - https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/
|
|
CVE-2020-10190 - https://github.com/munkireport/munkireport-php/releases
|
|
CVE-2020-10191 - https://github.com/munkireport/munkireport-php/releases
|
|
CVE-2020-10192 - https://github.com/munkireport/munkireport-php/releases
|
|
CVE-2020-10193 - https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html
|
|
CVE-2020-10195 - https://wpvulndb.com/vulnerabilities/10127
|
|
CVE-2020-10196 - https://wpvulndb.com/vulnerabilities/10127
|
|
CVE-2020-10199 - http://packetstormsecurity.com/files/157261/Nexus-Repository-Manager-3.21.1-01-Remote-Code-Execution.html
|
|
CVE-2020-10199 - http://packetstormsecurity.com/files/160835/Sonatype-Nexus-3.21.1-Remote-Code-Execution.html
|
|
CVE-2020-10199 - https://support.sonatype.com/hc/en-us/articles/360044882533
|
|
CVE-2020-10203 - https://support.sonatype.com/hc/en-us/articles/360044361594
|
|
CVE-2020-10204 - https://support.sonatype.com/hc/en-us/articles/360044356194
|
|
CVE-2020-1021 - http://packetstormsecurity.com/files/158028/Microsoft-Windows-Privilege-Escalation-Code-Execution.html
|
|
CVE-2020-10218 - https://www.exploit-db.com/exploits/48179
|
|
CVE-2020-10220 - http://packetstormsecurity.com/files/156688/rConfig-3.9-SQL-Injection.html
|
|
CVE-2020-10220 - http://packetstormsecurity.com/files/156766/Rconfig-3.x-Chained-Remote-Code-Execution.html
|
|
CVE-2020-10220 - http://packetstormsecurity.com/files/156950/rConfig-3.9.4-searchField-Remote-Code-Execution.html
|
|
CVE-2020-10220 - https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_CVE-2020-10220.py
|
|
CVE-2020-10220 - https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_sqli.py
|
|
CVE-2020-10221 - http://packetstormsecurity.com/files/156687/rConfig-3.93-Authenticated-Remote-Code-Execution.html
|
|
CVE-2020-10222 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2020-03-05-fuzzing-heap-corruption-nitro-pdf-vulnerability.md
|
|
CVE-2020-10222 - https://nafiez.github.io/security/vulnerability/corruption/fuzzing/2020/03/05/fuzzing-heap-corruption-nitro-pdf-vulnerability.html
|
|
CVE-2020-10223 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2020-03-05-fuzzing-heap-corruption-nitro-pdf-vulnerability.md
|
|
CVE-2020-10223 - https://nafiez.github.io/security/vulnerability/corruption/fuzzing/2020/03/05/fuzzing-heap-corruption-nitro-pdf-vulnerability.html
|
|
CVE-2020-10224 - https://www.exploit-db.com/exploits/47887
|
|
CVE-2020-10225 - https://www.exploit-db.com/exploits/47881
|
|
CVE-2020-10227 - https://www.exploit-db.com/exploits/48804
|
|
CVE-2020-10228 - https://www.exploit-db.com/exploits/48804
|
|
CVE-2020-10229 - https://www.exploit-db.com/exploits/48804
|
|
CVE-2020-10230 - https://www.exploit-db.com/exploits/48212
|
|
CVE-2020-10231 - http://packetstormsecurity.com/files/157048/TP-LINK-Cloud-Cameras-NCXXX-Remote-NULL-Pointer-Dereference.html
|
|
CVE-2020-10231 - http://seclists.org/fulldisclosure/2020/Apr/5
|
|
CVE-2020-10231 - http://seclists.org/fulldisclosure/2020/Mar/54
|
|
CVE-2020-10233 - https://github.com/sleuthkit/sleuthkit/issues/1829
|
|
CVE-2020-10234 - https://github.com/FULLSHADE/Kernel-exploits
|
|
CVE-2020-10234 - https://github.com/FULLSHADE/Kernel-exploits/tree/master/AscRegistryFilter.sys
|
|
CVE-2020-10235 - https://bugzilla.suse.com/show_bug.cgi?id=1165721
|
|
CVE-2020-10245 - https://www.tenable.com/security/research/tra-2020-16
|
|
CVE-2020-10248 - https://sku11army.blogspot.com/2020/03/bwa-multiple-vulnerabilities-in-direx.html
|
|
CVE-2020-10249 - https://sku11army.blogspot.com/2020/03/bwa-multiple-vulnerabilities-in-direx.html
|
|
CVE-2020-10250 - https://sku11army.blogspot.com/2020/03/bwa-multiple-vulnerabilities-in-direx.html
|
|
CVE-2020-10251 - https://github.com/ImageMagick/ImageMagick/issues/1859
|
|
CVE-2020-10255 - https://thehackernews.com/2020/03/rowhammer-vulnerability-ddr4-dram.html
|
|
CVE-2020-10256 - https://support.1password.com/kb/202010/
|
|
CVE-2020-10257 - https://www.wordfence.com/blog/2020/03/zero-day-vulnerability-in-themerex-addons-now-patched/
|
|
CVE-2020-10262 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-10262.md
|
|
CVE-2020-10262 - https://www.youtube.com/watch?v=Cr5DupGxmL4
|
|
CVE-2020-10263 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-10263.md
|
|
CVE-2020-10263 - https://www.youtube.com/watch?v=Cr5DupGxmL4
|
|
CVE-2020-1027 - http://packetstormsecurity.com/files/168068/Windows-sxs-CNodeFactory-XMLParser_Element_doc_assembly_assemblyIdentity-Heap-Buffer-Overflow.html
|
|
CVE-2020-10283 - https://github.com/aliasrobotics/RVD/issues/3316
|
|
CVE-2020-10289 - https://github.com/ros/actionlib/pull/171
|
|
CVE-2020-10290 - https://github.com/aliasrobotics/RVD/issues/1495
|
|
CVE-2020-1032 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044
|
|
CVE-2020-1036 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044
|
|
CVE-2020-10364 - https://packetstormsecurity.com/files/156790/Microtik-SSH-Daemon-6.44.3-Denial-Of-Service.html
|
|
CVE-2020-10364 - https://www.exploit-db.com/exploits/48228
|
|
CVE-2020-10365 - https://www.coresecurity.com/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities
|
|
CVE-2020-10366 - https://www.coresecurity.com/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities
|
|
CVE-2020-10375 - https://www.x41-dsec.de/lab/advisories/x41-2020-005-smarty/
|
|
CVE-2020-10376 - https://medium.com/@felipeagromao/remote-control-cve-2020-10376-fed7b6b934e3
|
|
CVE-2020-10385 - https://packetstormsecurity.com/files/156910/WordPress-WP-Forms-1.5.8.2-Cross-Site-Scripting.html
|
|
CVE-2020-10385 - https://wpvulndb.com/vulnerabilities/10114
|
|
CVE-2020-10386 - http://packetstormsecurity.com/files/156757/PHPKB-Multi-Language-9-image-upload.php-Code-Execution.html
|
|
CVE-2020-10386 - https://antoniocannito.it/phpkb1#remote-code-execution-cve-2020-10386
|
|
CVE-2020-10386 - https://www.exploit-db.com/exploits/48221
|
|
CVE-2020-10387 - http://packetstormsecurity.com/files/156754/PHPKB-Multi-Language-9-Authenticated-Directory-Traversal.html
|
|
CVE-2020-10387 - https://antoniocannito.it/phpkb1#authenticated-arbitrary-file-download-cve-2020-10387
|
|
CVE-2020-10387 - https://www.exploit-db.com/exploits/48220
|
|
CVE-2020-10388 - https://antoniocannito.it/phpkb1#blind-cross-site-scripting-cve-2020-10388
|
|
CVE-2020-10389 - http://packetstormsecurity.com/files/156751/PHPKB-Multi-Language-9-Authenticated-Remote-Code-Execution.html
|
|
CVE-2020-10389 - https://antoniocannito.it/phpkb1#authenticated-remote-code-execution-cve-2020-10389
|
|
CVE-2020-10389 - https://www.exploit-db.com/exploits/48219
|
|
CVE-2020-10390 - https://antoniocannito.it/phpkb1#out-of-band-blind-authenticated-remote-code-execution-cve-2020-10390
|
|
CVE-2020-10391 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10392 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10393 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10394 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10395 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10396 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10397 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10398 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10399 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-1040 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044
|
|
CVE-2020-10400 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10401 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10402 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10403 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10404 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10405 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10406 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10407 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10408 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10409 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-1041 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044
|
|
CVE-2020-10410 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10411 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10412 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10413 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10414 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10415 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10416 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10417 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10418 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10419 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-1042 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044
|
|
CVE-2020-10420 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10421 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10422 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10423 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10424 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10425 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10426 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10427 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10428 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10429 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-1043 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044
|
|
CVE-2020-10430 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10431 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10432 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10433 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10434 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10435 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10436 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10437 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10438 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10439 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10440 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10441 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10442 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10443 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10444 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10445 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10446 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10447 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10448 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10449 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10450 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10451 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10452 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10453 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10454 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10455 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10456 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456
|
|
CVE-2020-10457 - https://antoniocannito.it/phpkb1#arbitrary-file-renaming-cve-2020-10457
|
|
CVE-2020-10458 - https://antoniocannito.it/phpkb1#arbitrary-folder-deletion-cve-2020-10458
|
|
CVE-2020-10459 - https://antoniocannito.it/phpkb1#arbitrary-file-listing-cve-2020-10459
|
|
CVE-2020-10460 - https://antoniocannito.it/phpkb1#csv-injection-cve-2020-10460
|
|
CVE-2020-10461 - https://antoniocannito.it/phpkb1#blind-cross-site-scripting-2-cve-2020-10461
|
|
CVE-2020-10462 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-custom-field-cve-2020-10462
|
|
CVE-2020-10463 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-template-cve-2020-10463
|
|
CVE-2020-10464 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-an-article-cve-2020-10464
|
|
CVE-2020-10465 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-category-cve-2020-10465
|
|
CVE-2020-10466 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-glossary-term-cve-2020-10466
|
|
CVE-2020-10467 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-comment-cve-2020-10467
|
|
CVE-2020-10468 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-news-article-cve-2020-10468
|
|
CVE-2020-10469 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-department-cve-2020-10469
|
|
CVE-2020-10470 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-sorting-custom-fields-cve-2020-10470
|
|
CVE-2020-10471 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-sorting-articles-cve-2020-10471
|
|
CVE-2020-10472 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-sorting-templates-cve-2020-10472
|
|
CVE-2020-10473 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-deleting-a-category-cve-2020-10473
|
|
CVE-2020-10474 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-deleting-a-comment-cve-2020-10474
|
|
CVE-2020-10475 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-deleting-a-ticket-cve-2020-10475
|
|
CVE-2020-10476 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-glossary-term-2-cve-2020-10476
|
|
CVE-2020-10477 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-news-article-cve-2020-10477
|
|
CVE-2020-10478 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-changing-settings-cve-2020-10478
|
|
CVE-2020-10479 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-creating-a-news-article-cve-2020-10479
|
|
CVE-2020-1048 - http://packetstormsecurity.com/files/158222/Windows-Print-Spooler-Privilege-Escalation.html
|
|
CVE-2020-1048 - http://packetstormsecurity.com/files/159217/Microsoft-Spooler-Local-Privilege-Elevation.html
|
|
CVE-2020-10480 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-creating-a-category-cve-2020-10480
|
|
CVE-2020-10481 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-adding-a-new-glossary-term-cve-2020-10481
|
|
CVE-2020-10482 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-adding-a-new-article-template-cve-2020-10482
|
|
CVE-2020-10483 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-posting-a-comment-cve-2020-10483
|
|
CVE-2020-10484 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-creating-a-new-custom-field-cve-2020-10484
|
|
CVE-2020-10485 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-an-article-cve-2020-10485
|
|
CVE-2020-10486 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-comment-cve-2020-10486
|
|
CVE-2020-10487 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-glossary-term-cve-2020-10487
|
|
CVE-2020-10488 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-news-article-cve-2020-10488
|
|
CVE-2020-10489 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-ticket-cve-2020-10489
|
|
CVE-2020-10490 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-department-cve-2020-10490
|
|
CVE-2020-10491 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-adding-a-department-cve-2020-10491
|
|
CVE-2020-10492 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-an-article-template-cve-2020-10492
|
|
CVE-2020-10493 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-glossary-term-cve-2020-10493
|
|
CVE-2020-10494 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-news-article-cve-2020-10494
|
|
CVE-2020-10495 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-an-article-template-cve-2020-10495
|
|
CVE-2020-10496 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-an-article-cve-2020-10496
|
|
CVE-2020-10497 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-category-cve-2020-10497
|
|
CVE-2020-10498 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-category-cve-2020-10498
|
|
CVE-2020-10499 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-closing-a-ticket-cve-2020-10499
|
|
CVE-2020-10500 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-replying-to-a-ticket-cve-2020-10500
|
|
CVE-2020-10501 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-department-cve-2020-10501
|
|
CVE-2020-10502 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-approving-a-new-comment-cve-2020-10502
|
|
CVE-2020-10503 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-disapproving-a-new-comment-cve-2020-10503
|
|
CVE-2020-10504 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-comment-cve-2020-10504
|
|
CVE-2020-10515 - https://herolab.usd.de/security-advisories/
|
|
CVE-2020-10531 - https://unicode-org.atlassian.net/browse/ICU-20958
|
|
CVE-2020-10531 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-10531 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-10531 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-10532 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-001/-credential-disclosure-in-watchguard-fireware-ad-helper-component
|
|
CVE-2020-1054 - http://packetstormsecurity.com/files/160515/Microsoft-Windows-DrawIconEx-Local-Privilege-Escalation.html
|
|
CVE-2020-10543 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-10543 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-10543 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-10543 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-10543 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-10543 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-10543 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-10558 - https://cylect.io/blog/Tesla_Model_3_Vuln/
|
|
CVE-2020-10560 - https://github.com/LucidUnicorn/CVE-2020-10560-Key-Recovery
|
|
CVE-2020-10564 - https://github.com/beerpwn/CVE/tree/master/WP-File-Upload_disclosure_report/
|
|
CVE-2020-10564 - https://wpvulndb.com/vulnerabilities/10132
|
|
CVE-2020-10567 - http://packetstormsecurity.com/files/171280/ZwiiCMS-12.2.04-Remote-Code-Execution.html
|
|
CVE-2020-10567 - https://github.com/trippo/ResponsiveFilemanager/issues/600
|
|
CVE-2020-10568 - https://medium.com/@arall/sitepress-multilingual-cms-wplugin-wpml-4-3-7-b-2-9c9486c13577
|
|
CVE-2020-10568 - https://wpvulndb.com/vulnerabilities/10131
|
|
CVE-2020-10569 - http://packetstormsecurity.com/files/157314/Sysaid-20.1.11-b26-Remote-Command-Execution.html
|
|
CVE-2020-10570 - https://github.com/VijayT007/Vulnerability-Database/blob/master/Telegram:CVE-2020-10570
|
|
CVE-2020-10591 - https://github.com/walmartlabs/concord/issues/22
|
|
CVE-2020-10596 - http://packetstormsecurity.com/files/157908/OpenCart-3.0.3.2-Cross-Site-Scripting.html
|
|
CVE-2020-10644 - http://packetstormsecurity.com/files/158226/Inductive-Automation-Ignition-Remote-Code-Execution.html
|
|
CVE-2020-10648 - https://github.com/u-boot/u-boot/commits/master
|
|
CVE-2020-10650 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2020-10665 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-002.md
|
|
CVE-2020-10665 - https://github.com/spaceraccoon/CVE-2020-10665
|
|
CVE-2020-10666 - https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities
|
|
CVE-2020-10667 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html
|
|
CVE-2020-10668 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html
|
|
CVE-2020-10669 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html
|
|
CVE-2020-10670 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html
|
|
CVE-2020-10671 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html
|
|
CVE-2020-10672 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-10672 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-10672 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-10672 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-10672 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-10673 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-10673 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-10673 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-10673 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-10673 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-10683 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-10683 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-10683 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-10683 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-10683 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-10683 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-10683 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-10683 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-10690 - https://usn.ubuntu.com/4419-1/
|
|
CVE-2020-10693 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-10711 - https://usn.ubuntu.com/4413-1/
|
|
CVE-2020-10711 - https://usn.ubuntu.com/4414-1/
|
|
CVE-2020-10711 - https://usn.ubuntu.com/4419-1/
|
|
CVE-2020-10713 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-grub2-code-exec-xLePCAPY
|
|
CVE-2020-10720 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef
|
|
CVE-2020-10722 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-10722 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-10723 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-10723 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-10724 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-10724 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-10725 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-10726 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-10735 - https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y
|
|
CVE-2020-10751 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6
|
|
CVE-2020-10751 - https://usn.ubuntu.com/4413-1/
|
|
CVE-2020-10751 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-10757 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
|
|
CVE-2020-10757 - https://usn.ubuntu.com/4426-1/
|
|
CVE-2020-10759 - https://github.com/justinsteven/advisories/blob/master/2020_fwupd_dangling_s3_bucket_and_CVE-2020-10759_signature_verification_bypass.md
|
|
CVE-2020-10766 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e
|
|
CVE-2020-10767 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada
|
|
CVE-2020-10768 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf
|
|
CVE-2020-10769 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-10770 - http://packetstormsecurity.com/files/164499/Keycloak-12.0.1-Server-Side-Request-Forgery.html
|
|
CVE-2020-10773 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f
|
|
CVE-2020-10777 - https://bugzilla.redhat.com/show_bug.cgi?id=1847605
|
|
CVE-2020-10781 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=853eab68afc80f59f36bbdeb715e5c88c501e680
|
|
CVE-2020-10786 - https://gitlab.com/snippets/1954764
|
|
CVE-2020-10787 - https://gitlab.com/snippets/1954764
|
|
CVE-2020-10793 - https://medium.com/@vbharad/account-takeover-via-modifying-email-id-codeigniter-framework-ca30741ad297
|
|
CVE-2020-10807 - https://github.com/mitre/caldera/issues/1405
|
|
CVE-2020-10808 - http://packetstormsecurity.com/files/157111/Vesta-Control-Panel-Authenticated-Remote-Code-Execution.html
|
|
CVE-2020-10808 - http://packetstormsecurity.com/files/157219/Vesta-Control-Panel-Authenticated-Remote-Code-Execution.html
|
|
CVE-2020-10808 - https://pentest.blog/vesta-control-panel-second-order-remote-code-execution-0day-step-by-step-analysis/
|
|
CVE-2020-10809 - https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_1
|
|
CVE-2020-10809 - https://research.loginsoft.com/bugs/heap-overflow-in-decompress-c-hdf5-1-13-0/
|
|
CVE-2020-10810 - https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_3
|
|
CVE-2020-10810 - https://research.loginsoft.com/bugs/null-pointer-dereference-in-h5ac-c-hdf5-1-13-0/
|
|
CVE-2020-10811 - https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_2
|
|
CVE-2020-10811 - https://research.loginsoft.com/bugs/heap-buffer-overflow-in-h5olayout-c-hdf5-1-13-0/
|
|
CVE-2020-10812 - https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_4
|
|
CVE-2020-10812 - https://research.loginsoft.com/bugs/null-pointer-dereference-in-h5fquery-c-hdf5-1-13-0/
|
|
CVE-2020-10818 - https://code610.blogspot.com/2020/03/rce-in-artica-426.html
|
|
CVE-2020-10819 - https://code610.blogspot.com/2020/03/nagios-5611-xssd.html
|
|
CVE-2020-1082 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1082
|
|
CVE-2020-10820 - https://code610.blogspot.com/2020/03/nagios-5611-xssd.html
|
|
CVE-2020-10821 - https://code610.blogspot.com/2020/03/nagios-5611-xssd.html
|
|
CVE-2020-10823 - https://slashd.ga/2020/03/draytek-vulnerabilities/
|
|
CVE-2020-10824 - https://slashd.ga/2020/03/draytek-vulnerabilities/
|
|
CVE-2020-10825 - https://slashd.ga/2020/03/draytek-vulnerabilities/
|
|
CVE-2020-10826 - https://slashd.ga/2020/03/draytek-vulnerabilities/
|
|
CVE-2020-10827 - https://slashd.ga/2020/03/draytek-vulnerabilities/
|
|
CVE-2020-10828 - https://slashd.ga/2020/03/draytek-vulnerabilities/
|
|
CVE-2020-10829 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10830 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10831 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10832 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10833 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10834 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10835 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10836 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10837 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10838 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10839 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10840 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10841 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10842 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10843 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10844 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10845 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10846 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10847 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10848 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10849 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10850 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10851 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10852 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10853 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10854 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10855 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-10874 - https://www.youtube.com/watch?v=Lv-STOyQCVY
|
|
CVE-2020-10875 - https://www.youtube.com/watch?v=Lv-STOyQCVY
|
|
CVE-2020-10878 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-10878 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-10878 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-10878 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-10878 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-10878 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-10878 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-10879 - https://www.exploit-db.com/exploits/48241
|
|
CVE-2020-10882 - http://packetstormsecurity.com/files/157255/TP-Link-Archer-A7-C7-Unauthenticated-LAN-Remote-Code-Execution.html
|
|
CVE-2020-10883 - http://packetstormsecurity.com/files/157255/TP-Link-Archer-A7-C7-Unauthenticated-LAN-Remote-Code-Execution.html
|
|
CVE-2020-10884 - http://packetstormsecurity.com/files/157255/TP-Link-Archer-A7-C7-Unauthenticated-LAN-Remote-Code-Execution.html
|
|
CVE-2020-10914 - http://packetstormsecurity.com/files/157529/Veeam-ONE-Agent-.NET-Deserialization.html
|
|
CVE-2020-10915 - http://packetstormsecurity.com/files/157529/Veeam-ONE-Agent-.NET-Deserialization.html
|
|
CVE-2020-10931 - https://github.com/memcached/memcached/issues/629
|
|
CVE-2020-10935 - https://www.coresecurity.com/advisories/zulip-account-takeover-stored-xss
|
|
CVE-2020-10936 - https://sysdream.com/news/lab/
|
|
CVE-2020-10936 - https://sysdream.com/news/lab/2020-05-25-cve-2020-10936-sympa-privileges-escalation-to-root/
|
|
CVE-2020-10939 - https://cert.vde.com/en-us/advisories/vde-2020-012
|
|
CVE-2020-10940 - https://cert.vde.com/en-us/advisories/vde-2020-013
|
|
CVE-2020-10942 - https://usn.ubuntu.com/4342-1/
|
|
CVE-2020-10945 - https://sysdream.com/news/lab/2020-05-13-cve-2020-10945-centreon-session-id-exposure
|
|
CVE-2020-10946 - https://sysdream.com/news/lab/2020-05-13-cve-2020-10946-several-cross-site-scripting-xss-vulnerabilities-in-centreon/
|
|
CVE-2020-10947 - https://community.sophos.com/b/security-blog/posts/advisory-cve-2020-10947---sophos-anti-virus-for-macos-privilege-escalation
|
|
CVE-2020-10951 - https://www.westerndigital.com/support/productsecurity/wdc-19012-my-cloud-home-and-ibi-portal-websites-clickjacking-vulnerability
|
|
CVE-2020-10951 - https://www.westerndigital.com/support/productsecurity/wdc-19012-my-cloud-home-and-ibi-websites-2-2-0
|
|
CVE-2020-10957 - http://packetstormsecurity.com/files/157771/Open-Xchange-Dovecot-2.3.10-Null-Pointer-Dereference-Denial-Of-Service.html
|
|
CVE-2020-10957 - https://hackerone.com/reports/827729
|
|
CVE-2020-10958 - http://packetstormsecurity.com/files/157771/Open-Xchange-Dovecot-2.3.10-Null-Pointer-Dereference-Denial-Of-Service.html
|
|
CVE-2020-10958 - https://hackerone.com/reports/827051
|
|
CVE-2020-10963 - http://packetstormsecurity.com/files/160243/Laravel-Administrator-4-File-Upload.html
|
|
CVE-2020-10967 - http://packetstormsecurity.com/files/157771/Open-Xchange-Dovecot-2.3.10-Null-Pointer-Dereference-Denial-Of-Service.html
|
|
CVE-2020-10968 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-10968 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-10968 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-10968 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-10968 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-10969 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-10969 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-10969 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-10969 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-10969 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-10977 - http://packetstormsecurity.com/files/160441/GitLab-File-Read-Remote-Code-Execution.html
|
|
CVE-2020-10982 - https://herolab.usd.de/security-advisories/
|
|
CVE-2020-10982 - https://herolab.usd.de/security-advisories/usd-2020-0033/
|
|
CVE-2020-10983 - https://herolab.usd.de/security-advisories/
|
|
CVE-2020-10983 - https://herolab.usd.de/security-advisories/usd-2020-0034/
|
|
CVE-2020-10984 - https://herolab.usd.de/security-advisories/
|
|
CVE-2020-10984 - https://herolab.usd.de/security-advisories/usd-2020-0031/
|
|
CVE-2020-10985 - https://herolab.usd.de/security-advisories/
|
|
CVE-2020-10985 - https://herolab.usd.de/security-advisories/usd-2020-0035/
|
|
CVE-2020-10986 - https://www.ise.io/research/
|
|
CVE-2020-10987 - https://www.ise.io/research/
|
|
CVE-2020-10988 - https://www.ise.io/research/
|
|
CVE-2020-10989 - https://www.ise.io/research/
|
|
CVE-2020-10996 - https://jira.percona.com/browse/PXC-3117
|
|
CVE-2020-10996 - https://www.percona.com/blog/2020/04/20/cve-2020-10996-percona-xtradb-cluster-sst-script-static-key/
|
|
CVE-2020-10997 - https://jira.percona.com/browse/PXB-2142
|
|
CVE-2020-10997 - https://www.percona.com/blog/2020/04/16/cve-2020-10997-percona-xtrabackup-information-disclosure-of-command-line-arguments/
|
|
CVE-2020-11022 - http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html
|
|
CVE-2020-11022 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-11022 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-11022 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-11022 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11022 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-11022 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-11022 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-11022 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11022 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-11022 - https://www.tenable.com/security/tns-2020-10
|
|
CVE-2020-11022 - https://www.tenable.com/security/tns-2020-11
|
|
CVE-2020-11022 - https://www.tenable.com/security/tns-2021-02
|
|
CVE-2020-11022 - https://www.tenable.com/security/tns-2021-10
|
|
CVE-2020-11023 - http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html
|
|
CVE-2020-11023 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-11023 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-11023 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-11023 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11023 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-11023 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-11023 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-11023 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11023 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-11023 - https://www.tenable.com/security/tns-2021-02
|
|
CVE-2020-11023 - https://www.tenable.com/security/tns-2021-10
|
|
CVE-2020-11026 - https://hackerone.com/reports/179695
|
|
CVE-2020-11027 - http://packetstormsecurity.com/files/173034/WordPress-Theme-Medic-1.0.0-Weak-Password-Recovery-Mechanism.html
|
|
CVE-2020-11042 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-11044 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-11045 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-11046 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-11047 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-11048 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-11049 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-11058 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-11060 - http://packetstormsecurity.com/files/163119/GLPI-9.4.5-Remote-Code-Execution.html
|
|
CVE-2020-11080 - https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
|
|
CVE-2020-11080 - https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
|
|
CVE-2020-11080 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-11080 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-11080 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11080 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-11080 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11083 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html
|
|
CVE-2020-11083 - http://seclists.org/fulldisclosure/2020/Aug/2
|
|
CVE-2020-11090 - https://github.com/hyperledger/indy-node/blob/master/CHANGELOG.md#1123
|
|
CVE-2020-11093 - https://github.com/hyperledger/indy-node/blob/master/CHANGELOG.md#1124
|
|
CVE-2020-11093 - https://github.com/hyperledger/indy-node/security/advisories/GHSA-wh2w-39f4-rpv2
|
|
CVE-2020-11095 - https://usn.ubuntu.com/4481-1/
|
|
CVE-2020-11096 - https://usn.ubuntu.com/4481-1/
|
|
CVE-2020-11097 - https://usn.ubuntu.com/4481-1/
|
|
CVE-2020-11098 - https://usn.ubuntu.com/4481-1/
|
|
CVE-2020-11099 - https://usn.ubuntu.com/4481-1/
|
|
CVE-2020-11100 - http://packetstormsecurity.com/files/157323/haproxy-hpack-tbl.c-Out-Of-Bounds-Write.html
|
|
CVE-2020-11107 - http://packetstormsecurity.com/files/164292/XAMPP-7.4.3-Privilege-Escalation.html
|
|
CVE-2020-11108 - http://packetstormsecurity.com/files/157623/Pi-hole-4.4-Remote-Code-Execution.html
|
|
CVE-2020-11108 - http://packetstormsecurity.com/files/157624/Pi-hole-4.4-Remote-Code-Execution-Privilege-Escalation.html
|
|
CVE-2020-11108 - http://packetstormsecurity.com/files/157748/Pi-Hole-heisenbergCompensator-Blocklist-OS-Command-Execution.html
|
|
CVE-2020-11108 - http://packetstormsecurity.com/files/157839/Pi-hole-4.4.0-Remote-Code-Execution.html
|
|
CVE-2020-11108 - https://frichetten.com/blog/cve-2020-11108-pihole-rce/
|
|
CVE-2020-11108 - https://github.com/Frichetten/CVE-2020-11108-PoC
|
|
CVE-2020-11110 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md
|
|
CVE-2020-11111 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-11111 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11111 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-11111 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11111 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-11112 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-11112 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11112 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-11112 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11112 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-11113 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-11113 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11113 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-11113 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11113 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-11114 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-11115 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-11116 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-11117 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-11118 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-11119 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11120 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-11121 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11122 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-11123 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11124 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin
|
|
CVE-2020-11125 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-11126 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11127 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11128 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-11129 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin
|
|
CVE-2020-11130 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11131 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11132 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11133 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-11134 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11135 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin
|
|
CVE-2020-11136 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11137 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11138 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11139 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11140 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11141 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-11143 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11144 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11145 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11146 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11147 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11148 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11149 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11150 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11151 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11152 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11153 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-11154 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-11155 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-11156 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-11157 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-11158 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-11159 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11160 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11161 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11162 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-11163 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11164 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-11165 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11166 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11167 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11168 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11169 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-11170 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11171 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11172 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-11173 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-11174 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-11175 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11176 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin
|
|
CVE-2020-11177 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11178 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11179 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11180 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11181 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11182 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11183 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11184 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11185 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11186 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11187 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11188 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11189 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11190 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11191 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2020-11192 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11193 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11194 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11195 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11196 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11197 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11198 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11199 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11200 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11201 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/
|
|
CVE-2020-11201 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11202 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/
|
|
CVE-2020-11202 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11203 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11204 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11205 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11206 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/
|
|
CVE-2020-11206 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11207 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/
|
|
CVE-2020-11207 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11208 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/
|
|
CVE-2020-11208 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11209 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/
|
|
CVE-2020-11209 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-11210 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2020-11212 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11213 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11214 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11215 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11216 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11217 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11218 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11220 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11221 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11222 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11223 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11225 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-11226 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11227 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11228 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11230 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11231 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2020-11233 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11234 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2020-11235 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11236 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2020-11237 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2020-11238 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11239 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11240 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11241 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11242 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2020-11243 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2020-11245 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2020-11246 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2020-11247 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2020-11250 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11251 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2020-11252 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2020-11253 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11254 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2020-11255 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2020-11256 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11257 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11258 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11259 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11260 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11261 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11262 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11263 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2020-11264 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2020-11265 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11266 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
|
|
CVE-2020-11267 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin
|
|
CVE-2020-11268 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2020-11269 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11270 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11271 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11272 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11273 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2020-11274 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2020-11275 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11276 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11277 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11278 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11279 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2020-11280 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11281 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11282 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11283 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11284 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2020-11285 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2020-11286 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11287 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11288 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2020-11289 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2020-11290 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11291 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin
|
|
CVE-2020-11292 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin
|
|
CVE-2020-11293 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2020-11294 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2020-11295 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2020-11296 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11297 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-11298 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin
|
|
CVE-2020-11299 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11301 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2020-11303 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2020-11304 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin
|
|
CVE-2020-11305 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11306 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin
|
|
CVE-2020-11307 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2020-11308 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11309 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin
|
|
CVE-2020-11415 - https://support.sonatype.com/hc/en-us/articles/360045360854
|
|
CVE-2020-11436 - https://know.bishopfox.com/advisories
|
|
CVE-2020-11436 - https://labs.bishopfox.com/advisories/librehealth-version-2.0.0-0
|
|
CVE-2020-11437 - https://know.bishopfox.com/advisories
|
|
CVE-2020-11437 - https://labs.bishopfox.com/advisories/librehealth-version-2.0.0-0
|
|
CVE-2020-11438 - https://know.bishopfox.com/advisories
|
|
CVE-2020-11438 - https://labs.bishopfox.com/advisories/librehealth-version-2.0.0-0
|
|
CVE-2020-11439 - https://know.bishopfox.com/advisories
|
|
CVE-2020-11439 - https://labs.bishopfox.com/advisories/librehealth-version-2.0.0-0
|
|
CVE-2020-11441 - https://github.com/phpmyadmin/phpmyadmin/issues/16056
|
|
CVE-2020-11444 - https://support.sonatype.com
|
|
CVE-2020-11444 - https://support.sonatype.com/hc/en-us/articles/360046133553
|
|
CVE-2020-11449 - https://github.com/RioIsDown/TC7337
|
|
CVE-2020-11450 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html
|
|
CVE-2020-11451 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html
|
|
CVE-2020-11452 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html
|
|
CVE-2020-11453 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html
|
|
CVE-2020-11454 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html
|
|
CVE-2020-11455 - http://packetstormsecurity.com/files/157112/LimeSurvey-4.1.11-Path-Traversal.html
|
|
CVE-2020-11455 - https://www.exploit-db.com/exploits/48297
|
|
CVE-2020-11456 - http://packetstormsecurity.com/files/157114/LimeSurvey-4.1.11-Cross-Site-Scripting.html
|
|
CVE-2020-11456 - https://www.exploit-db.com/exploits/48289
|
|
CVE-2020-11457 - http://packetstormsecurity.com/files/157104/pfSense-2.4.4-P3-User-Manager-Cross-Site-Scripting.html
|
|
CVE-2020-11457 - https://www.exploit-db.com/exploits/48300
|
|
CVE-2020-11458 - https://matthias.sdfeu.org/misp-poc.py
|
|
CVE-2020-11463 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/
|
|
CVE-2020-11464 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/
|
|
CVE-2020-11465 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/
|
|
CVE-2020-11466 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/
|
|
CVE-2020-11467 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/
|
|
CVE-2020-1147 - http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html
|
|
CVE-2020-1147 - http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
|
|
CVE-2020-1147 - http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
|
|
CVE-2020-11474 - https://herolab.usd.de/security-advisories/
|
|
CVE-2020-11474 - https://herolab.usd.de/security-advisories/usd-2020-0038/
|
|
CVE-2020-11476 - https://herolab.usd.de/security-advisories/
|
|
CVE-2020-11476 - https://herolab.usd.de/security-advisories/usd-2020-0041/
|
|
CVE-2020-11490 - http://code610.blogspot.com/2020/03/pentesting-zen-load-balancer-quick.html
|
|
CVE-2020-11490 - https://github.com/c610/tmp/blob/master/zenload4patreons.zip
|
|
CVE-2020-11491 - http://code610.blogspot.com/2020/03/pentesting-zen-load-balancer-quick.html
|
|
CVE-2020-11491 - https://github.com/c610/tmp/blob/master/zenload4patreons.zip
|
|
CVE-2020-11492 - https://docs.docker.com/docker-for-windows/release-notes/
|
|
CVE-2020-11492 - https://www.pentestpartners.com/security-blog/docker-desktop-for-windows-privesc-cve-2020-11492/
|
|
CVE-2020-11494 - http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html
|
|
CVE-2020-11497 - http://packetstormsecurity.com/files/158931/WordPress-NAB-Transact-WooCommerce-2.1.0-Payment-Bypass.html
|
|
CVE-2020-11497 - http://seclists.org/fulldisclosure/2020/Aug/13
|
|
CVE-2020-11501 - https://usn.ubuntu.com/4322-1/
|
|
CVE-2020-11503 - https://community.sophos.com/b/security-blog/posts/advisory-potential-rce-through-heap-overflow-in-awarrensmtp-cve-2020-11503
|
|
CVE-2020-11507 - https://forums.malwarebytes.com/topic/258140-release-adwcleaner-804/
|
|
CVE-2020-11511 - http://packetstormsecurity.com/files/163538/WordPress-LearnPress-Privilege-Escalation.html
|
|
CVE-2020-11521 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-11522 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-11523 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-11524 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-11525 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-11526 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-11528 - https://github.com/14isnot40/vul_discovery/blob/06d04dbbc6f792a82321c00376d4dbf3add00f4f/poc/bit2spr%20vulnerability%20discovery.md.pdf
|
|
CVE-2020-11529 - https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7
|
|
CVE-2020-11530 - http://packetstormsecurity.com/files/157607/WordPress-ChopSlider-3-SQL-Injection.html
|
|
CVE-2020-11530 - http://packetstormsecurity.com/files/157655/WordPress-ChopSlider3-3.4-SQL-Injection.html
|
|
CVE-2020-11531 - http://packetstormsecurity.com/files/157604/ManageEngine-DataSecurity-Plus-Path-Traversal-Code-Execution.html
|
|
CVE-2020-11531 - http://seclists.org/fulldisclosure/2020/May/27
|
|
CVE-2020-11532 - http://packetstormsecurity.com/files/157609/ManageEngine-DataSecurity-Plus-Authentication-Bypass.html
|
|
CVE-2020-11532 - http://seclists.org/fulldisclosure/2020/May/28
|
|
CVE-2020-11539 - https://github.com/the-girl-who-lived/CVE-2020-11539/
|
|
CVE-2020-11539 - https://medium.com/@sayliambure/hacking-a-5-smartband-824763ab6e8f
|
|
CVE-2020-11546 - https://blog.to.com/advisory-superwebmailer-cve-2020-11546/
|
|
CVE-2020-11548 - https://www.exploit-db.com/exploits/48197
|
|
CVE-2020-11549 - https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security
|
|
CVE-2020-11549 - https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt
|
|
CVE-2020-11550 - https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security
|
|
CVE-2020-11550 - https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt
|
|
CVE-2020-11551 - https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security
|
|
CVE-2020-11551 - https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt
|
|
CVE-2020-11552 - http://packetstormsecurity.com/files/158820/ManageEngine-ADSelfService-Plus-6000-Remote-Code-Execution.html
|
|
CVE-2020-11552 - http://seclists.org/fulldisclosure/2020/Aug/4
|
|
CVE-2020-11552 - http://seclists.org/fulldisclosure/2020/Aug/6
|
|
CVE-2020-11552 - https://www.exploit-db.com/exploits/48739
|
|
CVE-2020-11552 - https://www.manageengine.com
|
|
CVE-2020-11553 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee
|
|
CVE-2020-11554 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee
|
|
CVE-2020-11555 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee
|
|
CVE-2020-11556 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee
|
|
CVE-2020-11557 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee
|
|
CVE-2020-11558 - https://github.com/gpac/gpac/issues/1440
|
|
CVE-2020-11560 - http://packetstormsecurity.com/files/173117/NCH-Express-Invoice-7.25-Cleartext-Password.html
|
|
CVE-2020-11560 - https://tejaspingulkar.blogspot.com/2020/03/cve-cve-2020-11560-title-clear-text.html
|
|
CVE-2020-11560 - https://www.youtube.com/watch?v=V0BWq33qVCs&feature=youtu.be
|
|
CVE-2020-11561 - https://tejaspingulkar.blogspot.com
|
|
CVE-2020-11561 - https://tejaspingulkar.blogspot.com/2020/03/cve-cve-2020-11561-title-escalation-via.html
|
|
CVE-2020-11561 - https://youtu.be/-i2KtBgO3Kw
|
|
CVE-2020-11576 - https://www.soluble.ai/blog/argo-cves-2020
|
|
CVE-2020-11579 - https://shielder.it/
|
|
CVE-2020-11579 - https://www.shielder.it/blog/mysql-and-cve-2020-11579-exploitation/
|
|
CVE-2020-11583 - https://medium.com/@0x00crash/xss-reflected-in-plesk-onyx-and-obsidian-1173a3eaffb5
|
|
CVE-2020-11584 - https://medium.com/@0x00crash/xss-reflected-in-plesk-onyx-and-obsidian-1173a3eaffb5
|
|
CVE-2020-11601 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-11602 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-11603 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-11604 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-11605 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-11606 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-11607 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-11608 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1
|
|
CVE-2020-11609 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1
|
|
CVE-2020-11610 - https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Magic-iframe
|
|
CVE-2020-11611 - https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client
|
|
CVE-2020-11612 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-11612 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-11612 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-11612 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11619 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-11619 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11619 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-11619 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11620 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-11620 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11620 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-11620 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11622 - https://www.arista.com/en/support/advisories-notices
|
|
CVE-2020-11651 - http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html
|
|
CVE-2020-11651 - http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2020-11652 - http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html
|
|
CVE-2020-11652 - http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2020-11655 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-11655 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11655 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-11655 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11656 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-11656 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11656 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-11656 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11658 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11659 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11660 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11661 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11661 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11662 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11662 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11663 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11663 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11664 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11664 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11665 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11665 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11666 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11666 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html
|
|
CVE-2020-11668 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1
|
|
CVE-2020-11669 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2
|
|
CVE-2020-11673 - https://gist.github.com/pak0s/05a0e517aeff4b1422d1a93f59718459
|
|
CVE-2020-11679 - http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html
|
|
CVE-2020-11680 - http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html
|
|
CVE-2020-11681 - http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html
|
|
CVE-2020-11682 - http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html
|
|
CVE-2020-11698 - http://packetstormsecurity.com/files/159470/SpamTitan-7.07-Remote-Code-Execution.html
|
|
CVE-2020-11698 - http://packetstormsecurity.com/files/160809/SpamTitan-7.07-Command-Injection.html
|
|
CVE-2020-11698 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/
|
|
CVE-2020-11699 - http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html
|
|
CVE-2020-11699 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/
|
|
CVE-2020-1170 - http://packetstormsecurity.com/files/160919/Cloud-Filter-Arbitrary-File-Creation-Privilege-Escalation.html
|
|
CVE-2020-11700 - http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html
|
|
CVE-2020-11700 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/
|
|
CVE-2020-11709 - https://gist.github.com/shouc/a9330df817128bc4c4132abf3de09495
|
|
CVE-2020-11709 - https://github.com/yhirose/cpp-httplib/issues/425
|
|
CVE-2020-11711 - https://advisories.stormshield.eu/2020-011/
|
|
CVE-2020-11712 - https://github.com/jenaye/cve/blob/master/readme.MD
|
|
CVE-2020-11713 - https://gist.github.com/pietroborrello/7c5be2d1dc15349c4ffc8671f0aad04f
|
|
CVE-2020-11714 - https://github.com/leona4040/PSG-6528VM-xss/blob/master/README.md
|
|
CVE-2020-11717 - http://packetstormsecurity.com/files/160628/Programi-Bilanc-Build-007-Release-014-31.01.2020-SQL-Injection.html
|
|
CVE-2020-11717 - https://seclists.org/fulldisclosure/2020/Dec/36
|
|
CVE-2020-11718 - http://packetstormsecurity.com/files/160627/Programi-Bilanc-Build-007-Release-014-31.01.2020-Insecure-Downloads.html
|
|
CVE-2020-11718 - http://seclists.org/fulldisclosure/2020/Dec/39
|
|
CVE-2020-11719 - http://packetstormsecurity.com/files/160625/Programi-Bilanc-Build-007-Release-014-31.01.2020-Static-Key.html
|
|
CVE-2020-11719 - http://seclists.org/fulldisclosure/2020/Dec/35
|
|
CVE-2020-11720 - http://packetstormsecurity.com/files/160623/Programi-Bilanc-Build-007-Release-014-31.01.2020-Weak-Default-Password.html
|
|
CVE-2020-11720 - http://seclists.org/fulldisclosure/2020/Dec/34
|
|
CVE-2020-11721 - https://github.com/saitoha/libsixel/issues/134
|
|
CVE-2020-11723 - http://packetstormsecurity.com/files/157217/Cellebrite-UFED-7.29-Hardcoded-ADB-Authentication-Keys.html
|
|
CVE-2020-11727 - http://packetstormsecurity.com/files/157557/WordPress-WooCommerce-Advanced-Order-Export-3.1.3-Cross-Site-Scripting.html
|
|
CVE-2020-11738 - http://packetstormsecurity.com/files/160621/WordPress-Duplicator-1.3.26-Directory-Traversal-File-Read.html
|
|
CVE-2020-11738 - http://packetstormsecurity.com/files/164533/WordPress-Duplicator-1.3.26-Arbitrary-File-Read.html
|
|
CVE-2020-11749 - https://medium.com/@tehwinsam/multiple-xss-on-pandorafms-7-0-ng-744-64b244b8523c
|
|
CVE-2020-11749 - https://packetstormsecurity.com/files/158389/Pandora-FMS-7.0-NG-746-Script-Insertion-Code-Execution.htmlPoC
|
|
CVE-2020-11749 - https://www.exploit-db.com/exploits/48707
|
|
CVE-2020-11753 - https://support.sonatype.com/hc/en-us/articles/360046233714
|
|
CVE-2020-11771 - https://kb.netgear.com/000061759/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0519
|
|
CVE-2020-11773 - https://kb.netgear.com/000061757/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0521
|
|
CVE-2020-11774 - https://kb.netgear.com/000061756/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0522
|
|
CVE-2020-11775 - https://kb.netgear.com/000061755/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0523
|
|
CVE-2020-11776 - https://kb.netgear.com/000061754/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0524
|
|
CVE-2020-11777 - https://kb.netgear.com/000061753/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateway-PSV-2018-0525
|
|
CVE-2020-11780 - https://kb.netgear.com/000061750/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0528
|
|
CVE-2020-11782 - https://kb.netgear.com/000061748/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0530
|
|
CVE-2020-11783 - https://kb.netgear.com/000061747/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0531
|
|
CVE-2020-11786 - https://kb.netgear.com/000061744/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0535
|
|
CVE-2020-11789 - https://kb.netgear.com/000061741/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0051
|
|
CVE-2020-11798 - http://packetstormsecurity.com/files/171751/Mitel-MiCollab-AWV-8.1.2.4-9.1.3-Directory-Traversal-LFI.html
|
|
CVE-2020-11803 - http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html
|
|
CVE-2020-11803 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/
|
|
CVE-2020-11804 - http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html
|
|
CVE-2020-11804 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/
|
|
CVE-2020-11811 - https://fatihhcelik.blogspot.com/2020/01/qdpm-web-based-project-management.html
|
|
CVE-2020-11827 - https://www.gog.com/galaxy
|
|
CVE-2020-11853 - http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html
|
|
CVE-2020-11853 - http://packetstormsecurity.com/files/161366/Micro-Focus-Operations-Bridge-Manager-Remote-Code-Execution.html
|
|
CVE-2020-11854 - http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html
|
|
CVE-2020-11857 - http://packetstormsecurity.com/files/162407/Micro-Focus-Operations-Bridge-Reporter-shrboadmin-Default-Password.html
|
|
CVE-2020-11858 - http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html
|
|
CVE-2020-11868 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-11879 - https://gitlab.gnome.org/GNOME/evolution/issues/784
|
|
CVE-2020-11882 - http://packetstormsecurity.com/files/158302/Android-o2-Business-1.2.0-Open-Redirect.html
|
|
CVE-2020-11884 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3f777e19d171670ab558a6d5e6b1ac7f9b6c574f
|
|
CVE-2020-11884 - https://usn.ubuntu.com/4342-1/
|
|
CVE-2020-11886 - https://issues.opennms.org/browse/NMS-12572
|
|
CVE-2020-11888 - https://github.com/trentm/python-markdown2/issues/348
|
|
CVE-2020-11894 - https://github.com/libming/libming/issues/196
|
|
CVE-2020-11895 - https://github.com/libming/libming/issues/197
|
|
CVE-2020-11896 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11896 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11896 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11896 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11897 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11897 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11897 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11897 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11898 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11898 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11898 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11898 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11899 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11899 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11899 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11899 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11900 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11900 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11900 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11900 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11901 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11901 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11901 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11901 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11902 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11902 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11902 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11902 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11903 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11903 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11903 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11903 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11904 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11904 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11904 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11904 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11905 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11905 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11905 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11905 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11906 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11906 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11906 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11906 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11907 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11907 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11907 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11907 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11908 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11908 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11908 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11908 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11909 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11909 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11909 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11909 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11910 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11910 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11910 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11910 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11911 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11911 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11911 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11911 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11912 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11912 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11912 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11912 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11913 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11913 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11913 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11913 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11914 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
|
|
CVE-2020-11914 - https://www.jsof-tech.com/ripple20/
|
|
CVE-2020-11914 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-11914 - https://www.kb.cert.org/vuls/id/257161/
|
|
CVE-2020-11915 - https://www.pentestpartners.com/security-blog/vulnerable-wi-fi-dildo-camera-endoscope-yes-really/
|
|
CVE-2020-11920 - https://www.pentestpartners.com/security-blog/vulnerable-wi-fi-dildo-camera-endoscope-yes-really/
|
|
CVE-2020-11930 - https://wpvulndb.com/vulnerabilities/10181
|
|
CVE-2020-11935 - https://ubuntu.com/security/CVE-2020-11935
|
|
CVE-2020-11937 - https://github.com/sungjungk/whoopsie_killer
|
|
CVE-2020-11937 - https://launchpad.net/bugs/1881982
|
|
CVE-2020-11941 - http://packetstormsecurity.com/files/157476/Open-AudIT-3.2.2-Command-Injection-SQL-Injection.html
|
|
CVE-2020-11941 - https://www.coresecurity.com/advisories/open-audit-multiple-vulnerabilities
|
|
CVE-2020-11942 - https://www.coresecurity.com/advisories/open-audit-multiple-vulnerabilities
|
|
CVE-2020-11943 - https://www.coresecurity.com/advisories/open-audit-multiple-vulnerabilities
|
|
CVE-2020-11945 - https://github.com/squid-cache/squid/pull/585
|
|
CVE-2020-11951 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/
|
|
CVE-2020-11952 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/
|
|
CVE-2020-11953 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/
|
|
CVE-2020-11955 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/
|
|
CVE-2020-11956 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/
|
|
CVE-2020-11958 - https://github.com/skvadrik/re2c/commit/c4603ba5ce229db83a2a4fb93e6d4b4e3ec3776a
|
|
CVE-2020-11959 - https://privacy.mi.com/trust#/security/vulnerability-management/vulnerability-announcement/detail?id=14
|
|
CVE-2020-11971 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-11971 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11971 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11972 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11972 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11973 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-11973 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-11973 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11973 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11978 - http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html
|
|
CVE-2020-11978 - http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html
|
|
CVE-2020-11979 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-11979 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-11979 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-11979 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11979 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-11979 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-11984 - http://packetstormsecurity.com/files/159009/Apache2-mod_proxy_uwsgi-Incorrect-Request-Handling.html
|
|
CVE-2020-11984 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11984 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11985 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11987 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-11987 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-11987 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-11987 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-11987 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-11988 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-11988 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-11993 - http://packetstormsecurity.com/files/160393/Apache-2-HTTP2-Module-Concurrent-Pool-Usage.html
|
|
CVE-2020-11993 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11993 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11994 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-11994 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11994 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-11996 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11996 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-11998 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-11998 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-11998 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-11998 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-12004 - http://packetstormsecurity.com/files/158226/Inductive-Automation-Ignition-Remote-Code-Execution.html
|
|
CVE-2020-12027 - http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2020-12028 - http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2020-12029 - http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2020-12049 - http://packetstormsecurity.com/files/172840/D-Bus-File-Descriptor-Leak-Denial-Of-Service.html
|
|
CVE-2020-12049 - https://gitlab.freedesktop.org/dbus/dbus/-/issues/294
|
|
CVE-2020-12049 - https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak
|
|
CVE-2020-12050 - https://bugzilla.redhat.com/show_bug.cgi?id=1825762
|
|
CVE-2020-12050 - https://sysdream.com/news/lab/
|
|
CVE-2020-12050 - https://sysdream.com/news/lab/2020-05-25-cve-2020-12050-fedora-red-hat-centos-local-privilege-escalation-through-a-race-condition-in-the-sqliteodbc-installer-script/
|
|
CVE-2020-12052 - https://community.grafana.com/t/release-notes-v6-7-x/27119
|
|
CVE-2020-12054 - https://cxsecurity.com/issue/WLB-2020040144
|
|
CVE-2020-12054 - https://wpvulndb.com/vulnerabilities/10184
|
|
CVE-2020-1206 - http://packetstormsecurity.com/files/158053/SMBleed-Uninitialized-Kernel-Memory-Read-Proof-Of-Concept.html
|
|
CVE-2020-12061 - https://eprint.iacr.org/2021/640.pdf
|
|
CVE-2020-12074 - https://www.wordfence.com/blog/2020/03/vulnerability-patched-in-import-export-wordpress-users/
|
|
CVE-2020-12078 - http://packetstormsecurity.com/files/157477/Open-AudIT-Professional-3.3.1-Remote-Code-Execution.html
|
|
CVE-2020-12078 - https://shells.systems/open-audit-v3-3-1-remote-command-execution-cve-2020-12078/
|
|
CVE-2020-12080 - https://www.tenable.com/security/research/tra-2020-28
|
|
CVE-2020-12101 - http://packetstormsecurity.com/files/157534/xt-Commerce-5.4.1-6.2.1-6.2.2-Improper-Access-Control.html
|
|
CVE-2020-12101 - http://seclists.org/fulldisclosure/2020/May/0
|
|
CVE-2020-12101 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-012.txt
|
|
CVE-2020-12102 - https://cyberaz0r.info/2020/04/tiny-file-manager-multiple-vulnerabilities/
|
|
CVE-2020-12102 - https://github.com/prasathmani/tinyfilemanager/issues/357
|
|
CVE-2020-12103 - https://cyberaz0r.info/2020/04/tiny-file-manager-multiple-vulnerabilities/
|
|
CVE-2020-12103 - https://github.com/prasathmani/tinyfilemanager/issues/357
|
|
CVE-2020-12104 - https://wpvulndb.com/vulnerabilities/10199
|
|
CVE-2020-12109 - http://packetstormsecurity.com/files/157531/TP-LINK-Cloud-Cameras-NCXXX-Bonjour-Command-Injection.html
|
|
CVE-2020-12109 - http://packetstormsecurity.com/files/159222/TP-Link-Cloud-Cameras-NCXXX-Bonjour-Command-Injection.html
|
|
CVE-2020-12110 - http://packetstormsecurity.com/files/157532/TP-LINK-Cloud-Cameras-NCXXX-Hardcoded-Encryption-Key.html
|
|
CVE-2020-12111 - http://packetstormsecurity.com/files/157533/TP-LINK-Cloud-Cameras-NCXXX-SetEncryptKey-Command-Injection.html
|
|
CVE-2020-12112 - https://github.com/tchenu/CVE-2020-12112
|
|
CVE-2020-12114 - http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html
|
|
CVE-2020-12114 - http://www.openwall.com/lists/oss-security/2020/05/04/2
|
|
CVE-2020-12114 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-12117 - https://blog.scadafence.com/technical-blog-cve-2020-12117-industrial-iot-insecure-default-configurations
|
|
CVE-2020-12120 - https://ia-informatica.com/it/CVE-2020-12120
|
|
CVE-2020-12122 - https://github.com/FULLSHADE/Kernel-exploits
|
|
CVE-2020-12122 - https://github.com/FULLSHADE/Kernel-exploits/tree/master/MaxProc64.sys
|
|
CVE-2020-12125 - https://cerne.xyz/bugs/CVE-2020-12125
|
|
CVE-2020-12128 - https://www.vulnerability-lab.com/get_content.php?id=2199
|
|
CVE-2020-12129 - https://www.vulnerability-lab.com/get_content.php?id=2203
|
|
CVE-2020-12130 - https://www.vulnerability-lab.com/get_content.php?id=2203
|
|
CVE-2020-12131 - https://www.vulnerability-lab.com/get_content.php?id=2203
|
|
CVE-2020-12132 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5561.php
|
|
CVE-2020-12133 - http://packetstormsecurity.com/files/157383/Furukawa-Electric-ConsciusMAP-2.8.1-Java-Deserialization-Remote-Code-Execution.html
|
|
CVE-2020-12134 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5562.php
|
|
CVE-2020-12138 - https://eclypsium.com/2019/11/12/mother-of-all-drivers/
|
|
CVE-2020-12138 - https://h0mbre.github.io/atillk64_exploit/
|
|
CVE-2020-12243 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-12243 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-12244 - https://hackerone.com/reports/858854
|
|
CVE-2020-12245 - https://community.grafana.com/t/release-notes-v6-7-x/27119
|
|
CVE-2020-12245 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md#673-2020-04-23
|
|
CVE-2020-12245 - https://github.com/grafana/grafana/pull/23816
|
|
CVE-2020-12246 - https://medium.com/@Pavel.Step/security-analysis-of-the-smart-box-router-932f86dc8a9e
|
|
CVE-2020-12246 - https://yadi.sk/i/YdfXr-ofAN2ZWA
|
|
CVE-2020-12246 - https://yadi.sk/i/iIUCJVaGEuSaAw
|
|
CVE-2020-12246 - https://yadi.sk/i/jXV87yn4ZJfSHA
|
|
CVE-2020-12251 - http://packetstormsecurity.com/files/157484/Gigamon-GigaVUE-5.5.01.11-Directory-Traversal-File-Upload.html
|
|
CVE-2020-12252 - http://packetstormsecurity.com/files/157484/Gigamon-GigaVUE-5.5.01.11-Directory-Traversal-File-Upload.html
|
|
CVE-2020-12261 - http://packetstormsecurity.com/files/157401/Open-AudIT-3.3.0-Cross-Site-Scripting.html
|
|
CVE-2020-12261 - https://www.exploit-db.com/exploits/48516
|
|
CVE-2020-12262 - https://lucxs.medium.com/cve-2020-12262-xss-voip-intelbras-d5697e31fbf6
|
|
CVE-2020-12262 - https://www.youtube.com/watch?v=rihboOgiJRs
|
|
CVE-2020-12265 - https://github.com/kevva/decompress/issues/71
|
|
CVE-2020-12265 - https://github.com/kevva/decompress/pull/73
|
|
CVE-2020-12351 - http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html
|
|
CVE-2020-12352 - http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html
|
|
CVE-2020-12352 - http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html
|
|
CVE-2020-12387 - https://bugzilla.mozilla.org/show_bug.cgi?id=1545345
|
|
CVE-2020-12388 - http://packetstormsecurity.com/files/157860/Firefox-Default-Content-Process-DACL-Sandbox-Escape.html
|
|
CVE-2020-12388 - https://bugzilla.mozilla.org/show_bug.cgi?id=1618911
|
|
CVE-2020-12393 - https://bugzilla.mozilla.org/show_bug.cgi?id=1615471
|
|
CVE-2020-12404 - https://bugzilla.mozilla.org/show_bug.cgi?id=1631739
|
|
CVE-2020-12405 - https://bugzilla.mozilla.org/show_bug.cgi?id=1631618
|
|
CVE-2020-12412 - https://bugzilla.mozilla.org/show_bug.cgi?id=1528587
|
|
CVE-2020-12418 - https://bugzilla.mozilla.org/show_bug.cgi?id=1641303
|
|
CVE-2020-12422 - https://bugzilla.mozilla.org/show_bug.cgi?id=1450353
|
|
CVE-2020-12425 - https://bugzilla.mozilla.org/show_bug.cgi?id=1634738
|
|
CVE-2020-12427 - https://www.westerndigital.com/support/productsecurity/wdc-20004-wd-discovery-cross-site-request-forgery-csrf
|
|
CVE-2020-12429 - https://www.exploit-db.com/exploits/48385
|
|
CVE-2020-12431 - https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-splashtop-streamer
|
|
CVE-2020-12432 - https://github.com/d7x/CVE-2020-12432
|
|
CVE-2020-12432 - https://www.youtube.com/watch?v=_tkRnSr6yc0
|
|
CVE-2020-12443 - https://github.com/mclab-hbrs/BBB-POC
|
|
CVE-2020-12446 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-003.md
|
|
CVE-2020-12460 - https://github.com/trusteddomainproject/OpenDMARC/issues/64
|
|
CVE-2020-12464 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.8
|
|
CVE-2020-12474 - https://github.com/VijayT007/Vulnerability-Database/blob/master/Telegram:CVE-2020-12474
|
|
CVE-2020-12480 - https://www.playframework.com/security/vulnerability
|
|
CVE-2020-12494 - https://cert.vde.com/en-us/advisories/vde-2020-019
|
|
CVE-2020-12495 - https://cert.vde.com/en-us/advisories/vde-2020-021
|
|
CVE-2020-12496 - https://cert.vde.com/en-us/advisories/vde-2020-022
|
|
CVE-2020-12499 - https://cert.vde.com/en-us/advisories/vde-2020-025
|
|
CVE-2020-12500 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html
|
|
CVE-2020-12500 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html
|
|
CVE-2020-12500 - http://seclists.org/fulldisclosure/2021/Jun/0
|
|
CVE-2020-12500 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/
|
|
CVE-2020-12501 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html
|
|
CVE-2020-12501 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html
|
|
CVE-2020-12501 - http://packetstormsecurity.com/files/167409/Korenix-JetPort-5601V3-Backdoor-Account.html
|
|
CVE-2020-12501 - http://seclists.org/fulldisclosure/2021/Jun/0
|
|
CVE-2020-12501 - http://seclists.org/fulldisclosure/2022/Jun/3
|
|
CVE-2020-12501 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/
|
|
CVE-2020-12502 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html
|
|
CVE-2020-12502 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html
|
|
CVE-2020-12502 - http://seclists.org/fulldisclosure/2021/Jun/0
|
|
CVE-2020-12502 - https://cert.vde.com/en-us/advisories/vde-2020-053
|
|
CVE-2020-12502 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/
|
|
CVE-2020-12503 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html
|
|
CVE-2020-12503 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html
|
|
CVE-2020-12503 - http://seclists.org/fulldisclosure/2021/Jun/0
|
|
CVE-2020-12503 - https://cert.vde.com/en-us/advisories/vde-2020-053
|
|
CVE-2020-12503 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/
|
|
CVE-2020-12504 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html
|
|
CVE-2020-12504 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html
|
|
CVE-2020-12504 - http://seclists.org/fulldisclosure/2021/Jun/0
|
|
CVE-2020-12504 - https://cert.vde.com/en-us/advisories/vde-2020-053
|
|
CVE-2020-12504 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/
|
|
CVE-2020-12505 - https://cert.vde.com/en-us/advisories/vde-2020-027
|
|
CVE-2020-12506 - https://cert.vde.com/en-us/advisories/vde-2020-028
|
|
CVE-2020-12510 - https://cert.vde.com/en-us/advisories/vde-2020-037
|
|
CVE-2020-12511 - https://cert.vde.com/en-us/advisories/vde-2020-038
|
|
CVE-2020-12512 - https://cert.vde.com/en-us/advisories/vde-2020-038
|
|
CVE-2020-12513 - https://cert.vde.com/en-us/advisories/vde-2020-038
|
|
CVE-2020-12514 - https://cert.vde.com/en-us/advisories/vde-2020-038
|
|
CVE-2020-12516 - https://cert.vde.com/en-us/advisories/vde-2020-042
|
|
CVE-2020-12517 - https://cert.vde.com/en-us/advisories/vde-2020-049
|
|
CVE-2020-12518 - https://cert.vde.com/en-us/advisories/vde-2020-049
|
|
CVE-2020-12519 - https://cert.vde.com/en-us/advisories/vde-2020-049
|
|
CVE-2020-12521 - https://cert.vde.com/en-us/advisories/vde-2020-049
|
|
CVE-2020-12522 - https://cert.vde.com/en-us/advisories/vde-2020-045
|
|
CVE-2020-12523 - https://cert.vde.com/en-us/advisories/vde-2020-046
|
|
CVE-2020-12524 - https://cert.vde.com/en-us/advisories/vde-2020-047
|
|
CVE-2020-12525 - https://cert.vde.com/en-us/advisories/vde-2020-038
|
|
CVE-2020-12526 - https://cert.vde.com/en-us/advisories/vde-2020-051
|
|
CVE-2020-12606 - https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-12606
|
|
CVE-2020-12607 - https://github.com/AntonKueltz/fastecdsa/issues/52
|
|
CVE-2020-12608 - http://packetstormsecurity.com/files/157591/SolarWinds-MSP-PME-Cache-Service-Insecure-File-Permissions-Code-Execution.html
|
|
CVE-2020-12608 - http://seclists.org/fulldisclosure/2020/May/23
|
|
CVE-2020-12608 - https://github.com/jensregel/Advisories/tree/master/CVE-2020-12608
|
|
CVE-2020-12619 - https://updates.mailmate-app.com/2.0/release_notes
|
|
CVE-2020-12624 - https://push32.com/post/dating-app-fail/
|
|
CVE-2020-12625 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12625-Cross%20Site-Scripting%20via%20Malicious%20HTML%20Attachment-Roundcube
|
|
CVE-2020-12626 - https://github.com/roundcube/roundcubemail/pull/7302
|
|
CVE-2020-12629 - https://www.exploit-db.com/exploits/48413
|
|
CVE-2020-12638 - https://lbsfilm.at/blog/wpa2-authenticationmode-downgrade-in-espressif-microprocessors
|
|
CVE-2020-12640 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12640-PHP%20Local%20File%20Inclusion-Roundcube
|
|
CVE-2020-12641 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12641-Command%20Injection-Roundcube
|
|
CVE-2020-12643 - http://seclists.org/fulldisclosure/2020/Aug/14
|
|
CVE-2020-12647 - https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=55
|
|
CVE-2020-12648 - https://labs.bishopfox.com/advisories/tinymce-version-5.2.1
|
|
CVE-2020-12652 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.14
|
|
CVE-2020-12657 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5
|
|
CVE-2020-12659 - https://bugzilla.kernel.org/show_bug.cgi?id=207225
|
|
CVE-2020-12659 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.7
|
|
CVE-2020-12673 - https://hackerone.com/reports/866597
|
|
CVE-2020-12674 - https://hackerone.com/reports/866605
|
|
CVE-2020-12676 - http://packetstormsecurity.com/files/159454/FusionAuth-SAMLv2-0.2.3-Message-Forging.html
|
|
CVE-2020-12676 - http://seclists.org/fulldisclosure/2020/Oct/1
|
|
CVE-2020-12695 - http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html
|
|
CVE-2020-12695 - https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/
|
|
CVE-2020-12695 - https://github.com/corelight/callstranger-detector
|
|
CVE-2020-12695 - https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of
|
|
CVE-2020-12702 - https://www.youtube.com/watch?v=DghYH7WY6iE&feature=youtu.be
|
|
CVE-2020-12706 - https://www.exploit-db.com/exploits/48404
|
|
CVE-2020-12712 - http://packetstormsecurity.com/files/158112/SOS-JobScheduler-1.13.3-Stored-Password-Decryption.html
|
|
CVE-2020-12713 - http://packetstormsecurity.com/files/158001/CipherMail-Community-Virtual-Appliance-4.6.2-Code-Execution.html
|
|
CVE-2020-12713 - https://www.coresecurity.com/core-labs/advisories/ciphermail-multiple-vulnerabilities
|
|
CVE-2020-12714 - https://packetstormsecurity.com/files/158001/CipherMail-Community-Virtual-Appliance-4.6.2-Code-Execution.html
|
|
CVE-2020-12714 - https://www.coresecurity.com/core-labs/advisories/ciphermail-multiple-vulnerabilities
|
|
CVE-2020-12717 - https://medium.com/@wabz/covidsafe-ios-vulnerability-cve-2020-12717-30dc003f9708
|
|
CVE-2020-12720 - http://packetstormsecurity.com/files/157716/vBulletin-5.6.1-SQL-Injection.html
|
|
CVE-2020-12720 - http://packetstormsecurity.com/files/157904/vBulletin-5.6.1-SQL-Injection.html
|
|
CVE-2020-12720 - https://attackerkb.com/topics/RSDAFLik92/cve-2020-12720-vbulletin-incorrect-access-control
|
|
CVE-2020-12723 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-12723 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-12723 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-12723 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-12723 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-12723 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-12723 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-12740 - https://github.com/appneta/tcpreplay/issues/576
|
|
CVE-2020-12745 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-12746 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-12747 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-12748 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-12749 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-12750 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-12751 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-12752 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-12753 - https://douevenknow.us/post/619763074822520832/an-el1el3-coldboot-vulnerability
|
|
CVE-2020-12753 - https://www.zdnet.com/article/new-cold-boot-attack-affects-seven-years-of-lg-android-smartphones/
|
|
CVE-2020-12760 - https://issues.opennms.org/browse/NMS-12673
|
|
CVE-2020-12762 - https://github.com/json-c/json-c/pull/592
|
|
CVE-2020-12762 - https://github.com/rsyslog/libfastjson/issues/161
|
|
CVE-2020-12763 - https://payatu.com/blog/munawwar/trendNet-wireless-camera-buffer-overflow-vulnerability
|
|
CVE-2020-12768 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6
|
|
CVE-2020-12768 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d80b64ff297e40c2b6f7d7abc1b3eba70d22a068
|
|
CVE-2020-12768 - https://usn.ubuntu.com/4413-1/
|
|
CVE-2020-12769 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.17
|
|
CVE-2020-12769 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19b61392c5a852b4e8a0bf35aecb969983c5932d
|
|
CVE-2020-12770 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=83c6f2390040f188cc25b270b4befeb5628c1aee
|
|
CVE-2020-12770 - https://usn.ubuntu.com/4413-1/
|
|
CVE-2020-12770 - https://usn.ubuntu.com/4414-1/
|
|
CVE-2020-12770 - https://usn.ubuntu.com/4419-1/
|
|
CVE-2020-12771 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-12783 - http://www.openwall.com/lists/oss-security/2021/05/04/7
|
|
CVE-2020-12783 - https://bugs.exim.org/show_bug.cgi?id=2571
|
|
CVE-2020-12790 - https://isec.pl/en/vulnerabilities/isec-0028-seomatic-ssti-23032020.txt
|
|
CVE-2020-12798 - http://packetstormsecurity.com/files/157715/Cellebrite-UFED-7.5.0.845-Desktop-Escape-Privilege-Escalation.html
|
|
CVE-2020-12798 - https://korelogic.com/Resources/Advisories/KL-001-2020-002.txt
|
|
CVE-2020-12798 - https://twitter.com/thatguylevel
|
|
CVE-2020-12800 - https://packetstormsecurity.com/files/157951/WordPress-Drag-And-Drop-Multi-File-Uploader-Remote-Code-Execution.html
|
|
CVE-2020-1281 - http://packetstormsecurity.com/files/158028/Microsoft-Windows-Privilege-Escalation-Code-Execution.html
|
|
CVE-2020-12811 - https://fortiguard.com/advisory/FG-IR-20-005
|
|
CVE-2020-12814 - https://fortiguard.com/advisory/FG-IR-20-092
|
|
CVE-2020-12815 - https://fortiguard.com/advisory/FG-IR-20-054
|
|
CVE-2020-12816 - https://fortiguard.com/advisory/FG-IR-20-002
|
|
CVE-2020-12817 - https://fortiguard.com/advisory/FG-IR-20-054
|
|
CVE-2020-12825 - https://gitlab.gnome.org/GNOME/libcroco/-/issues/8
|
|
CVE-2020-12826 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5
|
|
CVE-2020-12826 - https://lists.openwall.net/linux-kernel/2020/03/24/1803
|
|
CVE-2020-12826 - https://www.openwall.com/lists/kernel-hardening/2020/03/25/1
|
|
CVE-2020-12827 - http://packetstormsecurity.com/files/158111/MJML-4.6.2-Path-Traversal.html
|
|
CVE-2020-12830 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114
|
|
CVE-2020-12835 - http://packetstormsecurity.com/files/157772/Protection-Licensing-Toolkit-ReadyAPI-3.2.5-Code-Execution-Deserialization.html
|
|
CVE-2020-12835 - http://seclists.org/fulldisclosure/2020/May/38
|
|
CVE-2020-12835 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-039.txt
|
|
CVE-2020-12835 - https://www.syss.de/pentest-blog/
|
|
CVE-2020-12847 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html
|
|
CVE-2020-12847 - https://www.coresecurity.com/advisories
|
|
CVE-2020-12847 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities
|
|
CVE-2020-12848 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html
|
|
CVE-2020-12848 - https://www.coresecurity.com/advisories
|
|
CVE-2020-12848 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities
|
|
CVE-2020-12849 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html
|
|
CVE-2020-12849 - https://www.coresecurity.com/advisories
|
|
CVE-2020-12849 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities
|
|
CVE-2020-12850 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html
|
|
CVE-2020-12850 - https://www.coresecurity.com/advisories
|
|
CVE-2020-12850 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities
|
|
CVE-2020-12851 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html
|
|
CVE-2020-12851 - https://www.coresecurity.com/advisories
|
|
CVE-2020-12851 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities
|
|
CVE-2020-12852 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html
|
|
CVE-2020-12852 - https://www.coresecurity.com/advisories
|
|
CVE-2020-12852 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities
|
|
CVE-2020-12853 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html
|
|
CVE-2020-12853 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities
|
|
CVE-2020-12854 - http://packetstormsecurity.com/files/158434/SecZetta-NEProfile-3.3.11-Remote-Code-Execution.html
|
|
CVE-2020-12855 - http://packetstormsecurity.com/files/158965/SecZetta-NEProfile-3.3.11-Host-Header-Injection.html
|
|
CVE-2020-12856 - https://github.com/alwentiu/COVIDSafe-CVE-2020-12856/blob/master/README.md
|
|
CVE-2020-12861 - http://packetstormsecurity.com/files/172841/SANE-Backends-Memory-Corruption-Code-Execution.html
|
|
CVE-2020-12861 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane
|
|
CVE-2020-12862 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane
|
|
CVE-2020-12863 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane
|
|
CVE-2020-12864 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane
|
|
CVE-2020-12865 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane
|
|
CVE-2020-12866 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane
|
|
CVE-2020-12867 - https://gitlab.com/sane-project/backends/-/issues/279#issue-1-ghsl-2020-075-null-pointer-dereference-in-sanei_epson_net_read
|
|
CVE-2020-12867 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane
|
|
CVE-2020-12872 - https://medium.com/@charlielabs101/cve-2020-12872-df315411aa70
|
|
CVE-2020-12872 - https://sweet32.info/
|
|
CVE-2020-12880 - https://kb.pulsesecure.net/?atype=sa
|
|
CVE-2020-12880 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516
|
|
CVE-2020-12882 - http://packetstormsecurity.com/files/157756/Submitty-20.04.01-Cross-Site-Scripting.html
|
|
CVE-2020-12888 - https://usn.ubuntu.com/4526-1/
|
|
CVE-2020-13094 - http://packetstormsecurity.com/files/157752/Dolibarr-11.0.3-Cross-Site-Scripting.html
|
|
CVE-2020-13101 - https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=dss-x
|
|
CVE-2020-13109 - https://cturt.github.io/shogihax.html
|
|
CVE-2020-13109 - https://github.com/CTurt/shogihax
|
|
CVE-2020-13110 - https://medium.com/@kiddo_Ha3ker/dll-injection-attack-in-kerberos-npm-package-cb4b32031cd
|
|
CVE-2020-13110 - https://www.op-c.net/2020/05/15/dll-injection-attack-in-kerberos-npm-package/
|
|
CVE-2020-13117 - https://blog.0xlabs.com/2021/02/wavlink-rce-CVE-2020-13117.html
|
|
CVE-2020-13118 - http://packetstormsecurity.com/files/157733/Mikrotik-Router-Monitoring-System-1.2.3-SQL-Injection.html
|
|
CVE-2020-13118 - https://github.com/adeoluwa-adebiyi/Mikrotik-Router-Monitoring-System/issues/4
|
|
CVE-2020-13125 - https://wpvulndb.com/vulnerabilities/10214
|
|
CVE-2020-13125 - https://www.wordfence.com/blog/2020/05/combined-attack-on-elementor-pro-and-ultimate-addons-for-elementor-puts-1-million-sites-at-risk/
|
|
CVE-2020-13126 - https://wpvulndb.com/vulnerabilities/10214
|
|
CVE-2020-13126 - https://www.wordfence.com/blog/2020/05/combined-attack-on-elementor-pro-and-ultimate-addons-for-elementor-puts-1-million-sites-at-risk/
|
|
CVE-2020-1313 - http://packetstormsecurity.com/files/159305/Microsoft-Windows-Update-Orchestrator-Unchecked-ScheduleWork-Call.html
|
|
CVE-2020-13131 - https://blog.inhq.net/posts/yubico-libykpiv-vuln/
|
|
CVE-2020-13132 - https://blog.inhq.net/posts/yubico-libykpiv-vuln/
|
|
CVE-2020-13143 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=15753588bcd4bbffae1cca33c8ced5722477fe1f
|
|
CVE-2020-13143 - https://usn.ubuntu.com/4413-1/
|
|
CVE-2020-13143 - https://usn.ubuntu.com/4414-1/
|
|
CVE-2020-13143 - https://usn.ubuntu.com/4419-1/
|
|
CVE-2020-13144 - http://packetstormsecurity.com/files/157785/OpenEDX-Ironwood-2.5-Remote-Code-Execution.html
|
|
CVE-2020-13149 - https://github.com/rishaldwivedi/Public_Disclosure/blob/master/README.md#msi-dragon-center-eop
|
|
CVE-2020-13151 - http://packetstormsecurity.com/files/160106/Aerospike-Database-5.1.0.3-Remote-Command-Execution.html
|
|
CVE-2020-13151 - http://packetstormsecurity.com/files/160451/Aerospike-Database-UDF-Lua-Code-Execution.html
|
|
CVE-2020-13151 - https://b4ny4n.github.io/network-pentest/2020/08/01/cve-2020-13151-poc-aerospike.html
|
|
CVE-2020-13152 - http://packetstormsecurity.com/files/159898/Amarok-2.8.0-Denial-Of-Service.html
|
|
CVE-2020-13155 - https://www.exploit-db.com/exploits/48489
|
|
CVE-2020-13156 - https://www.exploit-db.com/exploits/48489
|
|
CVE-2020-13157 - https://www.exploit-db.com/exploits/48489
|
|
CVE-2020-13160 - http://packetstormsecurity.com/files/158291/AnyDesk-GUI-Format-String-Write.html
|
|
CVE-2020-13160 - http://packetstormsecurity.com/files/161628/AnyDesk-5.5.2-Remote-Code-Execution.html
|
|
CVE-2020-13160 - https://devel0pment.de/?p=1881
|
|
CVE-2020-13162 - http://packetstormsecurity.com/files/158117/Pulse-Secure-Client-For-Windows-Local-Privilege-Escalation.html
|
|
CVE-2020-13162 - http://packetstormsecurity.com/files/159065/Pulse-Secure-Windows-Client-Privilege-Escalation.html
|
|
CVE-2020-13162 - https://kb.pulsesecure.net/?atype=sa
|
|
CVE-2020-13162 - https://www.redtimmy.com/privilege-escalation/pulse-secure-client-for-windows-9-1-6-toctou-privilege-escalation-cve-2020-13162/
|
|
CVE-2020-13166 - http://packetstormsecurity.com/files/157808/Plesk-myLittleAdmin-ViewState-.NET-Deserialization.html
|
|
CVE-2020-13168 - https://github.com/lodestone-security/CVEs/tree/master/CVE-2020-13168
|
|
CVE-2020-13224 - http://packetstormsecurity.com/files/158115/TP-LINK-Cloud-Cameras-NCXXX-Stack-Overflow.html
|
|
CVE-2020-13225 - https://github.com/phpipam/phpipam/issues/3025
|
|
CVE-2020-13225 - https://www.youtube.com/watch?v=SpFmM03Jl40
|
|
CVE-2020-13227 - https://github.com/wrongsid3
|
|
CVE-2020-13227 - https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md
|
|
CVE-2020-13228 - http://packetstormsecurity.com/files/158062/Sysax-MultiServer-6.90-Cross-Site-Scripting.html
|
|
CVE-2020-13228 - https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md
|
|
CVE-2020-13229 - https://github.com/wrongsid3
|
|
CVE-2020-13229 - https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md
|
|
CVE-2020-13245 - https://iot-lab-fh-ooe.github.io/netgear_update_vulnerability/
|
|
CVE-2020-13247 - https://members.backbox.org/boolebox-secure-sharing-multiple-vulnerabilities/
|
|
CVE-2020-13248 - https://members.backbox.org/boolebox-secure-sharing-multiple-vulnerabilities/
|
|
CVE-2020-13252 - https://github.com/centreon/centreon/compare/19.04.13...19.04.15
|
|
CVE-2020-13254 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-13258 - https://github.com/contentful/the-example-app.py/issues/44
|
|
CVE-2020-13259 - https://cxsecurity.com/issue/WLB-2020090064
|
|
CVE-2020-13259 - https://www.exploit-db.com/exploits/48809
|
|
CVE-2020-13260 - https://cxsecurity.com/issue/WLB-2020090063
|
|
CVE-2020-13260 - https://www.exploit-db.com/exploits/48807
|
|
CVE-2020-13265 - https://gitlab.com/gitlab-org/gitlab/-/issues/121664
|
|
CVE-2020-13267 - https://gitlab.com/gitlab-org/gitlab/-/issues/211956
|
|
CVE-2020-13269 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13269.json
|
|
CVE-2020-13269 - https://gitlab.com/gitlab-org/gitlab/-/issues/216528
|
|
CVE-2020-13277 - https://gitlab.com/gitlab-org/gitlab/-/issues/220972
|
|
CVE-2020-13278 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/282
|
|
CVE-2020-13290 - https://gitlab.com/gitlab-org/gitlab/-/issues/32291
|
|
CVE-2020-13301 - https://gitlab.com/gitlab-org/gitlab/-/issues/219378
|
|
CVE-2020-13311 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13311.json
|
|
CVE-2020-13315 - https://hackerone.com/reports/463010
|
|
CVE-2020-13316 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13316.json
|
|
CVE-2020-13316 - https://gitlab.com/gitlab-org/gitlab/-/issues/220137
|
|
CVE-2020-13324 - https://gitlab.com/gitlab-org/gitlab/-/issues/24542
|
|
CVE-2020-13330 - https://gitlab.com/gitlab-org/gitlab/issues/30017
|
|
CVE-2020-13331 - https://gitlab.com/gitlab-org/gitlab/-/issues/219010
|
|
CVE-2020-13335 - https://gitlab.com/gitlab-org/gitlab/-/issues/27231
|
|
CVE-2020-13337 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13337.json
|
|
CVE-2020-13340 - https://hackerone.com/reports/950190
|
|
CVE-2020-13343 - https://hackerone.com/reports/689314
|
|
CVE-2020-13346 - https://gitlab.com/gitlab-org/gitlab/-/issues/219496
|
|
CVE-2020-13350 - https://hackerone.com/reports/415238
|
|
CVE-2020-13351 - https://gitlab.com/gitlab-org/gitlab/-/issues/239369
|
|
CVE-2020-13351 - https://hackerone.com/reports/962462
|
|
CVE-2020-1337 - http://packetstormsecurity.com/files/160028/Microsoft-Windows-Local-Spooler-Bypass.html
|
|
CVE-2020-1337 - http://packetstormsecurity.com/files/160993/Microsoft-Spooler-Local-Privilege-Elevation.html
|
|
CVE-2020-13376 - https://sidechannel.tempestsi.com/path-traversal-vulnerability-in-securenvoy-impacts-on-remote-command-execution-through-file-upload-ec2e731bd50a
|
|
CVE-2020-13377 - https://inf0seq.github.io/cve/2020/04/21/Path-Traversal-in-Enterprise-loadbalancer-VA-MAX-v8.3.8-and-earlier.html
|
|
CVE-2020-13378 - https://inf0seq.github.io/cve/2020/04/21/OS.html
|
|
CVE-2020-13379 - http://packetstormsecurity.com/files/158320/Grafana-7.0.1-Denial-Of-Service.html
|
|
CVE-2020-13379 - https://community.grafana.com/t/release-notes-v6-7-x/27119
|
|
CVE-2020-13379 - https://community.grafana.com/t/release-notes-v7-0-x/29381
|
|
CVE-2020-13379 - https://mostwanted002.cf/post/grafanados/
|
|
CVE-2020-13380 - https://packetstormsecurity.com/files/158257/openSIS-7.4-SQL-Injection.html
|
|
CVE-2020-13381 - http://packetstormsecurity.com/files/158331/openSIS-7.4-Unauthenticated-PHP-Code-Execution.html
|
|
CVE-2020-13381 - https://packetstormsecurity.com/files/158257/openSIS-7.4-SQL-Injection.html
|
|
CVE-2020-13382 - http://packetstormsecurity.com/files/158255/openSIS-7.4-Incorrect-Access-Control.html
|
|
CVE-2020-13382 - http://packetstormsecurity.com/files/158331/openSIS-7.4-Unauthenticated-PHP-Code-Execution.html
|
|
CVE-2020-13383 - http://packetstormsecurity.com/files/158256/openSIS-7.4-Local-File-Inclusion.html
|
|
CVE-2020-13383 - http://packetstormsecurity.com/files/158331/openSIS-7.4-Unauthenticated-PHP-Code-Execution.html
|
|
CVE-2020-13384 - https://www.exploit-db.com/exploits/48479
|
|
CVE-2020-13388 - https://joel-malwarebenchmark.github.io
|
|
CVE-2020-13388 - https://joel-malwarebenchmark.github.io/blog/2020/04/27/cve-2020-13388-jw-util-vulnerability/
|
|
CVE-2020-13389 - https://joel-malwarebenchmark.github.io
|
|
CVE-2020-13389 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13389-Tenda-vulnerability/
|
|
CVE-2020-13390 - https://joel-malwarebenchmark.github.io
|
|
CVE-2020-13390 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13390-Tenda-vulnerability/
|
|
CVE-2020-13391 - https://joel-malwarebenchmark.github.io
|
|
CVE-2020-13391 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13391-Tenda-vulnerability/
|
|
CVE-2020-13392 - https://joel-malwarebenchmark.github.io
|
|
CVE-2020-13392 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13392-Tenda-vulnerability/
|
|
CVE-2020-13393 - https://joel-malwarebenchmark.github.io
|
|
CVE-2020-13393 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13393-Tenda-vulnerability/
|
|
CVE-2020-13394 - https://joel-malwarebenchmark.github.io
|
|
CVE-2020-13394 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13394-Tenda-vulnerability/
|
|
CVE-2020-13396 - https://github.com/FreeRDP/FreeRDP/commit/48361c411e50826cb602c7aab773a8a20e1da6bc
|
|
CVE-2020-13396 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-13397 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-13398 - https://usn.ubuntu.com/4379-1/
|
|
CVE-2020-13404 - https://github.com/quadra-informatique/Atos-Magento/releases
|
|
CVE-2020-13404 - https://sysdream.com/news/lab/
|
|
CVE-2020-13404 - https://sysdream.com/news/lab/2020-06-09-cve-2020-13404-remote-system-command-injection-in-atos-magento-module/
|
|
CVE-2020-13412 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#cross-site-request-forgery-csrf
|
|
CVE-2020-13413 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#observable-response-discrepancy-from-api
|
|
CVE-2020-13414 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#clean-up-old-code
|
|
CVE-2020-13415 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#xml-signature-wrapping-in-saml
|
|
CVE-2020-13416 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#csrf-on-password-reset
|
|
CVE-2020-13417 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#openvpn-client-elevation-of-privilege
|
|
CVE-2020-13426 - https://0day.today/exploit/34496
|
|
CVE-2020-13426 - https://cxsecurity.com/issue/WLB-2020050235
|
|
CVE-2020-13426 - https://infayer.com/archivos/448
|
|
CVE-2020-13426 - https://packetstormsecurity.com/files/157867/WordPress-Multi-Scheduler-1.0.0-Cross-Site-Request-Forgery.html
|
|
CVE-2020-13426 - https://research-labs.net/search/exploits/wordpress-plugin-multi-scheduler-100-cross-site-request-forgery-delete-user
|
|
CVE-2020-13426 - https://www.exploit-db.com/exploits/48532
|
|
CVE-2020-13427 - https://www.exploit-db.com/exploits/48511
|
|
CVE-2020-13431 - https://blog.blazeinfosec.com/security-advisory-i2p-for-windows-local-privilege-escalation/
|
|
CVE-2020-13432 - http://hyp3rlinx.altervista.org/advisories/HFS-HTTP-FILE-SERVER-v2.3-REMOTE-BUFFER-OVERFLOW-DoS.txt
|
|
CVE-2020-13432 - http://packetstormsecurity.com/files/157980/HFS-Http-File-Server-2.3m-Build-300-Buffer-Overflow.html
|
|
CVE-2020-13432 - http://seclists.org/fulldisclosure/2020/Jun/13
|
|
CVE-2020-13432 - http://seclists.org/fulldisclosure/2021/Apr/12
|
|
CVE-2020-13432 - https://packetstormsecurity.com/files/157980/HFS-Http-File-Server-2.3m-Build-300-Buffer-Overflow.html
|
|
CVE-2020-13433 - https://news.websec.nl/news-cve-report-0.html
|
|
CVE-2020-13434 - http://seclists.org/fulldisclosure/2020/Nov/19
|
|
CVE-2020-13434 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-13434 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-13434 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-13434 - https://www.sqlite.org/src/info/23439ea582241138
|
|
CVE-2020-13435 - http://seclists.org/fulldisclosure/2020/Nov/19
|
|
CVE-2020-13435 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-13435 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-13435 - https://www.sqlite.org/src/info/7a5279a25c57adf1
|
|
CVE-2020-13438 - https://github.com/rockcarry/ffjpeg/issues/23
|
|
CVE-2020-13443 - https://gist.github.com/mariuszpoplwski/51604d8a6d7d78fffdf590c25e844e09
|
|
CVE-2020-13444 - https://issues.liferay.com/browse/LPE-17009
|
|
CVE-2020-13445 - https://issues.liferay.com/browse/LPE-17023
|
|
CVE-2020-13448 - http://packetstormsecurity.com/files/157898/QuickBox-Pro-2.1.8-Remote-Code-Execution.html
|
|
CVE-2020-13449 - http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html
|
|
CVE-2020-13450 - http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html
|
|
CVE-2020-13451 - http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html
|
|
CVE-2020-13452 - http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html
|
|
CVE-2020-13463 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf
|
|
CVE-2020-13464 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf
|
|
CVE-2020-13465 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf
|
|
CVE-2020-13466 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf
|
|
CVE-2020-13467 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf
|
|
CVE-2020-13468 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf
|
|
CVE-2020-13469 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf
|
|
CVE-2020-13470 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf
|
|
CVE-2020-13471 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf
|
|
CVE-2020-13472 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf
|
|
CVE-2020-13473 - https://cvewalkthrough.com/cve-2020-13473-nch-account-clear-text-password-storage/
|
|
CVE-2020-13473 - https://tejaspingulkar.blogspot.com/2020/12/cve-2020-13473-nch-account-clear-text.html
|
|
CVE-2020-13474 - https://cvewalkthrough.com/cve-2020-13474-nch-express-accounts-privilege-escalation/
|
|
CVE-2020-13474 - https://tejaspingulkar.blogspot.com/2020/12/cve-2020-13474-nch-express-accounts.html
|
|
CVE-2020-13476 - https://tejaspingulkar.blogspot.com/2020/12/cve-2020-13475-nch-accounts-cross-site.html
|
|
CVE-2020-13480 - http://cvewalkthrough.com/cve-2020-13480html-injection
|
|
CVE-2020-13480 - https://tejaspingulkar.blogspot.com/2020/06/cve-2020-13480-verint-html-injection.html
|
|
CVE-2020-13487 - https://www.youtube.com/watch?v=3rXP8CGTe08
|
|
CVE-2020-1349 - http://packetstormsecurity.com/files/169959/Microsoft-Outlook-2019-16.0.12624.20424-Remote-Code-Execution.html
|
|
CVE-2020-13493 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094
|
|
CVE-2020-13494 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1103
|
|
CVE-2020-13495 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1104
|
|
CVE-2020-13496 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105
|
|
CVE-2020-13497 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105
|
|
CVE-2020-13498 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105
|
|
CVE-2020-13499 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106
|
|
CVE-2020-1350 - http://packetstormsecurity.com/files/158484/SIGRed-Windows-DNS-Denial-Of-Service.html
|
|
CVE-2020-13500 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106
|
|
CVE-2020-13501 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106
|
|
CVE-2020-13504 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1108
|
|
CVE-2020-13505 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1108
|
|
CVE-2020-13509 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1110
|
|
CVE-2020-13510 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1110
|
|
CVE-2020-13511 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1110
|
|
CVE-2020-13512 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1111
|
|
CVE-2020-13513 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1111
|
|
CVE-2020-13514 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1111
|
|
CVE-2020-13515 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1112
|
|
CVE-2020-13516 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1113
|
|
CVE-2020-13517 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1114
|
|
CVE-2020-13518 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1115
|
|
CVE-2020-13519 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1116
|
|
CVE-2020-13520 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1120
|
|
CVE-2020-13522 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1121
|
|
CVE-2020-13523 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1122
|
|
CVE-2020-13524 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1125
|
|
CVE-2020-13525 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1126
|
|
CVE-2020-13526 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1126
|
|
CVE-2020-13527 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1135
|
|
CVE-2020-13528 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1136
|
|
CVE-2020-13529 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
|
|
CVE-2020-13530 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1143
|
|
CVE-2020-13531 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1145
|
|
CVE-2020-13532 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146
|
|
CVE-2020-13533 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146
|
|
CVE-2020-13534 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146
|
|
CVE-2020-13535 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1147
|
|
CVE-2020-13536 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1148
|
|
CVE-2020-13537 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1148
|
|
CVE-2020-13539 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1150
|
|
CVE-2020-13540 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1150
|
|
CVE-2020-13541 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1151
|
|
CVE-2020-13542 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1154
|
|
CVE-2020-13543 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155
|
|
CVE-2020-13543 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-13544 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1161
|
|
CVE-2020-13545 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1162
|
|
CVE-2020-13546 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1163
|
|
CVE-2020-13547 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1165
|
|
CVE-2020-13548 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1166
|
|
CVE-2020-13549 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1167
|
|
CVE-2020-13550 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1168
|
|
CVE-2020-13551 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169
|
|
CVE-2020-13552 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169
|
|
CVE-2020-13553 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169
|
|
CVE-2020-13554 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169
|
|
CVE-2020-13555 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169
|
|
CVE-2020-13556 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1170
|
|
CVE-2020-13557 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1171
|
|
CVE-2020-13558 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1172
|
|
CVE-2020-13559 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1174
|
|
CVE-2020-13560 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1175
|
|
CVE-2020-13561 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1176
|
|
CVE-2020-13562 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177
|
|
CVE-2020-13563 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177
|
|
CVE-2020-13564 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177
|
|
CVE-2020-13565 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1178
|
|
CVE-2020-13566 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179
|
|
CVE-2020-13567 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179
|
|
CVE-2020-13568 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179
|
|
CVE-2020-13569 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1180
|
|
CVE-2020-13570 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1181
|
|
CVE-2020-13571 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1182
|
|
CVE-2020-13572 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1183
|
|
CVE-2020-13573 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1184
|
|
CVE-2020-13574 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1185
|
|
CVE-2020-13575 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1186
|
|
CVE-2020-13576 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1187
|
|
CVE-2020-13577 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1188
|
|
CVE-2020-13578 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1189
|
|
CVE-2020-13579 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1190
|
|
CVE-2020-13580 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1191
|
|
CVE-2020-13581 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1192
|
|
CVE-2020-13582 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1193
|
|
CVE-2020-13583 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1194
|
|
CVE-2020-13584 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1195
|
|
CVE-2020-13585 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1196
|
|
CVE-2020-13586 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1197
|
|
CVE-2020-13587 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1198
|
|
CVE-2020-13588 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1199
|
|
CVE-2020-13589 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1199
|
|
CVE-2020-13590 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1199
|
|
CVE-2020-13591 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1200
|
|
CVE-2020-13592 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1201
|
|
CVE-2020-13596 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-13619 - https://reallinkers.github.io/CVE-2020-13619/
|
|
CVE-2020-13620 - https://lucadidomenico.medium.com/fastgate-gpon-cross-site-request-forgery-cve-2020-13620-e279f3fbaee4
|
|
CVE-2020-13620 - https://members.backbox.org/fastgate-gpon-cross-site-request-forgery/
|
|
CVE-2020-13623 - https://github.com/jerryscript-project/jerryscript/issues/3785
|
|
CVE-2020-13626 - https://medium.com/@bugsbunnyy1107/the-tell-tale-of-cve-in-oneplus-phones-91e97342a8b5
|
|
CVE-2020-13627 - https://sysdream.com/news/lab/2020-05-13-cve-2020-10946-several-cross-site-scripting-xss-vulnerabilities-in-centreon/
|
|
CVE-2020-13628 - https://sysdream.com/news/lab/2020-05-13-cve-2020-10946-several-cross-site-scripting-xss-vulnerabilities-in-centreon/
|
|
CVE-2020-13630 - http://seclists.org/fulldisclosure/2020/Nov/19
|
|
CVE-2020-13630 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-13630 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-13631 - http://seclists.org/fulldisclosure/2020/Nov/19
|
|
CVE-2020-13631 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-13631 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-13632 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-13632 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-13640 - http://www.openwall.com/lists/oss-security/2020/07/06/1
|
|
CVE-2020-13642 - https://www.wordfence.com/blog/2020/05/vulnerabilities-patched-in-page-builder-by-siteorigin-affects-over-1-million-sites/
|
|
CVE-2020-13643 - https://www.wordfence.com/blog/2020/05/vulnerabilities-patched-in-page-builder-by-siteorigin-affects-over-1-million-sites/
|
|
CVE-2020-13650 - https://know.bishopfox.com/advisories/digdash-version-2018
|
|
CVE-2020-13651 - https://know.bishopfox.com/advisories/digdash-version-2018
|
|
CVE-2020-13652 - https://know.bishopfox.com/advisories/digdash-version-2018
|
|
CVE-2020-13656 - https://know.bishopfox.com/advisories/oob-to-rce-exploitation-of-the-hobbes-functional-interpreter
|
|
CVE-2020-13658 - https://research.nccgroup.com/2020/09/25/technical-advisory-lansweeper-privilege-escalation-via-csrf-using-http-method-interchange/
|
|
CVE-2020-13660 - http://dev.cmsmadesimple.org/bug/view/12312
|
|
CVE-2020-13660 - https://www.youtube.com/watch?v=Q6RMhmpScho
|
|
CVE-2020-13661 - https://www.nagenrauft-consulting.com/blog/
|
|
CVE-2020-13693 - http://packetstormsecurity.com/files/157885/WordPress-BBPress-2.5-Privilege-Escalation.html
|
|
CVE-2020-13756 - http://packetstormsecurity.com/files/157923/Sabberworm-PHP-CSS-Code-Injection.html
|
|
CVE-2020-13756 - http://seclists.org/fulldisclosure/2020/Jun/7
|
|
CVE-2020-13757 - https://github.com/sybrenstuvel/python-rsa/issues/146
|
|
CVE-2020-13757 - https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667
|
|
CVE-2020-13758 - https://blog.deteact.com/bitrix-waf-bypass/
|
|
CVE-2020-1377 - http://packetstormsecurity.com/files/158938/Microsoft-Windows-CmpDoReDoCreateKey-Arbitrary-Registry-Key-Creation-Privilege-Escalation.html
|
|
CVE-2020-1378 - http://packetstormsecurity.com/files/158939/Microsoft-Windows-CmpDoReadTxRBigLogRecord-Memory-Corruption-Privilege-Escalation.html
|
|
CVE-2020-13788 - https://www.soluble.ai/blog/harbor-ssrf-cve-2020-13788
|
|
CVE-2020-13788 - https://www.youtube.com/watch?v=v8Isqy4yR3Q
|
|
CVE-2020-13795 - http://packetstormsecurity.com/files/157940/Navigate-CMS-2.8.7-Directory-Traversal.html
|
|
CVE-2020-13799 - https://www.westerndigital.com/support/productsecurity/wdc-20008-replay-attack-vulnerabilities-rpmb-protocol-applications
|
|
CVE-2020-1380 - http://packetstormsecurity.com/files/163056/Internet-Explorer-jscript9.dll-Memory-Corruption.html
|
|
CVE-2020-13802 - http://packetstormsecurity.com/files/159027/Rebar3-3.13.2-Command-Injection.html
|
|
CVE-2020-13802 - https://github.com/vulnbe/poc-rebar3.git
|
|
CVE-2020-13802 - https://vuln.be/post/rebar3-command-injection/
|
|
CVE-2020-13817 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-13820 - https://medium.com/@0x00crash/xss-reflected-in-extreme-management-center-8-4-1-24-cve-2020-13820-c6febe951219
|
|
CVE-2020-13822 - https://github.com/indutny/elliptic/issues/226
|
|
CVE-2020-13822 - https://medium.com/@herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4
|
|
CVE-2020-13825 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-005
|
|
CVE-2020-13826 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-006
|
|
CVE-2020-13827 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-004
|
|
CVE-2020-13828 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-002
|
|
CVE-2020-13829 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-13830 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-13831 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-13832 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-13833 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-13834 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-13835 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-13836 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-13837 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-13838 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-13850 - https://www.coresecurity.com/advisories
|
|
CVE-2020-13850 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities
|
|
CVE-2020-13851 - http://packetstormsecurity.com/files/158390/Pandora-FMS-7.0-NG-7XX-Remote-Command-Execution.html
|
|
CVE-2020-13851 - https://www.coresecurity.com/advisories
|
|
CVE-2020-13851 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities
|
|
CVE-2020-13852 - https://www.coresecurity.com/advisories
|
|
CVE-2020-13852 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities
|
|
CVE-2020-13853 - https://www.coresecurity.com/advisories
|
|
CVE-2020-13853 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities
|
|
CVE-2020-13854 - https://www.coresecurity.com/advisories
|
|
CVE-2020-13854 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities
|
|
CVE-2020-13855 - https://www.coresecurity.com/advisories
|
|
CVE-2020-13855 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities
|
|
CVE-2020-13864 - https://www.softwaresecured.com/elementor-page-builder-stored-xss/
|
|
CVE-2020-13865 - https://www.softwaresecured.com/elementor-page-builder-stored-xss/
|
|
CVE-2020-13866 - http://hyp3rlinx.altervista.org/advisories/WINGATE-INSECURE-PERMISSIONS-LOCAL-PRIVILEGE-ESCALATION.txt
|
|
CVE-2020-13866 - http://packetstormsecurity.com/files/157958/WinGate-9.4.1.5998-Insecure-Permissions-Privilege-Escalation.html
|
|
CVE-2020-13866 - http://seclists.org/fulldisclosure/2020/Jun/11
|
|
CVE-2020-13871 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-13871 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-13871 - https://www.sqlite.org/src/info/c8d3b9f0a750a529
|
|
CVE-2020-13871 - https://www.sqlite.org/src/info/cd708fa84d2aaaea
|
|
CVE-2020-13872 - http://packetstormsecurity.com/files/158000/RoyalTS-SSH-Tunnel-Authentication-Bypass.html
|
|
CVE-2020-13872 - http://seclists.org/fulldisclosure/2020/Jun/14
|
|
CVE-2020-13877 - https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/807698439/v1.8+HF+1+2+3+OnPrem+v5.3
|
|
CVE-2020-13886 - https://github.com/lucxssouza/CVE-2020-13886
|
|
CVE-2020-13890 - https://jizen0x01.blogspot.com/2020/06/neon-dashboard-xss.html
|
|
CVE-2020-13891 - https://mattermost.com/security-updates/
|
|
CVE-2020-13892 - https://wpvulndb.com/vulnerabilities/10257
|
|
CVE-2020-13895 - https://github.com/FGasper/p5-Crypt-Perl/issues/14
|
|
CVE-2020-13898 - https://github.com/merrychap/CVEs/tree/master/janus-webrtc/CVE-2020-13898
|
|
CVE-2020-13899 - https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13899
|
|
CVE-2020-13900 - https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13900
|
|
CVE-2020-13901 - https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13901
|
|
CVE-2020-13904 - https://trac.ffmpeg.org/ticket/8673
|
|
CVE-2020-13911 - https://gist.github.com/kdrypr/5dac91c2d27c4dc82b1225dffa38f7a8
|
|
CVE-2020-13920 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-13927 - http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html
|
|
CVE-2020-13927 - http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html
|
|
CVE-2020-13934 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-13934 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-13934 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-13934 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-13934 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-13935 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-13935 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-13935 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-13935 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-13935 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-13935 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-13935 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-13935 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-13936 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-13936 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-13943 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-13945 - http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html
|
|
CVE-2020-13947 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-13947 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-13949 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-13949 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-13950 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-13951 - http://packetstormsecurity.com/files/160186/Apache-OpenMeetings-5.0.0-Denial-Of-Service.html
|
|
CVE-2020-13954 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-13954 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-13954 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-13954 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-13956 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-13956 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-13956 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-13956 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-13956 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-13961 - https://github.com/strapi/strapi/pull/6599
|
|
CVE-2020-13961 - https://github.com/strapi/strapi/releases/tag/v3.0.2
|
|
CVE-2020-13965 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-13965-Cross%20Site-Scripting%20via%20Malicious%20XML%20Attachment-Roundcube
|
|
CVE-2020-13974 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae
|
|
CVE-2020-13974 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-13976 - https://svn.dd-wrt.com/ticket/7039
|
|
CVE-2020-13977 - https://anhtai.me/nagios-core-4-4-5-url-injection/
|
|
CVE-2020-13992 - https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise
|
|
CVE-2020-13993 - https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise/
|
|
CVE-2020-13994 - https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise/
|
|
CVE-2020-13995 - https://www.riverloopsecurity.com/blog/2020/09/nitf-extract75-cve-2020-13995/
|
|
CVE-2020-14000 - https://github.com/LLK/scratch-vm/pull/2476
|
|
CVE-2020-14000 - https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443
|
|
CVE-2020-14004 - http://www.openwall.com/lists/oss-security/2020/06/12/1
|
|
CVE-2020-14006 - https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894
|
|
CVE-2020-14007 - https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894
|
|
CVE-2020-14008 - http://packetstormsecurity.com/files/159066/ManageEngine-Applications-Manager-Authenticated-Remote-Code-Execution.html
|
|
CVE-2020-14008 - https://www.manageengine.com
|
|
CVE-2020-14011 - http://packetstormsecurity.com/files/158205/Lansweeper-7.2-Default-Account-Remote-Code-Execution.html
|
|
CVE-2020-14014 - https://cxsecurity.com/issue/WLB-2018090182
|
|
CVE-2020-14021 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14021-Arbitrary%20File%20Read-Ozeki%20SMS%20Gateway
|
|
CVE-2020-14022 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14022-Dangerous%20File%20Upload-Ozeki%20SMS%20Gateway
|
|
CVE-2020-14023 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14023-Server%20Side%20Request%20Forgery-Ozeki%20SMS%20Gateway
|
|
CVE-2020-14024 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14024-Multiple%20XSS-Ozeki%20SMS%20Gateway
|
|
CVE-2020-14025 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14025-Cross-Site%20Request%20Forgery-Ozeki%20SMS%20Gateway
|
|
CVE-2020-14026 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14026-Formula%20Injection-Ozeki%20SMS%20Gateway
|
|
CVE-2020-14027 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14027-MySQL%20LOAD%20DATA%20LOCAL%20INFILE%20Attack-Ozeki%20SMS%20Gateway
|
|
CVE-2020-14028 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14028-Arbitary%20File%20Write-Ozeki%20SMS%20Gateway
|
|
CVE-2020-14029 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14029-XXE-Ozeki%20SMS%20Gateway
|
|
CVE-2020-14030 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14030-RCE%20via%20.NET%20Deserialization-Ozeki%20SMS%20Gateway
|
|
CVE-2020-14031 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14031-Arbitary%20File%20Delete-Ozeki%20SMS%20Gateway
|
|
CVE-2020-14032 - https://dannyodler.medium.com/attacking-the-golden-ring-on-amd-mini-pc-b7bfb217b437
|
|
CVE-2020-14033 - https://github.com/meetecho/janus-gateway/blob/v0.10.0/plugins/janus_streaming.c#L6117
|
|
CVE-2020-14033 - https://github.com/meetecho/janus-gateway/blob/v0.10.0/plugins/janus_streaming.c#L6166
|
|
CVE-2020-14039 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-14042 - https://github.com/Codiad/Codiad/issues/1122
|
|
CVE-2020-14043 - https://github.com/Codiad/Codiad/issues/1122
|
|
CVE-2020-14044 - https://github.com/Codiad/Codiad/issues/1122
|
|
CVE-2020-14055 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191211-01_Monsta_FTP_Stored_XSS
|
|
CVE-2020-14056 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191203-02_Monsta_FTP_Server-Side_Request_Forgery
|
|
CVE-2020-14057 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191203-01_Monsta_FTP_Arbitrary_File_Read_and_Write
|
|
CVE-2020-14060 - https://github.com/FasterXML/jackson-databind/issues/2688
|
|
CVE-2020-14060 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-14060 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-14060 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-14060 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-14060 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14060 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-14061 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-14061 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-14061 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-14061 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-14061 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14061 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-14062 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-14062 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-14062 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-14062 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-14062 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14062 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-14068 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20
|
|
CVE-2020-14069 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20
|
|
CVE-2020-14070 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20
|
|
CVE-2020-14071 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20
|
|
CVE-2020-14072 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20
|
|
CVE-2020-14073 - http://packetstormsecurity.com/files/160312/PRTG-Network-Monitor-20.4.63.1412-Cross-Site-Scripting.html
|
|
CVE-2020-14092 - https://wpvulndb.com/vulnerabilities/10287
|
|
CVE-2020-14144 - http://packetstormsecurity.com/files/162122/Gitea-Git-Hooks-Remote-Code-Execution.html
|
|
CVE-2020-14144 - https://docs.gitlab.com/ee/administration/server_hooks.html
|
|
CVE-2020-14146 - https://github.com/jenaye/KumbiaPHP-
|
|
CVE-2020-14147 - https://github.com/antirez/redis/pull/6875
|
|
CVE-2020-14147 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-14152 - http://www.ijg.org/files/jpegsrc.v9d.tar.gz
|
|
CVE-2020-14153 - http://www.ijg.org/files/jpegsrc.v9d.tar.gz
|
|
CVE-2020-14153 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/445
|
|
CVE-2020-14155 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-14157 - http://packetstormsecurity.com/files/158204/ABUS-Secvest-Wireless-Control-Device-Missing-Encryption.html
|
|
CVE-2020-14157 - http://seclists.org/fulldisclosure/2020/Jun/26
|
|
CVE-2020-14157 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-014.txt
|
|
CVE-2020-14157 - https://www.youtube.com/watch?v=kCqAVYyahLc
|
|
CVE-2020-14158 - http://packetstormsecurity.com/files/158692/ABUS-Secvest-Hybrid-Module-FUMO50110-Authentication-Bypass.html
|
|
CVE-2020-14158 - http://seclists.org/fulldisclosure/2020/Jul/36
|
|
CVE-2020-14158 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-015.txt
|
|
CVE-2020-14163 - https://github.com/jerryscript-project/jerryscript/issues/3804
|
|
CVE-2020-14166 - http://packetstormsecurity.com/files/162107/Atlassian-Jira-Service-Desk-4.9.1-Cross-Site-Scripting.html
|
|
CVE-2020-14181 - http://packetstormsecurity.com/files/161730/Atlassian-JIRA-8.11.1-User-Enumeration.html
|
|
CVE-2020-14195 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-14195 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-14195 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-14195 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14195 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-14198 - https://github.com/bitcoin/bitcoin/commits/master
|
|
CVE-2020-14201 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-011
|
|
CVE-2020-14208 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-008
|
|
CVE-2020-14209 - http://packetstormsecurity.com/files/161955/Dolibarr-ERP-CRM-11.0.4-Bypass-Code-Execution.html
|
|
CVE-2020-14209 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-012
|
|
CVE-2020-14293 - http://seclists.org/fulldisclosure/2020/Sep/51
|
|
CVE-2020-14293 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-025.txt
|
|
CVE-2020-14293 - https://www.syss.de/pentest-blog/syss-2020-024-und-syss-2020-025-zwei-schwachstellen-in-file-transfer-loesung-von-qiata
|
|
CVE-2020-14294 - http://seclists.org/fulldisclosure/2020/Sep/50
|
|
CVE-2020-14294 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-024.txt
|
|
CVE-2020-14294 - https://www.syss.de/pentest-blog/syss-2020-024-und-syss-2020-025-zwei-schwachstellen-in-file-transfer-loesung-von-qiata
|
|
CVE-2020-14295 - http://packetstormsecurity.com/files/162384/Cacti-1.2.12-SQL-Injection-Remote-Code-Execution.html
|
|
CVE-2020-14295 - http://packetstormsecurity.com/files/162918/Cacti-1.2.12-SQL-Injection-Remote-Command-Execution.html
|
|
CVE-2020-14314 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1
|
|
CVE-2020-14315 - https://www.openwall.com/lists/oss-security/2020/07/09/2
|
|
CVE-2020-14315 - https://www.x41-dsec.de/lab/advisories/x41-2020-006-bspatch/
|
|
CVE-2020-14331 - https://www.openwall.com/lists/oss-security/2020/07/28/2
|
|
CVE-2020-14335 - https://access.redhat.com/errata/RHSA-2021:1313
|
|
CVE-2020-14340 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-14340 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-14343 - https://github.com/yaml/pyyaml/issues/420
|
|
CVE-2020-14343 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-14343 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-14354 - https://packetstormsecurity.com/files/158755/GS20200804145053.txt
|
|
CVE-2020-14356 - https://usn.ubuntu.com/4526-1/
|
|
CVE-2020-14363 - https://github.com/Ruia-ruia/Exploits/blob/master/DFX11details.txt
|
|
CVE-2020-14372 - https://bugzilla.redhat.com/show_bug.cgi?id=1873150
|
|
CVE-2020-14373 - https://bugs.ghostscript.com/show_bug.cgi?id=702851
|
|
CVE-2020-14375 - https://bugzilla.redhat.com/show_bug.cgi?id=1879468
|
|
CVE-2020-14381 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254
|
|
CVE-2020-14385 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933
|
|
CVE-2020-14386 - http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html
|
|
CVE-2020-14386 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14386
|
|
CVE-2020-14386 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06
|
|
CVE-2020-14387 - https://bugzilla.redhat.com/show_bug.cgi?id=1875549
|
|
CVE-2020-14392 - https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643
|
|
CVE-2020-14393 - https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643
|
|
CVE-2020-14408 - https://github.com/agentejo/cockpit/issues/1310
|
|
CVE-2020-14409 - https://bugzilla.libsdl.org/show_bug.cgi?id=5200
|
|
CVE-2020-14410 - https://bugzilla.libsdl.org/show_bug.cgi?id=5200
|
|
CVE-2020-14416 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.16
|
|
CVE-2020-14416 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ace17d56824165c7f4c68785d6b58971db954dd
|
|
CVE-2020-14418 - https://labs.nettitude.com/blog/cve-2020-14418-madcodehook-library-local-privilege-escalation/
|
|
CVE-2020-14421 - http://packetstormsecurity.com/files/159575/aaPanel-6.6.6-Privilege-Escalation.html
|
|
CVE-2020-14421 - https://forum.aapanel.com
|
|
CVE-2020-14421 - https://github.com/jenaye/aapanel
|
|
CVE-2020-14422 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-14425 - http://packetstormsecurity.com/files/159784/Foxit-Reader-9.7.1-Remote-Command-Execution.html
|
|
CVE-2020-14425 - https://www.exploit-db.com/exploits/48982
|
|
CVE-2020-14428 - https://kb.netgear.com/000061936/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0044
|
|
CVE-2020-14429 - https://kb.netgear.com/000061938/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0050
|
|
CVE-2020-14431 - https://kb.netgear.com/000061944/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0068
|
|
CVE-2020-14439 - https://kb.netgear.com/000061942/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0064
|
|
CVE-2020-14444 - https://cybersecurityworks.com/zerodays/cve-2020-14444-wso2.html
|
|
CVE-2020-14445 - https://cybersecurityworks.com/zerodays/cve-2020-14445-wso2.html
|
|
CVE-2020-14446 - https://cybersecurityworks.com/zerodays/cve-2020-14446-wso2.html
|
|
CVE-2020-14447 - https://mattermost.com/security-updates/
|
|
CVE-2020-14448 - https://mattermost.com/security-updates/
|
|
CVE-2020-14449 - https://mattermost.com/security-updates/
|
|
CVE-2020-14450 - https://mattermost.com/security-updates/
|
|
CVE-2020-14451 - https://mattermost.com/security-updates/
|
|
CVE-2020-14452 - https://mattermost.com/security-updates/
|
|
CVE-2020-14453 - https://mattermost.com/security-updates/
|
|
CVE-2020-14454 - https://mattermost.com/security-updates/
|
|
CVE-2020-14455 - https://mattermost.com/security-updates/
|
|
CVE-2020-14456 - https://mattermost.com/security-updates/
|
|
CVE-2020-14457 - https://mattermost.com/security-updates/
|
|
CVE-2020-14458 - https://mattermost.com/security-updates/
|
|
CVE-2020-14459 - https://mattermost.com/security-updates/
|
|
CVE-2020-14460 - https://mattermost.com/security-updates/
|
|
CVE-2020-14461 - http://packetstormsecurity.com/files/158428/Zyxel-Armor-X1-WAP6806-Directory-Traversal.html
|
|
CVE-2020-14473 - https://github.com/Cossack9989/Vulns/blob/master/IoT/CVE-2020-14473.md
|
|
CVE-2020-14474 - http://packetstormsecurity.com/files/158254/Cellebrite-EPR-Decryption-Hardcoded-AES-Key-Material.html
|
|
CVE-2020-14474 - http://seclists.org/fulldisclosure/2020/Jun/31
|
|
CVE-2020-14474 - https://korelogic.com/Resources/Advisories/KL-001-2020-003.txt
|
|
CVE-2020-14527 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14528 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14529 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14530 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14531 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14532 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14533 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14534 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14535 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14536 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14537 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14539 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14540 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14541 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14542 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14543 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14544 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14545 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14546 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14547 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14548 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14549 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14550 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14551 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14552 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14553 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14554 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14555 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14556 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14557 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14558 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14559 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14560 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14561 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14562 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14563 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14564 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14565 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14566 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14567 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14568 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14569 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14570 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14571 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14572 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14573 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-14573 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14574 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14575 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14576 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14577 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14578 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-14578 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14579 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-14579 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14580 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14581 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-14581 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14582 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14583 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14584 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14585 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14586 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14587 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14588 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14589 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14590 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14591 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14592 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14593 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14594 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14595 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14596 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14597 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14598 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14599 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14600 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14601 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14602 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14603 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14604 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14605 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14606 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14607 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14608 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14609 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14610 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14611 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14612 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14613 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14614 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14615 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14616 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14617 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14618 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14619 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14620 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14621 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-14621 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14622 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14623 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14624 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14625 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14626 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14627 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14628 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14629 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14630 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14631 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14632 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14633 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14634 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14635 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14636 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14637 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14638 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14639 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-1464 - https://krebsonsecurity.com/2020/08/microsoft-put-off-fixing-zero-day-for-2-years/
|
|
CVE-2020-1464 - https://medium.com/@TalBeerySec/glueball-the-story-of-cve-2020-1464-50091a1f98bd
|
|
CVE-2020-14640 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14641 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14642 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14643 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14644 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14645 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14646 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14647 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14648 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14649 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14650 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14651 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14652 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14653 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14654 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14655 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14656 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14657 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14658 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14659 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14660 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14661 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14662 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14663 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14664 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14665 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14666 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14667 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14668 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14669 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14670 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14671 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14672 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14673 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14674 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14675 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14676 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14677 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14678 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14679 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14680 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14681 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14682 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14684 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14685 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14686 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14687 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14688 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14690 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14691 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14692 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14693 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14694 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14695 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14696 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14697 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14698 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14699 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14700 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14701 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14702 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14703 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14704 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14705 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14706 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14707 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14708 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14709 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14710 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14711 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14712 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14713 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14714 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14715 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14716 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14717 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14718 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14719 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-1472 - http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
|
|
CVE-2020-1472 - http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html
|
|
CVE-2020-1472 - https://usn.ubuntu.com/4559-1/
|
|
CVE-2020-1472 - https://www.kb.cert.org/vuls/id/490028
|
|
CVE-2020-1472 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-14720 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14721 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14722 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14723 - https://cybersecurityworks.com/zerodays/cve-2020-14723-oracle.html
|
|
CVE-2020-14723 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14724 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14725 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-14731 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14732 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14734 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14735 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14736 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14740 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14741 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14742 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14743 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14744 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14745 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14746 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14750 - http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html
|
|
CVE-2020-14752 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14753 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14754 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14756 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-14756 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-14757 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14758 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14759 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14760 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14761 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14762 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14763 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14764 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14765 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14766 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14767 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14768 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14769 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14770 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14771 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14772 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14773 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14774 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14775 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14776 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14777 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14778 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14779 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14780 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14781 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14782 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14783 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14784 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14785 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14786 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14787 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14788 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14789 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14790 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14791 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14792 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14793 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14794 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14795 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14796 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14797 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14798 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14799 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14800 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14801 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14802 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14803 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-14803 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14804 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14805 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14806 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14807 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14808 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14809 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14810 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14811 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14812 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14813 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14814 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14815 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14816 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14817 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14818 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14819 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14820 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14821 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14822 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14823 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14824 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14825 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14826 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14827 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14828 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14829 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14830 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14831 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14832 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14833 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14834 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14835 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14836 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14837 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14838 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14839 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14840 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14841 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14842 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14843 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14844 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14845 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14846 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14847 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14848 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14849 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14850 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14851 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14852 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14853 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14854 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14855 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14856 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14857 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14858 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14859 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14860 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14861 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14862 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14863 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14864 - http://packetstormsecurity.com/files/159748/Oracle-Business-Intelligence-Enterprise-Edition-5.5.0.0.0-12.2.1.3.0-12.2.1.4.0-LFI.html
|
|
CVE-2020-14864 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14865 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14866 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14867 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14868 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14869 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14870 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14871 - http://packetstormsecurity.com/files/159961/SunSSH-Solaris-10-x86-Remote-Root.html
|
|
CVE-2020-14871 - http://packetstormsecurity.com/files/160510/Solaris-SunSSH-11.0-x86-libpam-Remote-Root.html
|
|
CVE-2020-14871 - http://packetstormsecurity.com/files/160609/Oracle-Solaris-SunSSH-PAM-parse_user_name-Buffer-Overflow.html
|
|
CVE-2020-14871 - http://packetstormsecurity.com/files/163232/Solaris-SunSSH-11.0-Remote-Root.html
|
|
CVE-2020-14871 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14872 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14873 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14875 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14876 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14877 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14878 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14879 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14880 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14881 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14882 - http://packetstormsecurity.com/files/159769/Oracle-WebLogic-Server-Remote-Code-Execution.html
|
|
CVE-2020-14882 - http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html
|
|
CVE-2020-14882 - http://packetstormsecurity.com/files/161128/Oracle-WebLogic-Server-12.2.1.0-Remote-Code-Execution.html
|
|
CVE-2020-14882 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14883 - http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html
|
|
CVE-2020-14883 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14884 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14885 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14886 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14887 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14888 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14889 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14890 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14891 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14892 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14893 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14894 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14895 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14896 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14897 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14898 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14899 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14900 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14901 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-14928 - https://bugzilla.suse.com/show_bug.cgi?id=1173910
|
|
CVE-2020-1493 - http://packetstormsecurity.com/files/169960/Microsoft-Outlook-2019-16.0.12624.20424-Out-Of-Bounds-Read.html
|
|
CVE-2020-14930 - https://www.exploit-db.com/exploits/48196
|
|
CVE-2020-14930 - https://www.pentest.com.tr/exploits/CTROMS-Terminal-OS-Port-Portal-Password-Reset-Authentication-Bypass.html
|
|
CVE-2020-14931 - https://github.com/jaygreig86/dmitry/issues/4
|
|
CVE-2020-14938 - https://bugs.freedroid.org/b/issue951
|
|
CVE-2020-14939 - https://bugs.freedroid.org/b/issue953
|
|
CVE-2020-14940 - https://sourceforge.net/p/tuxguitar/bugs/126/
|
|
CVE-2020-14943 - http://packetstormsecurity.com/files/158217/BSA-Radar-1.6.7234.24750-Cross-Site-Scripting.html
|
|
CVE-2020-14943 - https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14943%20-%20Stored%20XSS.md
|
|
CVE-2020-14943 - https://www.exploit-db.com/exploits/48619
|
|
CVE-2020-14944 - http://packetstormsecurity.com/files/158372/BSA-Radar-1.6.7234.24750-Cross-Site-Request-Forgery.html
|
|
CVE-2020-14944 - https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14944%20-%20Access%20Control%20Vulnerabilities.md
|
|
CVE-2020-14945 - https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14945%20-%20Privilege%20Escalation.md
|
|
CVE-2020-14945 - https://www.exploit-db.com/exploits/48649
|
|
CVE-2020-14946 - http://packetstormsecurity.com/files/158420/BSA-Radar-1.6.7234.24750-Local-File-Inclusion.html
|
|
CVE-2020-14946 - https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14946%20-%20Local%20File%20Inclusion.md
|
|
CVE-2020-14947 - http://packetstormsecurity.com/files/158293/OCS-Inventory-NG-2.7-Remote-Code-Execution.html
|
|
CVE-2020-14950 - https://github.com/jenaye/aapanel
|
|
CVE-2020-14959 - https://wpvulndb.com/vulnerabilities/10223
|
|
CVE-2020-14960 - https://www.exploit-db.com/exploits/48487
|
|
CVE-2020-14962 - https://wpvulndb.com/vulnerabilities/10241
|
|
CVE-2020-14966 - https://github.com/kjur/jsrsasign/issues/437
|
|
CVE-2020-14967 - https://github.com/kjur/jsrsasign/issues/439
|
|
CVE-2020-14968 - https://github.com/kjur/jsrsasign/issues/438
|
|
CVE-2020-14972 - https://www.exploit-db.com/exploits/48439
|
|
CVE-2020-14973 - https://packetstormsecurity.com/files/157608/WebTareas-2.0p8-Cross-Site-Scripting.html
|
|
CVE-2020-14979 - https://posts.specterops.io/cve-2020-14979-local-privilege-escalation-in-evga-precisionx1-cf63c6b95896
|
|
CVE-2020-14980 - http://packetstormsecurity.com/files/158322/Sophos-Secure-Email-Android-Application-3.9.4-Man-In-The-Middle.html
|
|
CVE-2020-14981 - http://packetstormsecurity.com/files/158323/VIPRE-Password-Vault-1.100.1090-Man-In-The-Middle.html
|
|
CVE-2020-14982 - https://www.mindpointgroup.com/blog/webta-sqli-vulnerability/
|
|
CVE-2020-14983 - https://github.com/chocolate-doom/chocolate-doom/issues/1293
|
|
CVE-2020-14990 - https://daniels-it-blog.blogspot.com/2020/06/arbitrary-file-deletion-in-iobit.html
|
|
CVE-2020-14990 - https://github.com/Daniel-itsec/AdvancedSystemCare
|
|
CVE-2020-14993 - https://github.com/dexterone/Vigor-poc
|
|
CVE-2020-15002 - https://seclists.org/fulldisclosure/2020/Oct/20
|
|
CVE-2020-15003 - https://seclists.org/fulldisclosure/2020/Oct/20
|
|
CVE-2020-15004 - https://seclists.org/fulldisclosure/2020/Oct/20
|
|
CVE-2020-15012 - https://support.sonatype.com/hc/en-us/articles/360051068253
|
|
CVE-2020-15014 - https://github.com/pramodmahato/BlogCMS/issues/1
|
|
CVE-2020-15020 - http://hidden-one.co.in/2020/07/07/cve-2020-1020-stored-xss-on-elementor-wordpress-plugin/
|
|
CVE-2020-15023 - https://medium.com/csg-govtech/bolstering-security-how-i-breached-a-wifi-mesh-access-point-from-close-proximity-to-uncover-f8f77dc3cd5d
|
|
CVE-2020-15023 - https://www.askey.com.tw/Products/wifi.html
|
|
CVE-2020-15023 - https://www.askey.com.tw/incident_report_notifications.html
|
|
CVE-2020-15025 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-15027 - https://slagle.tech/2020/07/06/cve-2020-15027/
|
|
CVE-2020-15038 - http://packetstormsecurity.com/files/158649/WordPress-Maintenance-Mode-By-SeedProd-5.1.1-Cross-Site-Scripting.html
|
|
CVE-2020-15038 - https://wpvulndb.com/vulnerabilities/10283
|
|
CVE-2020-15046 - http://packetstormsecurity.com/files/158373/SuperMicro-IPMI-03.40-Cross-Site-Request-Forgery.html
|
|
CVE-2020-15050 - http://packetstormsecurity.com/files/158576/Bio-Star-2.8.2-Local-File-Inclusion.html
|
|
CVE-2020-15069 - https://community.sophos.com/b/security-blog/posts/advisory-buffer-overflow-vulnerability-in-user-portal
|
|
CVE-2020-15078 - https://community.openvpn.net/openvpn/wiki/CVE-2020-15078
|
|
CVE-2020-15103 - https://usn.ubuntu.com/4481-1/
|
|
CVE-2020-15117 - https://github.com/symless/synergy-core/security/advisories/GHSA-chfm-333q-gfpp
|
|
CVE-2020-15123 - https://github.com/advisories/GHSA-5q88-cjfq-g2mh
|
|
CVE-2020-15135 - https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f
|
|
CVE-2020-15135 - https://www.npmjs.com/package/save-server
|
|
CVE-2020-15149 - http://packetstormsecurity.com/files/159560/NodeBB-Forum-1.14.2-Account-Takeover.html
|
|
CVE-2020-15149 - https://zeroauth.ltd/blog/2020/08/20/proof-of-concept-exploit-for-cve-2020-15149-nodebb-arbitrary-user-password-change/
|
|
CVE-2020-15152 - https://www.npmjs.com/package/ftp-srv
|
|
CVE-2020-15160 - http://packetstormsecurity.com/files/162140/PrestaShop-1.7.6.7-SQL-Injection.html
|
|
CVE-2020-15180 - https://www.percona.com/blog/2020/10/30/cve-2020-15180-affects-percona-xtradb-cluster/
|
|
CVE-2020-15182 - https://youtu.be/ffvKH3gwyRE
|
|
CVE-2020-15188 - https://www.youtube.com/watch?v=zAE4Swjc-GU&feature=youtu.be
|
|
CVE-2020-15189 - https://youtu.be/FWIDFNXmr9g
|
|
CVE-2020-15209 - https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8
|
|
CVE-2020-15226 - https://github.com/glpi-project/glpi/security/advisories/GHSA-jwpv-7m4h-5gvc
|
|
CVE-2020-15228 - http://packetstormsecurity.com/files/159794/GitHub-Widespread-Injection.html
|
|
CVE-2020-15238 - http://packetstormsecurity.com/files/159740/Blueman-Local-Root-Privilege-Escalation.html
|
|
CVE-2020-15238 - https://bugs.launchpad.net/ubuntu/+source/blueman/+bug/1897287
|
|
CVE-2020-15246 - https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4
|
|
CVE-2020-15249 - https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4
|
|
CVE-2020-15250 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-15253 - https://www.exploit-db.com/exploits/48792
|
|
CVE-2020-15255 - http://packetstormsecurity.com/files/159996/Anuko-Time-Tracker-1.19.23.5325-CSV-Injection.html
|
|
CVE-2020-15255 - https://www.exploit-db.com/exploits/49027
|
|
CVE-2020-15261 - http://packetstormsecurity.com/files/162873/Veyon-4.4.1-Unquoted-Service-Path.html
|
|
CVE-2020-15261 - https://github.com/veyon/veyon/issues/657
|
|
CVE-2020-15261 - https://www.exploit-db.com/exploits/48246
|
|
CVE-2020-15261 - https://www.exploit-db.com/exploits/49925
|
|
CVE-2020-15266 - https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845
|
|
CVE-2020-15300 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-009
|
|
CVE-2020-15301 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-010
|
|
CVE-2020-15302 - https://blog.openzeppelin.com/argent-vulnerability-report/
|
|
CVE-2020-15304 - https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md
|
|
CVE-2020-15305 - https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md
|
|
CVE-2020-15306 - https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md
|
|
CVE-2020-15307 - https://www2.deloitte.com/de/de/pages/risk/articles/nozomi-stored-xss.html?nc=1
|
|
CVE-2020-15308 - https://code610.blogspot.com/2020/06/postauth-sqli-in-sitracker-v367-p2.html
|
|
CVE-2020-15350 - https://github.com/RIOT-OS/RIOT/pull/14400
|
|
CVE-2020-15351 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-004.md
|
|
CVE-2020-15352 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
|
|
CVE-2020-15357 - https://medium.com/csg-govtech/bolstering-security-how-i-breached-a-wifi-mesh-access-point-from-close-proximity-to-uncover-f8f77dc3cd5d
|
|
CVE-2020-15357 - https://starlabs.sg/advisories/
|
|
CVE-2020-15357 - https://www.askey.com.tw/incident_report_notifications.html
|
|
CVE-2020-15358 - http://seclists.org/fulldisclosure/2020/Nov/19
|
|
CVE-2020-15358 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-15358 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-15358 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-15358 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-15358 - https://www.sqlite.org/src/tktview?name=8f157e8010
|
|
CVE-2020-15360 - https://docs.docker.com/docker-for-windows/release-notes/
|
|
CVE-2020-15360 - https://whitehatck01.blogspot.com/2020/06/dockers-latest-version-of-privilege.html
|
|
CVE-2020-15363 - http://packetstormsecurity.com/files/158510/WordPress-NexosReal-Estate-Theme-1.7-Cross-Site-Scripting-SQL-Injection.html
|
|
CVE-2020-15364 - http://packetstormsecurity.com/files/158510/WordPress-NexosReal-Estate-Theme-1.7-Cross-Site-Scripting-SQL-Injection.html
|
|
CVE-2020-15365 - https://github.com/LibRaw/LibRaw/issues/301
|
|
CVE-2020-15367 - https://github.com/inflixim4be/CVE-2020-15367
|
|
CVE-2020-15368 - https://codetector.org/post/asrock_rgb_driver/
|
|
CVE-2020-15368 - https://github.com/stong/CVE-2020-15368?tab=readme-ov-file
|
|
CVE-2020-15389 - https://github.com/uclouvain/openjpeg/issues/1261
|
|
CVE-2020-15389 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-15389 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-15392 - https://github.com/inflixim4be/CVE-2020-15392
|
|
CVE-2020-15393 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=28ebeb8db77035e058a510ce9bd17c2b9a009dba
|
|
CVE-2020-15394 - https://www.manageengine.com
|
|
CVE-2020-15395 - https://sourceforge.net/p/mediainfo/bugs/1127/
|
|
CVE-2020-15396 - https://bugzilla.suse.com/show_bug.cgi?id=1173521
|
|
CVE-2020-15397 - https://bugzilla.suse.com/show_bug.cgi?id=1173519
|
|
CVE-2020-15401 - http://daniels-it-blog.blogspot.com/2020/06/when-your-anti-virus-turns-against-you.html
|
|
CVE-2020-15408 - https://kb.pulsesecure.net/?atype=sa
|
|
CVE-2020-15408 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516
|
|
CVE-2020-15415 - https://github.com/CLP-team/Vigor-Commond-Injection
|
|
CVE-2020-15468 - https://www.exploit-db.com/exploits/48190
|
|
CVE-2020-15470 - https://github.com/rockcarry/ffjpeg/issues/26
|
|
CVE-2020-15487 - https://labs.f-secure.com/advisories/redesk-v2-3-multiple-issues/
|
|
CVE-2020-15488 - https://labs.f-secure.com/advisories/redesk-v2-3-multiple-issues/
|
|
CVE-2020-15492 - http://packetstormsecurity.com/files/158556/INNEO-Startup-TOOLS-2018-M040-13.0.70.3804-Remote-Code-Execution.html
|
|
CVE-2020-15492 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-028.txt
|
|
CVE-2020-15492 - https://www.syss.de/pentest-blog/2020/syss-2020-028-sicherheitsschwachstelle-in-inneo-startup-tools-2017-und-2018/
|
|
CVE-2020-15498 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=27440
|
|
CVE-2020-15499 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=27440
|
|
CVE-2020-15500 - http://packetstormsecurity.com/files/162193/Tileserver-gl-3.0.0-Cross-Site-Scripting.html
|
|
CVE-2020-15504 - https://community.sophos.com/b/security-blog/posts/advisory-resolved-rce-via-sqli-cve-2020-15504
|
|
CVE-2020-15505 - http://packetstormsecurity.com/files/161097/MobileIron-MDM-Hessian-Based-Java-Deserialization-Remote-Code-Execution.html
|
|
CVE-2020-15505 - https://perchsecurity.com/perch-news/cve-spotlight-mobileiron-rce-cve-2020-15505/
|
|
CVE-2020-15518 - https://zwclose.github.io/veeamon
|
|
CVE-2020-15521 - https://www.manageengine.com
|
|
CVE-2020-15528 - http://daniels-it-blog.blogspot.com/2020/07/gog-galaxy-escalation-of-privileges.html
|
|
CVE-2020-15529 - http://daniels-it-blog.blogspot.com/2020/07/gog-galaxy-escalation-of-privileges.html
|
|
CVE-2020-15530 - http://daniels-it-blog.blogspot.com/2020/07/steam-arbitrary-code-execution-part-2.html
|
|
CVE-2020-15531 - https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/silabs_efr32_extadv_rce.py
|
|
CVE-2020-15531 - https://www.youtube.com/watch?v=saoTr1NwdzM
|
|
CVE-2020-15532 - https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/silabs_efr32_extadv_dos.py
|
|
CVE-2020-15533 - https://www.manageengine.com
|
|
CVE-2020-15535 - https://packetstormsecurity.com/files/157118/WordPress-Car-Rental-System-1.3-Cross-Site-Scripting.html
|
|
CVE-2020-15535 - https://wpvulndb.com/vulnerabilities/10172
|
|
CVE-2020-15536 - https://packetstormsecurity.com/files/157116/WordPress-Hotel-Booking-System-Pro-1.1-Cross-Site-Scripting.html
|
|
CVE-2020-15536 - https://wpvulndb.com/vulnerabilities/10171
|
|
CVE-2020-15537 - https://cxsecurity.com/issue/WLB-2020040032
|
|
CVE-2020-15537 - https://packetstormsecurity.com/files/157099/Vanguard-2.1-Cross-Site-Scripting.html
|
|
CVE-2020-15538 - https://cxsecurity.com/issue/WLB-2020060011
|
|
CVE-2020-15538 - https://packetstormsecurity.com/files/157886/We-Com-Municipality-Portal-CMS-2.1.x-Cross-Site-Scripting-SQL-Injection.html
|
|
CVE-2020-15539 - https://cxsecurity.com/issue/WLB-2020060011
|
|
CVE-2020-15539 - https://packetstormsecurity.com/files/157886/We-Com-Municipality-Portal-CMS-2.1.x-Cross-Site-Scripting-SQL-Injection.html
|
|
CVE-2020-15540 - https://cxsecurity.com/issue/WLB-2020060010
|
|
CVE-2020-15540 - https://packetstormsecurity.com/files/157887/We-Com-OpenData-CMS-2.0-SQL-Injection.html
|
|
CVE-2020-15570 - https://github.com/sungjungk/whoopsie_killer2/blob/master/README.md
|
|
CVE-2020-15570 - https://github.com/sungjungk/whoopsie_killer2/blob/master/whoopsie_killer2.py
|
|
CVE-2020-15570 - https://www.youtube.com/watch?v=oZXGwC7PWYE
|
|
CVE-2020-15577 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-15578 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-15579 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-15580 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-15581 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-15582 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-15583 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-15584 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-15586 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-15590 - https://github.com/sickcodes
|
|
CVE-2020-15598 - http://packetstormsecurity.com/files/159185/ModSecurity-3.0.x-Denial-Of-Service.html
|
|
CVE-2020-15598 - http://seclists.org/fulldisclosure/2020/Sep/32
|
|
CVE-2020-15598 - https://coreruleset.org/20200914/cve-2020-15598/
|
|
CVE-2020-15599 - https://www.exploit-db.com/exploits/48626
|
|
CVE-2020-15600 - http://packetstormsecurity.com/files/158455/CMSUno-1.6-Cross-Site-Request-Forgery.html
|
|
CVE-2020-15600 - https://github.com/boiteasite/cmsuno/issues/15
|
|
CVE-2020-15636 - https://kb.netgear.com/000062128/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-R6700v3-PSV-2020-0224
|
|
CVE-2020-15643 - https://www.tenable.com/security/research/tra-2020-56
|
|
CVE-2020-15644 - https://www.tenable.com/security/research/tra-2020-56
|
|
CVE-2020-15645 - https://www.tenable.com/security/research/tra-2020-56
|
|
CVE-2020-15647 - https://bugzilla.mozilla.org/show_bug.cgi?id=1647078
|
|
CVE-2020-15650 - https://bugzilla.mozilla.org/show_bug.cgi?id=1652360
|
|
CVE-2020-15655 - https://bugzilla.mozilla.org/show_bug.cgi?id=1645204
|
|
CVE-2020-15657 - https://bugzilla.mozilla.org/show_bug.cgi?id=1644954
|
|
CVE-2020-15663 - https://bugzilla.mozilla.org/show_bug.cgi?id=1643199
|
|
CVE-2020-15667 - https://bugzilla.mozilla.org/show_bug.cgi?id=1653371
|
|
CVE-2020-15676 - https://bugzilla.mozilla.org/show_bug.cgi?id=1646140
|
|
CVE-2020-15677 - https://bugzilla.mozilla.org/show_bug.cgi?id=1641487
|
|
CVE-2020-15680 - https://bugzilla.mozilla.org/show_bug.cgi?id=1658881
|
|
CVE-2020-15682 - https://bugzilla.mozilla.org/show_bug.cgi?id=1636654
|
|
CVE-2020-15685 - https://bugzilla.mozilla.org/show_bug.cgi?id=1622640
|
|
CVE-2020-15688 - http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html
|
|
CVE-2020-15690 - http://www.openwall.com/lists/oss-security/2021/02/04/3
|
|
CVE-2020-15690 - https://consensys.net/diligence/vulnerabilities/nim-asyncftpd-crlf-injection/
|
|
CVE-2020-15690 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2020-15690
|
|
CVE-2020-15692 - http://www.openwall.com/lists/oss-security/2021/02/04/1
|
|
CVE-2020-15692 - https://consensys.net/diligence/vulnerabilities/nim-browsers-argument-injection/
|
|
CVE-2020-15693 - http://www.openwall.com/lists/oss-security/2021/02/04/2
|
|
CVE-2020-15693 - https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/
|
|
CVE-2020-15694 - http://www.openwall.com/lists/oss-security/2021/02/04/2
|
|
CVE-2020-15694 - https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/
|
|
CVE-2020-15716 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291
|
|
CVE-2020-15717 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291
|
|
CVE-2020-15718 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291
|
|
CVE-2020-15719 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365
|
|
CVE-2020-15719 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-15721 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291
|
|
CVE-2020-15744 - https://www.bitdefender.com/blog/labs/cracking-the-victure-pc420-camera
|
|
CVE-2020-15780 - http://www.openwall.com/lists/oss-security/2020/07/20/7
|
|
CVE-2020-15780 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7
|
|
CVE-2020-15780 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354
|
|
CVE-2020-15780 - https://usn.ubuntu.com/4426-1/
|
|
CVE-2020-15780 - https://www.openwall.com/lists/oss-security/2020/06/15/3
|
|
CVE-2020-15797 - https://www.siemens-healthineers.com/support-documentation/security-advisory
|
|
CVE-2020-15803 - https://support.zabbix.com/browse/ZBX-18057
|
|
CVE-2020-15806 - https://www.tenable.com/security/research/tra-2020-46
|
|
CVE-2020-15807 - https://github.com/LibreDWG/libredwg/issues/186
|
|
CVE-2020-15807 - https://github.com/LibreDWG/libredwg/issues/189
|
|
CVE-2020-15807 - https://github.com/LibreDWG/libredwg/issues/190
|
|
CVE-2020-15816 - https://www.westerndigital.com/support/productsecurity/wdc-20005-wd-discovery-remote-command-execution-vulnerability
|
|
CVE-2020-15824 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-15824 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-15839 - https://issues.liferay.com/browse/LPE-17029
|
|
CVE-2020-15839 - https://issues.liferay.com/browse/LPE-17055
|
|
CVE-2020-15840 - https://issues.liferay.com/browse/LPE-17046
|
|
CVE-2020-15841 - https://issues.liferay.com/browse/LPE-16928
|
|
CVE-2020-15842 - https://issues.liferay.com/browse/LPE-16963
|
|
CVE-2020-15843 - https://blog.to.com/advisory-actfax-7-10-build-0335-privilege-escalation-cve-2020-15843/
|
|
CVE-2020-15849 - https://labs.f-secure.com/advisories/redesk-v2-3-multiple-issues/
|
|
CVE-2020-15850 - https://labs.f-secure.com/advisories/nakivo-backup-and-replication-multiple-vulnerabilities
|
|
CVE-2020-15851 - https://labs.f-secure.com/advisories/nakivo-backup-and-replication-multiple-vulnerabilities
|
|
CVE-2020-15858 - http://packetstormsecurity.com/files/171978/Telit-Cinterion-IoT-Traversal-Escalation-Bypass-Heap-Overflow.html
|
|
CVE-2020-15858 - http://seclists.org/fulldisclosure/2023/Apr/11
|
|
CVE-2020-15860 - https://www.coresecurity.com/core-labs/advisories/parallels-ras-os-command-execution
|
|
CVE-2020-15862 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965166
|
|
CVE-2020-15863 - https://git.qemu.org/?p=qemu.git;a=commitdiff;h=5519724a13664b43e225ca05351c60b4468e4555
|
|
CVE-2020-15864 - https://www.quali.com/products/cloudshell-pro/
|
|
CVE-2020-15866 - https://github.com/mruby/mruby/issues/5042
|
|
CVE-2020-15867 - http://packetstormsecurity.com/files/162123/Gogs-Git-Hooks-Remote-Code-Execution.html
|
|
CVE-2020-15868 - https://support.sonatype.com/hc/en-us/articles/360052192533
|
|
CVE-2020-15869 - https://support.sonatype.com
|
|
CVE-2020-15869 - https://support.sonatype.com/hc/en-us/articles/360051424554
|
|
CVE-2020-15870 - https://support.sonatype.com
|
|
CVE-2020-15870 - https://support.sonatype.com/hc/en-us/articles/360051424754
|
|
CVE-2020-15871 - https://hackerone.com/reports/917843
|
|
CVE-2020-15871 - https://support.sonatype.com
|
|
CVE-2020-15871 - https://support.sonatype.com/hc/en-us/articles/360052192693
|
|
CVE-2020-15873 - https://research.loginsoft.com/bugs/blind-sql-injection-in-librenms/
|
|
CVE-2020-15877 - https://shielder.it/blog
|
|
CVE-2020-15881 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3
|
|
CVE-2020-15882 - https://github.com/munkireport/munkireport-php/releases
|
|
CVE-2020-15882 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3
|
|
CVE-2020-15883 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3
|
|
CVE-2020-15884 - https://github.com/munkireport/munkireport-php/releases
|
|
CVE-2020-15884 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3
|
|
CVE-2020-15885 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3
|
|
CVE-2020-15886 - https://github.com/munkireport/munkireport-php/releases
|
|
CVE-2020-15886 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3
|
|
CVE-2020-15887 - https://github.com/munkireport/munkireport-php/releases
|
|
CVE-2020-15887 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3
|
|
CVE-2020-15888 - http://lua-users.org/lists/lua-l/2020-07/msg00053.html
|
|
CVE-2020-15888 - http://lua-users.org/lists/lua-l/2020-07/msg00054.html
|
|
CVE-2020-15888 - http://lua-users.org/lists/lua-l/2020-07/msg00071.html
|
|
CVE-2020-15888 - http://lua-users.org/lists/lua-l/2020-07/msg00079.html
|
|
CVE-2020-15889 - http://lua-users.org/lists/lua-l/2020-07/msg00078.html
|
|
CVE-2020-15890 - https://github.com/LuaJIT/LuaJIT/issues/601
|
|
CVE-2020-15893 - https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/
|
|
CVE-2020-15894 - https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/
|
|
CVE-2020-15895 - https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/
|
|
CVE-2020-15896 - https://research.loginsoft.com/bugs/authentication-bypass-in-d-link-firmware-dap-1522/
|
|
CVE-2020-15906 - http://packetstormsecurity.com/files/159663/Tiki-Wiki-CMS-Groupware-21.1-Authentication-Bypass.html
|
|
CVE-2020-15912 - https://www.youtube.com/watch?v=VYKsfgox-bs
|
|
CVE-2020-15912 - https://www.youtube.com/watch?v=kQWg-Ywv3S4
|
|
CVE-2020-15912 - https://www.youtube.com/watch?v=nn-_3AbtEkI
|
|
CVE-2020-15918 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html
|
|
CVE-2020-15919 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html
|
|
CVE-2020-15920 - http://packetstormsecurity.com/files/158991/Mida-eFramework-2.9.0-Remote-Code-Execution.html
|
|
CVE-2020-15920 - http://packetstormsecurity.com/files/159194/Mida-Solutions-eFramework-ajaxreq.php-Command-Injection.html
|
|
CVE-2020-15920 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html
|
|
CVE-2020-15921 - http://packetstormsecurity.com/files/159239/Mida-eFramework-2.9.0-Backdoor-Access.html
|
|
CVE-2020-15921 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html
|
|
CVE-2020-15922 - http://packetstormsecurity.com/files/159314/Mida-eFramework-2.8.9-Remote-Code-Execution.html
|
|
CVE-2020-15922 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html
|
|
CVE-2020-15923 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html
|
|
CVE-2020-15924 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html
|
|
CVE-2020-15927 - https://www.manageengine.com
|
|
CVE-2020-15928 - https://www.exploit-db.com/exploits/49078
|
|
CVE-2020-15929 - https://www.exploit-db.com/exploits/49077
|
|
CVE-2020-15930 - http://packetstormsecurity.com/files/159316/Joplin-1.0.245-Cross-Site-Scripting-Code-Execution.html
|
|
CVE-2020-15930 - https://github.com/laurent22/joplin/issues/3552
|
|
CVE-2020-15930 - https://github.com/laurent22/joplin/releases/tag/v1.1.4
|
|
CVE-2020-15931 - https://www.optiv.com/explore-optiv-insights/source-zero/netwrix-account-lockout-examiner-41-disclosure-vulnerability
|
|
CVE-2020-15932 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-005.md
|
|
CVE-2020-15936 - https://fortiguard.com/advisory/FG-IR-20-091
|
|
CVE-2020-15943 - http://packetstormsecurity.com/files/158751/Gantt-Chart-For-Jira-5.5.3-Missing-Privilege-Check.html
|
|
CVE-2020-15943 - http://seclists.org/fulldisclosure/2020/Aug/0
|
|
CVE-2020-15943 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-029.txt
|
|
CVE-2020-15944 - http://packetstormsecurity.com/files/158752/Gantt-Chart-For-Jira-5.5.4-Cross-Site-Scripting.html
|
|
CVE-2020-15944 - http://seclists.org/fulldisclosure/2020/Aug/1
|
|
CVE-2020-15944 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-030.txt
|
|
CVE-2020-15945 - http://lua-users.org/lists/lua-l/2020-07/msg00123.html
|
|
CVE-2020-15948 - http://packetstormsecurity.com/files/163687/eGain-Chat-15.5.5-Cross-Site-Scripting.html
|
|
CVE-2020-15949 - https://labs.bishopfox.com/advisories
|
|
CVE-2020-15949 - https://labs.bishopfox.com/advisories/immuta-version-2.8.2
|
|
CVE-2020-15950 - https://labs.bishopfox.com/advisories
|
|
CVE-2020-15950 - https://labs.bishopfox.com/advisories/immuta-version-2.8.2
|
|
CVE-2020-15951 - https://labs.bishopfox.com/advisories
|
|
CVE-2020-15951 - https://labs.bishopfox.com/advisories/immuta-version-2.8.2
|
|
CVE-2020-15952 - https://labs.bishopfox.com/advisories
|
|
CVE-2020-15952 - https://labs.bishopfox.com/advisories/immuta-version-2.8.2
|
|
CVE-2020-15956 - http://packetstormsecurity.com/files/158771/ACTi-NVR3-Standard-Professional-Server-3.0.12.42-Denial-Of-Service.html
|
|
CVE-2020-15956 - https://github.com/megamagnus/cve-2020-15956
|
|
CVE-2020-15957 - https://github.com/DP-3T/dp3t-sdk-backend/security/advisories/GHSA-5m5q-3qw2-3xf3
|
|
CVE-2020-15958 - http://packetstormsecurity.com/files/159193/1CRM-8.6.7-Insecure-Direct-Object-Reference.html
|
|
CVE-2020-15958 - http://seclists.org/fulldisclosure/2020/Sep/31
|
|
CVE-2020-15972 - http://packetstormsecurity.com/files/172842/Chrome-Renderer-Remote-Code-Execution.html
|
|
CVE-2020-15999 - https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html
|
|
CVE-2020-16009 - http://packetstormsecurity.com/files/159974/Chrome-V8-Turbofan-Type-Confusion.html
|
|
CVE-2020-16011 - http://packetstormsecurity.com/files/159975/Chrome-ConvertToJavaBitmap-Heap-Buffer-Overflow.html
|
|
CVE-2020-16024 - http://packetstormsecurity.com/files/161353/Chrome-SkBitmapOperations-UnPreMultiply-Heap-Buffer-Overflow.html
|
|
CVE-2020-16025 - http://packetstormsecurity.com/files/161354/Chrome-ClipboardWin-WriteBitmap-Heap-Buffer-Overflow.html
|
|
CVE-2020-16040 - http://packetstormsecurity.com/files/162087/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html
|
|
CVE-2020-16040 - http://packetstormsecurity.com/files/162106/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html
|
|
CVE-2020-16040 - http://packetstormsecurity.com/files/162144/Google-Chrome-SimplfiedLowering-Integer-Overflow.html
|
|
CVE-2020-16041 - http://packetstormsecurity.com/files/161581/Chrome-DataElement-Out-Of-Bounds-Read.html
|
|
CVE-2020-16094 - https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4313
|
|
CVE-2020-16116 - https://kde.org/info/security/advisory-20200730-1.txt
|
|
CVE-2020-16119 - https://launchpad.net/bugs/1883840
|
|
CVE-2020-16125 - https://gitlab.gnome.org/GNOME/gdm/-/issues/642
|
|
CVE-2020-16126 - https://securitylab.github.com/advisories/GHSL-2020-187-accountsservice-drop-privs-DOS
|
|
CVE-2020-16127 - https://securitylab.github.com/advisories/GHSL-2020-187-accountsservice-drop-privs-DOS
|
|
CVE-2020-16134 - https://www.swisscom.ch
|
|
CVE-2020-16135 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-16137 - https://packetstormsecurity.com/files/158818/Cisco-7937G-Privilege-Escalation.html
|
|
CVE-2020-16138 - https://packetstormsecurity.com/files/158819/Cisco-7937G-Denial-Of-Service.html
|
|
CVE-2020-16139 - http://packetstormsecurity.com/files/158819/Cisco-7937G-Denial-Of-Service.html
|
|
CVE-2020-16140 - https://cybersecurityworks.com/zerodays/cve-2020-16140-thembay.html
|
|
CVE-2020-16142 - https://medium.com/@reliable_lait_mouse_975/mercedes-comand-infotainment-improper-format-strings-handling-4c67063d744e
|
|
CVE-2020-16143 - https://github.com/haiwen/seafile-client/issues/1309
|
|
CVE-2020-16147 - https://podalirius.net/cves/2020-16147/
|
|
CVE-2020-16147 - https://podalirius.net/en/cves/2020-16147/
|
|
CVE-2020-16148 - https://podalirius.net/cves/2020-16148/
|
|
CVE-2020-16148 - https://podalirius.net/en/cves/2020-16148/
|
|
CVE-2020-16152 - http://packetstormsecurity.com/files/164957/Aerohive-NetConfig-10.0r8a-Local-File-Inclusion-Remote-Code-Execution.html
|
|
CVE-2020-16154 - https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
|
|
CVE-2020-16155 - https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
|
|
CVE-2020-16156 - https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
|
|
CVE-2020-16157 - http://packetstormsecurity.com/files/158992/Nagios-Log-Server-2.1.6-Cross-Site-Scripting.html
|
|
CVE-2020-16158 - https://blog.inhq.net/posts/gopro-gpmf-parser-vuln-1/
|
|
CVE-2020-16159 - https://blog.inhq.net/posts/gopro-gpmf-parser-vuln-1/
|
|
CVE-2020-16160 - https://blog.inhq.net/posts/gopro-gpmf-parser-vuln-1/
|
|
CVE-2020-16161 - https://blog.inhq.net/posts/gopro-gpmf-parser-vuln-1/
|
|
CVE-2020-16166 - https://arxiv.org/pdf/2012.07432.pdf
|
|
CVE-2020-16166 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c51f8f88d705e06bd696d7510aff22b33eb8e638
|
|
CVE-2020-16166 - https://usn.ubuntu.com/4526-1/
|
|
CVE-2020-16166 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-16167 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/
|
|
CVE-2020-16168 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/
|
|
CVE-2020-16169 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/
|
|
CVE-2020-16170 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/
|
|
CVE-2020-16171 - http://seclists.org/fulldisclosure/2020/Sep/33
|
|
CVE-2020-16194 - https://github.com/login-securite/CVE/blob/main/CVE-2020-16194.md
|
|
CVE-2020-16204 - http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html
|
|
CVE-2020-16204 - http://seclists.org/fulldisclosure/2020/Sep/6
|
|
CVE-2020-16205 - http://packetstormsecurity.com/files/158888/Geutebruck-testaction.cgi-Remote-Command-Execution.html
|
|
CVE-2020-16206 - http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html
|
|
CVE-2020-16206 - http://seclists.org/fulldisclosure/2020/Sep/6
|
|
CVE-2020-16208 - http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html
|
|
CVE-2020-16208 - http://seclists.org/fulldisclosure/2020/Sep/6
|
|
CVE-2020-16210 - http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html
|
|
CVE-2020-16210 - http://seclists.org/fulldisclosure/2020/Sep/6
|
|
CVE-2020-16250 - http://packetstormsecurity.com/files/159478/Hashicorp-Vault-AWS-IAM-Integration-Authentication-Bypass.html
|
|
CVE-2020-16251 - http://packetstormsecurity.com/files/159479/Hashicorp-Vault-GCP-IAM-Integration-Authentication-Bypass.html
|
|
CVE-2020-16256 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4
|
|
CVE-2020-16257 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4
|
|
CVE-2020-16258 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4
|
|
CVE-2020-16259 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4
|
|
CVE-2020-16260 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4
|
|
CVE-2020-16261 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4
|
|
CVE-2020-16262 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4
|
|
CVE-2020-16263 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4
|
|
CVE-2020-16266 - https://mantisbt.org/bugs/view.php?id=27056
|
|
CVE-2020-16267 - https://www.manageengine.com
|
|
CVE-2020-16269 - https://github.com/radareorg/radare2/issues/17383
|
|
CVE-2020-16270 - https://github.com/Security-AVS/CVE-2020-16270
|
|
CVE-2020-16271 - https://danzinger.wien/exploiting-keepassrpc/
|
|
CVE-2020-16271 - https://forum.kee.pm/t/a-critical-security-update-for-keepassrpc-is-available/3040
|
|
CVE-2020-16272 - https://danzinger.wien/exploiting-keepassrpc/
|
|
CVE-2020-16272 - https://forum.kee.pm/t/a-critical-security-update-for-keepassrpc-is-available/3040
|
|
CVE-2020-16287 - https://bugs.ghostscript.com/show_bug.cgi?id=701785
|
|
CVE-2020-16288 - https://bugs.ghostscript.com/show_bug.cgi?id=701791
|
|
CVE-2020-16289 - https://bugs.ghostscript.com/show_bug.cgi?id=701788
|
|
CVE-2020-16290 - https://bugs.ghostscript.com/show_bug.cgi?id=701786
|
|
CVE-2020-16291 - https://bugs.ghostscript.com/show_bug.cgi?id=701787
|
|
CVE-2020-16292 - https://bugs.ghostscript.com/show_bug.cgi?id=701793
|
|
CVE-2020-16293 - https://bugs.ghostscript.com/show_bug.cgi?id=701795
|
|
CVE-2020-16294 - https://bugs.ghostscript.com/show_bug.cgi?id=701794
|
|
CVE-2020-16295 - https://bugs.ghostscript.com/show_bug.cgi?id=701796
|
|
CVE-2020-16296 - https://bugs.ghostscript.com/show_bug.cgi?id=701792
|
|
CVE-2020-16297 - https://bugs.ghostscript.com/show_bug.cgi?id=701800
|
|
CVE-2020-16298 - https://bugs.ghostscript.com/show_bug.cgi?id=701799
|
|
CVE-2020-16299 - https://bugs.ghostscript.com/show_bug.cgi?id=701801
|
|
CVE-2020-16300 - https://bugs.ghostscript.com/show_bug.cgi?id=701807
|
|
CVE-2020-16301 - https://bugs.ghostscript.com/show_bug.cgi?id=701808
|
|
CVE-2020-16302 - https://bugs.ghostscript.com/show_bug.cgi?id=701815
|
|
CVE-2020-16303 - https://bugs.ghostscript.com/show_bug.cgi?id=701818
|
|
CVE-2020-16304 - https://bugs.ghostscript.com/show_bug.cgi?id=701816
|
|
CVE-2020-16305 - https://bugs.ghostscript.com/show_bug.cgi?id=701819
|
|
CVE-2020-16306 - https://bugs.ghostscript.com/show_bug.cgi?id=701821
|
|
CVE-2020-16307 - https://bugs.ghostscript.com/show_bug.cgi?id=701822
|
|
CVE-2020-16308 - https://bugs.ghostscript.com/show_bug.cgi?id=701829
|
|
CVE-2020-16309 - https://bugs.ghostscript.com/show_bug.cgi?id=701827
|
|
CVE-2020-16310 - https://bugs.ghostscript.com/show_bug.cgi?id=701828
|
|
CVE-2020-1639 - https://kb.juniper.net/
|
|
CVE-2020-1652 - https://kb.juniper.net/
|
|
CVE-2020-16587 - https://github.com/AcademySoftwareFoundation/openexr/issues/491
|
|
CVE-2020-16588 - https://github.com/AcademySoftwareFoundation/openexr/issues/493
|
|
CVE-2020-16589 - https://github.com/AcademySoftwareFoundation/openexr/issues/494
|
|
CVE-2020-16590 - https://sourceware.org/bugzilla/show_bug.cgi?id=25821
|
|
CVE-2020-16591 - https://sourceware.org/bugzilla/show_bug.cgi?id=25822
|
|
CVE-2020-16592 - https://sourceware.org/bugzilla/show_bug.cgi?id=25823
|
|
CVE-2020-16593 - https://sourceware.org/bugzilla/show_bug.cgi?id=25827
|
|
CVE-2020-16599 - https://sourceware.org/bugzilla/show_bug.cgi?id=25842
|
|
CVE-2020-16600 - https://bugs.ghostscript.com/show_bug.cgi?id=702253
|
|
CVE-2020-16602 - http://packetstormsecurity.com/files/160225/Razer-Chroma-SDK-Server-3.16.02-Race-Condition.html
|
|
CVE-2020-16602 - https://www.angelystor.com/2020/09/cve-2020-16602-remote-file-execution-on.html
|
|
CVE-2020-16602 - https://www.youtube.com/watch?v=fkESBVhIdIA
|
|
CVE-2020-16608 - https://sghosh2402.medium.com/cve-2020-16608-8cdad9f4d9b4
|
|
CVE-2020-16630 - https://www.usenix.org/system/files/sec20-zhang-yue.pdf
|
|
CVE-2020-1667 - https://kb.juniper.net/
|
|
CVE-2020-1670 - https://kb.juniper.net/
|
|
CVE-2020-16843 - https://github.com/firecracker-microvm/firecracker/issues/2057
|
|
CVE-2020-16845 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-16846 - http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html
|
|
CVE-2020-16846 - https://github.com/saltstack/salt/releases
|
|
CVE-2020-16849 - https://blog.scadafence.com/vulnerability-report-cve-2020-16849
|
|
CVE-2020-16850 - https://blog.scadafence.com/vulnerability-in-mitsubishi-electric-melsec-iq-r-series
|
|
CVE-2020-16875 - http://packetstormsecurity.com/files/159210/Microsoft-Exchange-Server-DlpUtils-AddTenantDlpPolicy-Remote-Code-Execution.html
|
|
CVE-2020-1693 - https://zeroauth.ltd/blog/2020/02/18/proof-of-concept-exploit-for-cve-2020-1693-spacewalk/
|
|
CVE-2020-16947 - http://packetstormsecurity.com/files/169961/Microsoft-Outlook-2019-16.0.13231.20262-Remote-Code-Execution.html
|
|
CVE-2020-16952 - http://packetstormsecurity.com/files/159612/Microsoft-SharePoint-SSI-ViewState-Remote-Code-Execution.html
|
|
CVE-2020-16984 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1128
|
|
CVE-2020-16985 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1130
|
|
CVE-2020-16990 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1089
|
|
CVE-2020-16991 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1090
|
|
CVE-2020-1700 - https://usn.ubuntu.com/4304-1/
|
|
CVE-2020-1711 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1711
|
|
CVE-2020-17113 - http://packetstormsecurity.com/files/160054/Microsoft-Windows-WindowsCodecsRaw-CCanonRawImageRep-GetNamedWhiteBalances-Out-Of-Bounds-Read.html
|
|
CVE-2020-1721 - https://bugzilla.redhat.com/show_bug.cgi?id=1777579
|
|
CVE-2020-1730 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-1731 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1731
|
|
CVE-2020-1735 - https://github.com/ansible/ansible/issues/67793
|
|
CVE-2020-17352 - https://community.sophos.com/b/security-blog
|
|
CVE-2020-17352 - https://community.sophos.com/b/security-blog/posts/advisory-resolved-authenticated-rce-issues-in-user-portal-cve-2020-17352
|
|
CVE-2020-17354 - https://phabricator.wikimedia.org/T259210
|
|
CVE-2020-17360 - http://seclists.org/fulldisclosure/2020/Aug/8
|
|
CVE-2020-17360 - http://seclists.org/fulldisclosure/2020/Sep/11
|
|
CVE-2020-17360 - http://seclists.org/fulldisclosure/2020/Sep/13
|
|
CVE-2020-17360 - http://seclists.org/fulldisclosure/2020/Sep/14
|
|
CVE-2020-17361 - http://seclists.org/fulldisclosure/2020/Aug/10
|
|
CVE-2020-17361 - http://seclists.org/fulldisclosure/2020/Sep/11
|
|
CVE-2020-17361 - http://seclists.org/fulldisclosure/2020/Sep/13
|
|
CVE-2020-17361 - http://seclists.org/fulldisclosure/2020/Sep/14
|
|
CVE-2020-17364 - https://sysdream.com/news/lab/
|
|
CVE-2020-17365 - https://cymptom.com/cve-2020-17365-hotspot-shield-vpn-new-privilege-escalation-vulnerability/2020/10/
|
|
CVE-2020-17367 - https://github.com/netblue30/firejail
|
|
CVE-2020-17368 - https://github.com/netblue30/firejail/
|
|
CVE-2020-17372 - http://packetstormsecurity.com/files/158847/SugarCRM-Cross-Site-Scripting.html
|
|
CVE-2020-17372 - http://seclists.org/fulldisclosure/2020/Aug/7
|
|
CVE-2020-17373 - http://packetstormsecurity.com/files/158848/SugarCRM-SQL-Injection.html
|
|
CVE-2020-17373 - http://seclists.org/fulldisclosure/2020/Aug/9
|
|
CVE-2020-17381 - https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-17381.md
|
|
CVE-2020-17381 - https://github.com/an0ry/advisories/blob/main/CVE-2020-17381.md
|
|
CVE-2020-17382 - http://packetstormsecurity.com/files/159315/MSI-Ambient-Link-Driver-1.0.0.8-Privilege-Escalation.html
|
|
CVE-2020-17382 - https://www.coresecurity.com/core-labs/advisories/msi-ambient-link-multiple-vulnerabilities
|
|
CVE-2020-17448 - https://github.com/VijayT007/Vulnerability-Database/blob/master/Telegram-CVE-2020-17448
|
|
CVE-2020-17449 - https://sec-consult.com/en/blog/advisories/multiple-cross-site-scripting-xss-vulnerabilities-in-php-fusion-cms/
|
|
CVE-2020-1745 - https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/
|
|
CVE-2020-1745 - https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487
|
|
CVE-2020-17450 - https://sec-consult.com/en/blog/advisories/multiple-cross-site-scripting-xss-vulnerabilities-in-php-fusion-cms/
|
|
CVE-2020-17451 - https://lists.openwall.net/full-disclosure/2020/08/07/1
|
|
CVE-2020-17451 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-flatcore-cms/
|
|
CVE-2020-17452 - https://lists.openwall.net/full-disclosure/2020/08/07/1
|
|
CVE-2020-17452 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-flatcore-cms/
|
|
CVE-2020-17453 - https://github.com/JHHAX/CVE-2020-17453-PoC
|
|
CVE-2020-17456 - http://packetstormsecurity.com/files/158933/Seowon-SlC-130-Router-Remote-Code-Execution.html
|
|
CVE-2020-17456 - http://packetstormsecurity.com/files/166273/Seowon-SLR-120-Router-Remote-Code-Execution.html
|
|
CVE-2020-17456 - https://github.com/TAPESH-TEAM/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated
|
|
CVE-2020-17456 - https://www.exploit-db.com/exploits/50821
|
|
CVE-2020-17457 - https://www.gruppotim.it/redteam
|
|
CVE-2020-17458 - https://www.gruppotim.it/redteam
|
|
CVE-2020-17462 - https://www.exploit-db.com/exploits/48742
|
|
CVE-2020-17463 - http://packetstormsecurity.com/files/158840/Fuel-CMS-1.4.7-SQL-Injection.html
|
|
CVE-2020-17466 - https://cxsecurity.com/issue/WLB-2020080046
|
|
CVE-2020-1747 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-17473 - https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8131/zkteco-facedepot-7b-10213-and-zkbiosecurity-server-10020190723-long-lasting-token-vulnerability
|
|
CVE-2020-17479 - https://blog.sonatype.com/cve-2020-17479
|
|
CVE-2020-17479 - https://github.com/manvel-khnkoyan/jpv/issues/10
|
|
CVE-2020-17487 - https://github.com/radareorg/radare2/issues/17431
|
|
CVE-2020-17496 - https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/
|
|
CVE-2020-17498 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-17505 - http://packetstormsecurity.com/files/159267/Artica-Proxy-4.30.000000-Authentication-Bypass-Command-Injection.html
|
|
CVE-2020-17506 - http://packetstormsecurity.com/files/158868/Artica-Proxy-4.3.0-Authentication-Bypass.html
|
|
CVE-2020-17506 - http://packetstormsecurity.com/files/159267/Artica-Proxy-4.30.000000-Authentication-Bypass-Command-Injection.html
|
|
CVE-2020-17519 - http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html
|
|
CVE-2020-17521 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-17521 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-17521 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-17521 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-17521 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-17521 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-17521 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-17527 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-17527 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-17527 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-17527 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-1753 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1753
|
|
CVE-2020-17530 - http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html
|
|
CVE-2020-17530 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-17530 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-17530 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-17530 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-17530 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-17530 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-17538 - https://bugs.ghostscript.com/show_bug.cgi?id=701792
|
|
CVE-2020-17541 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
|
|
CVE-2020-1757 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1757
|
|
CVE-2020-17752 - https://github.com/hellowuzekai/blockchains/blob/master/balance.md
|
|
CVE-2020-17753 - https://etherscan.io/address/0x340DbA127F099DAB9DC8599C75b16e44D9b02Fdb
|
|
CVE-2020-17753 - https://etherscan.io/address/0x5a50C7D96fC68ea2F0bEE06D86CD971c31F85604
|
|
CVE-2020-17753 - https://etherscan.io/address/0xD7aA007C3e7ab454FFE3E20F0b28F926Db295477
|
|
CVE-2020-1790 - http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-01-gauss-en
|
|
CVE-2020-17901 - https://github.com/AvaterXXX/PbootCMS/blob/master/CSRF.md
|
|
CVE-2020-17952 - https://github.com/twothink/twothink/issues/1
|
|
CVE-2020-18020 - https://gitee.com/koyshe/phpshe/issues/IQ8S8
|
|
CVE-2020-18065 - https://github.com/PopojiCMS/PopojiCMS/issues/16
|
|
CVE-2020-18077 - https://github.com/cve-vul/vul/blob/master/FTPShell/FTPShell_Server_6.83_DOS.md
|
|
CVE-2020-18084 - https://github.com/yzmcms/yzmcms/issues/9
|
|
CVE-2020-18114 - https://blog.csdn.net/qq_36093477/article/details/86681178
|
|
CVE-2020-18116 - https://blog.csdn.net/qq_36093477/article/details/98035255
|
|
CVE-2020-18121 - https://github.com/Indexhibit/indexhibit/issues/17
|
|
CVE-2020-18123 - https://github.com/Indexhibit/indexhibit/issues/18
|
|
CVE-2020-18124 - https://github.com/Indexhibit/indexhibit/issues/19
|
|
CVE-2020-18126 - https://github.com/Indexhibit/indexhibit/issues/21
|
|
CVE-2020-18127 - https://github.com/Indexhibit/indexhibit/issues/22
|
|
CVE-2020-18155 - https://github.com/intelliants/subrion/issues/817
|
|
CVE-2020-18157 - https://github.com/je6k/ctf-challenges/blob/master/poc.txt
|
|
CVE-2020-18158 - https://www.cnblogs.com/echod/articles/10380909.html
|
|
CVE-2020-18175 - https://github.com/sword1991912/metinfo/issues/1
|
|
CVE-2020-18184 - https://github.com/pluxml/PluXml/issues/320
|
|
CVE-2020-18185 - https://github.com/pluxml/PluXml/issues/321
|
|
CVE-2020-18195 - https://github.com/pluck-cms/pluck/issues/69
|
|
CVE-2020-18198 - https://github.com/pluck-cms/pluck/issues/69
|
|
CVE-2020-18215 - https://gitee.com/koyshe/phpshe/issues/ITLK2
|
|
CVE-2020-18215 - https://github.com/lemon666/vuln/blob/master/Phpshe1.7_sql1.md
|
|
CVE-2020-18221 - https://github.com/typora/typora-issues/issues/2204
|
|
CVE-2020-18259 - https://github.com/chilin89117/ED01-CMS/issues/1
|
|
CVE-2020-18261 - https://github.com/chilin89117/ED01-CMS/issues/2
|
|
CVE-2020-18265 - https://github.com/github123abc123/bird/issues/1
|
|
CVE-2020-18268 - https://github.com/zblogcn/zblogphp/issues/209
|
|
CVE-2020-18305 - https://gist.github.com/yasinyilmaz/1fe3fe58dd275edb77dcbe890fce2f2c
|
|
CVE-2020-18324 - https://github.com/hamm0nz/CVE-2020-18324
|
|
CVE-2020-18325 - https://github.com/hamm0nz/CVE-2020-18325
|
|
CVE-2020-18326 - https://github.com/hamm0nz/CVE-2020-18326
|
|
CVE-2020-18327 - https://gist.github.com/paatui/a3c7ca8cf12594b437d3854f13d76cb8
|
|
CVE-2020-18378 - https://github.com/WebAssembly/binaryen/issues/1900
|
|
CVE-2020-18382 - https://github.com/WebAssembly/binaryen/issues/1900
|
|
CVE-2020-18395 - http://lists.gnu.org/archive/html/bug-gama/2019-04/msg00001.html
|
|
CVE-2020-18404 - https://github.com/source-hunter/espcms/issues/1
|
|
CVE-2020-18409 - https://github.com/xwlrbh/Catfish/issues/5
|
|
CVE-2020-18410 - https://github.com/GodEpic/chaojicms/issues/6
|
|
CVE-2020-18413 - https://github.com/GodEpic/chaojicms/issues/5
|
|
CVE-2020-18414 - https://github.com/GodEpic/chaojicms/issues/3
|
|
CVE-2020-18416 - https://github.com/dtorp06/jymusic/issues/1
|
|
CVE-2020-18418 - https://github.com/GodEpic/Vulnerability-detection/blob/master/feifeicms/FeiFeiCMS_4.1_csrf.doc
|
|
CVE-2020-18418 - https://github.com/GodEpic/Vulnerability-detection/blob/master/feifeicms/poc
|
|
CVE-2020-18442 - https://github.com/gdraheim/zziplib/issues/68
|
|
CVE-2020-18454 - https://github.com/hillerlin/bycms/issues/1
|
|
CVE-2020-18457 - https://github.com/hillerlin/bycms/issues/3
|
|
CVE-2020-18458 - https://github.com/AutismJH/damicms/issues/5
|
|
CVE-2020-18463 - https://github.com/Richard1266/aikcms/issues/2
|
|
CVE-2020-18464 - https://github.com/Richard1266/aikcms/issues/2
|
|
CVE-2020-18467 - https://github.com/bigtreecms/BigTree-CMS/issues/364
|
|
CVE-2020-18568 - https://gist.github.com/WinMin/5b2bc43b517503472bb28a298981ed5a
|
|
CVE-2020-18568 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2020-18648 - https://github.com/GodEpic/JuQingCMS/issues/1
|
|
CVE-2020-18651 - https://gitlab.freedesktop.org/libopenraw/exempi/issues/13
|
|
CVE-2020-18652 - https://gitlab.freedesktop.org/libopenraw/exempi/issues/12
|
|
CVE-2020-18654 - https://github.com/wuzhicms/wuzhicms/issues/174
|
|
CVE-2020-18668 - https://www.seebug.org/vuldb/ssvid-97996
|
|
CVE-2020-18694 - https://github.com/ignitedcms/ignitedcms/issues/5
|
|
CVE-2020-18723 - http://packetstormsecurity.com/files/161332/Alt-N-MDaemon-Webmail-20.0.0-Cross-Site-Scripting.html
|
|
CVE-2020-18724 - http://packetstormsecurity.com/files/161332/Alt-N-MDaemon-Webmail-20.0.0-Cross-Site-Scripting.html
|
|
CVE-2020-18734 - https://github.com/eclipse-cyclonedds/cyclonedds
|
|
CVE-2020-18734 - https://github.com/eclipse-cyclonedds/cyclonedds/issues/476
|
|
CVE-2020-18735 - https://github.com/eclipse-cyclonedds/cyclonedds
|
|
CVE-2020-18735 - https://github.com/eclipse-cyclonedds/cyclonedds/issues/501
|
|
CVE-2020-18737 - https://github.com/typora/typora-issues/issues/2289
|
|
CVE-2020-18746 - https://github.com/kk98kk0/exploit/issues/3
|
|
CVE-2020-18748 - https://github.com/typora
|
|
CVE-2020-18753 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_start-stop.md
|
|
CVE-2020-18754 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_leak.md
|
|
CVE-2020-18756 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_read.md
|
|
CVE-2020-18757 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_DOS.md
|
|
CVE-2020-18758 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_upload.md
|
|
CVE-2020-18759 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_leak2.md
|
|
CVE-2020-18766 - https://github.com/AntSwordProject/antSword/issues/147
|
|
CVE-2020-18770 - https://github.com/gdraheim/zziplib/issues/69
|
|
CVE-2020-18771 - https://github.com/Exiv2/exiv2/issues/756
|
|
CVE-2020-18773 - https://github.com/Exiv2/exiv2/issues/760
|
|
CVE-2020-18774 - https://github.com/Exiv2/exiv2/issues/759
|
|
CVE-2020-18775 - https://bugzilla.libav.org/show_bug.cgi?id=1152
|
|
CVE-2020-18776 - https://bugzilla.libav.org/show_bug.cgi?id=1153
|
|
CVE-2020-18778 - https://bugzilla.libav.org/show_bug.cgi?id=1155
|
|
CVE-2020-18781 - https://github.com/mpruett/audiofile/issues/56
|
|
CVE-2020-18831 - https://github.com/Exiv2/exiv2/issues/828
|
|
CVE-2020-18839 - https://gitlab.freedesktop.org/poppler/poppler/issues/742
|
|
CVE-2020-1885 - https://www.facebook.com/security/advisories/cve-2020-1885
|
|
CVE-2020-1887 - https://github.com/osquery/osquery/pull/6197
|
|
CVE-2020-18878 - https://github.com/zorlan/skycaiji/issues/13
|
|
CVE-2020-18889 - https://github.com/choregus/puppyCMS/issues/13
|
|
CVE-2020-18897 - https://github.com/libyal/libpff/issues/61
|
|
CVE-2020-18897 - https://github.com/libyal/libpff/issues/62
|
|
CVE-2020-18898 - https://github.com/Exiv2/exiv2/issues/741
|
|
CVE-2020-18899 - https://github.com/Exiv2/exiv2/issues/742
|
|
CVE-2020-18900 - https://github.com/libyal/libexe/issues/1
|
|
CVE-2020-18964 - https://github.com/saysky/ForestBlog/issues/20
|
|
CVE-2020-18971 - https://sourceforge.net/p/podofo/tickets/48/
|
|
CVE-2020-18972 - https://sourceforge.net/p/podofo/tickets/49/
|
|
CVE-2020-18974 - https://bugzilla.nasm.us/show_bug.cgi?id=3392568
|
|
CVE-2020-18976 - https://github.com/appneta/tcpreplay/issues/556
|
|
CVE-2020-18984 - https://github.com/buxu/bug/issues/2
|
|
CVE-2020-19107 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/9
|
|
CVE-2020-19108 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/10
|
|
CVE-2020-19109 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/12
|
|
CVE-2020-19110 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/11
|
|
CVE-2020-19112 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/13
|
|
CVE-2020-19113 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/15
|
|
CVE-2020-19114 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/8
|
|
CVE-2020-19118 - https://github.com/yzmcms/yzmcms/issues/14
|
|
CVE-2020-1913 - https://www.facebook.com/security/advisories/cve-2020-1913
|
|
CVE-2020-19131 - http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/
|
|
CVE-2020-19131 - http://bugzilla.maptools.org/show_bug.cgi?id=2831
|
|
CVE-2020-1915 - https://www.facebook.com/security/advisories/cve-2020-1915
|
|
CVE-2020-19165 - https://github.com/Mint60/PHP/issues/1
|
|
CVE-2020-19185 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md
|
|
CVE-2020-19186 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc2.md
|
|
CVE-2020-19187 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc3.md
|
|
CVE-2020-19188 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md
|
|
CVE-2020-19189 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc5.md
|
|
CVE-2020-19190 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc6.md
|
|
CVE-2020-19199 - https://github.com/qinggan/phpok/issues/5
|
|
CVE-2020-19263 - https://github.com/sansanyun/mipcms5/issues/4
|
|
CVE-2020-19264 - https://github.com/sansanyun/mipcms5/issues/4
|
|
CVE-2020-19265 - https://github.com/tifaweb/Dswjcms/issues/4
|
|
CVE-2020-19266 - https://github.com/tifaweb/Dswjcms/issues/5
|
|
CVE-2020-1927 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-1927 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-1927 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-19280 - https://github.com/zchuanzhao/jeesns/issues/9
|
|
CVE-2020-19295 - https://www.seebug.org/vuldb/ssvid-97950
|
|
CVE-2020-19301 - https://github.com/tingyuu/vaeThink/issues/1
|
|
CVE-2020-19302 - https://github.com/tingyuu/vaeThink/issues/2
|
|
CVE-2020-19305 - https://github.com/MRdoulestar/CodeAnalyse/issues/2
|
|
CVE-2020-19316 - http://www.netbytesec.com/advisories/OSCommandInjectionInLaravelFramework/
|
|
CVE-2020-19319 - https://github.com/hhhhu8045759/dir_619l-buffer-overflow
|
|
CVE-2020-19320 - https://github.com/hhhhu8045759/dlink-619l-buffer_overflow
|
|
CVE-2020-19320 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2020-19323 - https://github.com/hhhhu8045759/619L_upnpd_heapoverflow
|
|
CVE-2020-19323 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2020-1934 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-1935 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-1935 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-1935 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-19360 - https://github.com/EmreOvunc/FHEM-6.0-Local-File-Inclusion-LFI-Vulnerability
|
|
CVE-2020-19361 - https://github.com/EmreOvunc/Medintux-V2.16.000-Reflected-XSS-Vulnerability
|
|
CVE-2020-19362 - https://github.com/EmreOvunc/Vtiger-CRM-Vulnerabilities/
|
|
CVE-2020-19363 - https://github.com/EmreOvunc/Vtiger-CRM-Vulnerabilities/
|
|
CVE-2020-19364 - https://github.com/EmreOvunc/OpenEMR_Vulnerabilities
|
|
CVE-2020-1938 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-1938 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-1938 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-1941 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-1941 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-1941 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-1941 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-19417 - http://packetstormsecurity.com/files/161700/Emerson-Smart-Wireless-Gateway-1420-4.6.59-Privilege-Escalation.html
|
|
CVE-2020-19419 - http://packetstormsecurity.com/files/161701/Emerson-Smart-Wireless-Gateway-1420-4.6.59-Missing-Authentication.html
|
|
CVE-2020-1945 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-1945 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-1945 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-1945 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-1945 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-1945 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-1945 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-19463 - https://github.com/flexpaper/pdf2json/issues/24
|
|
CVE-2020-19464 - https://github.com/flexpaper/pdf2json/issues/25
|
|
CVE-2020-19465 - https://github.com/flexpaper/pdf2json/issues/26
|
|
CVE-2020-19466 - https://github.com/flexpaper/pdf2json/issues/27
|
|
CVE-2020-19467 - https://github.com/flexpaper/pdf2json/issues/28
|
|
CVE-2020-19468 - https://github.com/flexpaper/pdf2json/issues/29
|
|
CVE-2020-19469 - https://github.com/flexpaper/pdf2json/issues/30
|
|
CVE-2020-19470 - https://github.com/flexpaper/pdf2json/issues/31
|
|
CVE-2020-19471 - https://github.com/flexpaper/pdf2json/issues/32
|
|
CVE-2020-19472 - https://github.com/flexpaper/pdf2json/issues/33
|
|
CVE-2020-19473 - https://github.com/flexpaper/pdf2json/issues/34
|
|
CVE-2020-19474 - https://github.com/flexpaper/pdf2json/issues/35
|
|
CVE-2020-19475 - https://github.com/flexpaper/pdf2json/issues/36
|
|
CVE-2020-19481 - https://github.com/gpac/gpac/issues/1265
|
|
CVE-2020-19481 - https://github.com/gpac/gpac/issues/1266
|
|
CVE-2020-19481 - https://github.com/gpac/gpac/issues/1267
|
|
CVE-2020-19488 - https://github.com/gpac/gpac/issues/1263
|
|
CVE-2020-19490 - https://github.com/syoyo/tinyexr/issues/124
|
|
CVE-2020-19491 - https://github.com/pts/sam2p/issues/67
|
|
CVE-2020-19492 - https://github.com/pts/sam2p/issues/66
|
|
CVE-2020-19497 - https://github.com/tbeu/matio/issues/121
|
|
CVE-2020-19498 - https://github.com/strukturag/libheif/issues/139
|
|
CVE-2020-19499 - https://github.com/strukturag/libheif/issues/138
|
|
CVE-2020-1950 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-1950 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-1951 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-1951 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-19513 - https://www.exploit-db.com/exploits/46991
|
|
CVE-2020-1953 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-1954 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-19559 - https://medium.com/nightst0rm/t%E1%BA%A3n-m%E1%BA%A1n-v%E1%BB%81-l%E1%BB%97-h%E1%BB%95ng-trong-atm-diebold-f1040a70f2c9
|
|
CVE-2020-19609 - https://bugs.ghostscript.com/show_bug.cgi?id=701176
|
|
CVE-2020-19613 - https://github.com/sunkaifei/FlyCms/issues/1
|
|
CVE-2020-19616 - https://github.com/langhsu/mblog/issues/27
|
|
CVE-2020-19617 - https://github.com/langhsu/mblog/issues/27
|
|
CVE-2020-19618 - https://github.com/langhsu/mblog/issues/27
|
|
CVE-2020-19619 - https://github.com/langhsu/mblog/issues/27
|
|
CVE-2020-19626 - http://mayoterry.com/file/cve/XSS_vuluerability_in_Craftcms_3.1.31.pdf
|
|
CVE-2020-1963 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-19639 - https://xn--sb-lka.org/cve/INSMA.txt
|
|
CVE-2020-19640 - https://xn--sb-lka.org/cve/INSMA.txt
|
|
CVE-2020-19641 - https://xn--sb-lka.org/cve/INSMA.txt
|
|
CVE-2020-19642 - https://xn--sb-lka.org/cve/INSMA.txt
|
|
CVE-2020-19643 - https://xn--sb-lka.org/cve/INSMA.txt
|
|
CVE-2020-19664 - https://github.com/minghangshen/bug_poc
|
|
CVE-2020-19664 - https://nosec.org/home/detail/4631.html
|
|
CVE-2020-19667 - https://github.com/ImageMagick/ImageMagick/issues/1895
|
|
CVE-2020-19668 - https://github.com/saitoha/libsixel/issues/136
|
|
CVE-2020-19669 - https://github.com/eyoucms/eyoucms/issues/4
|
|
CVE-2020-1967 - http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html
|
|
CVE-2020-1967 - http://seclists.org/fulldisclosure/2020/May/5
|
|
CVE-2020-1967 - https://github.com/irsl/CVE-2020-1967
|
|
CVE-2020-1967 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-1967 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-1967 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-1967 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-1967 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-1967 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-1967 - https://www.tenable.com/security/tns-2020-04
|
|
CVE-2020-1967 - https://www.tenable.com/security/tns-2020-11
|
|
CVE-2020-1967 - https://www.tenable.com/security/tns-2021-10
|
|
CVE-2020-19670 - https://github.com/bluecity/CMS/blob/master/niushop%20v1.11-passwd/Niushop%20V1.11.md
|
|
CVE-2020-19672 - https://github.com/bluecity/CMS/blob/master/niushop%20v1.1-upload/Niushop%20Multi-business%20V1.11-en.md
|
|
CVE-2020-19678 - https://pastebin.com/8dj59053
|
|
CVE-2020-1968 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-1968 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-1968 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-1968 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-1968 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-19682 - https://zhhhy.github.io/2019/06/28/zzzcms/
|
|
CVE-2020-19683 - https://zhhhy.github.io/2019/06/28/zzzcms/
|
|
CVE-2020-19692 - https://github.com/nginx/njs/issues/187
|
|
CVE-2020-19693 - https://github.com/espruino/Espruino/issues/1684
|
|
CVE-2020-19695 - https://github.com/nginx/njs/issues/188
|
|
CVE-2020-19698 - https://github.com/pandao/editor.md/issues/700
|
|
CVE-2020-1971 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-1971 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-1971 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-1971 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-1971 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-1971 - https://www.tenable.com/security/tns-2020-11
|
|
CVE-2020-1971 - https://www.tenable.com/security/tns-2021-09
|
|
CVE-2020-1971 - https://www.tenable.com/security/tns-2021-10
|
|
CVE-2020-19716 - https://github.com/Exiv2/exiv2/issues/980
|
|
CVE-2020-19717 - https://github.com/axiomatic-systems/Bento4/issues/416
|
|
CVE-2020-19718 - https://github.com/axiomatic-systems/Bento4/issues/417
|
|
CVE-2020-19719 - https://github.com/axiomatic-systems/Bento4/issues/414
|
|
CVE-2020-19720 - https://github.com/axiomatic-systems/Bento4/issues/413
|
|
CVE-2020-19721 - https://github.com/axiomatic-systems/Bento4/issues/415
|
|
CVE-2020-19722 - https://github.com/axiomatic-systems/Bento4/issues/418
|
|
CVE-2020-19724 - https://sourceware.org/bugzilla/show_bug.cgi?id=25362
|
|
CVE-2020-19725 - https://github.com/Z3Prover/z3/issues/3363
|
|
CVE-2020-19726 - https://sourceware.org/bugzilla/show_bug.cgi?id=26240
|
|
CVE-2020-19726 - https://sourceware.org/bugzilla/show_bug.cgi?id=26241
|
|
CVE-2020-19752 - https://github.com/kohler/gifsicle/issues/140
|
|
CVE-2020-19877 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#1
|
|
CVE-2020-19878 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#2
|
|
CVE-2020-19879 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#3
|
|
CVE-2020-19880 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#4
|
|
CVE-2020-19881 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#6
|
|
CVE-2020-19882 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#7
|
|
CVE-2020-19883 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#5
|
|
CVE-2020-19884 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#8
|
|
CVE-2020-19885 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#9
|
|
CVE-2020-19886 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#12
|
|
CVE-2020-19887 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#10
|
|
CVE-2020-19888 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#13
|
|
CVE-2020-19889 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#11
|
|
CVE-2020-19890 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#15
|
|
CVE-2020-19891 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#14
|
|
CVE-2020-19897 - https://github.com/wuzhicms/wuzhicms/issues/183
|
|
CVE-2020-19902 - https://github.com/vedees/wcms/issues/3
|
|
CVE-2020-19914 - https://kevinoclam.github.io/blog/2019/07/31/xiunobbs-upload/
|
|
CVE-2020-19915 - https://gist.github.com/feixuezhi/7a1b117e1a4800efb3b6fffe76ca0e97
|
|
CVE-2020-19915 - https://github.com/wuzhicms/wuzhicms/issues/173
|
|
CVE-2020-19949 - https://github.com/yzmcms/yzmcms/issues/21
|
|
CVE-2020-19950 - https://github.com/yzmcms/yzmcms/issues/22
|
|
CVE-2020-19951 - https://github.com/yzmcms/yzmcms/issues/43
|
|
CVE-2020-19962 - https://github.com/zhuxianjin/vuln_repo/blob/master/chaojicms_stored_xss.md
|
|
CVE-2020-19964 - https://github.com/gaozhifeng/PHPMyWind
|
|
CVE-2020-19964 - https://github.com/gaozhifeng/PHPMyWind/issues/9
|
|
CVE-2020-20021 - https://www.exploit-db.com/exploits/48228
|
|
CVE-2020-20067 - https://github.com/a932278490/ebcms/issues/1
|
|
CVE-2020-20070 - https://github.com/wkeyuan/DWSurvey/issues/48
|
|
CVE-2020-20093 - http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html
|
|
CVE-2020-20093 - https://github.com/zadewg/RIUS
|
|
CVE-2020-20094 - http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html
|
|
CVE-2020-20094 - https://github.com/zadewg/RIUS
|
|
CVE-2020-20095 - http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html
|
|
CVE-2020-20095 - https://github.com/zadewg/RIUS
|
|
CVE-2020-20096 - http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html
|
|
CVE-2020-20096 - https://github.com/zadewg/RIUS
|
|
CVE-2020-20124 - https://github.com/wuzhicms/wuzhicms/issues/188
|
|
CVE-2020-20136 - https://github.com/QuantConnect/Lean/issues/3537
|
|
CVE-2020-20138 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html
|
|
CVE-2020-20139 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html
|
|
CVE-2020-20140 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html
|
|
CVE-2020-20141 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html
|
|
CVE-2020-20142 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html
|
|
CVE-2020-20184 - https://github.com/liftoff/GateOne/issues/736
|
|
CVE-2020-20211 - http://seclists.org/fulldisclosure/2021/May/0
|
|
CVE-2020-20212 - http://seclists.org/fulldisclosure/2021/May/0
|
|
CVE-2020-20213 - http://seclists.org/fulldisclosure/2021/May/10
|
|
CVE-2020-20214 - http://packetstormsecurity.com/files/162513/Mikrotik-RouterOS-6.46.5-Memory-Corruption-Assertion-Failure.html
|
|
CVE-2020-20214 - http://seclists.org/fulldisclosure/2021/May/15
|
|
CVE-2020-20215 - http://seclists.org/fulldisclosure/2021/May/10
|
|
CVE-2020-20216 - http://seclists.org/fulldisclosure/2021/May/10
|
|
CVE-2020-20217 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20217/README.md
|
|
CVE-2020-20218 - https://seclists.org/fulldisclosure/2021/May/1
|
|
CVE-2020-20219 - https://seclists.org/fulldisclosure/2021/May/2
|
|
CVE-2020-20220 - http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html
|
|
CVE-2020-20220 - http://seclists.org/fulldisclosure/2021/May/23
|
|
CVE-2020-20221 - https://seclists.org/fulldisclosure/2021/May/1
|
|
CVE-2020-20222 - http://packetstormsecurity.com/files/162513/Mikrotik-RouterOS-6.46.5-Memory-Corruption-Assertion-Failure.html
|
|
CVE-2020-20222 - http://seclists.org/fulldisclosure/2021/May/15
|
|
CVE-2020-20225 - http://seclists.org/fulldisclosure/2021/May/12
|
|
CVE-2020-20227 - http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html
|
|
CVE-2020-20227 - http://seclists.org/fulldisclosure/2021/May/23
|
|
CVE-2020-2023 - https://github.com/kata-containers/runtime/pull/2477
|
|
CVE-2020-20230 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20230/README.md
|
|
CVE-2020-20231 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20231/README.md
|
|
CVE-2020-20236 - http://packetstormsecurity.com/files/162513/Mikrotik-RouterOS-6.46.5-Memory-Corruption-Assertion-Failure.html
|
|
CVE-2020-20236 - http://seclists.org/fulldisclosure/2021/May/15
|
|
CVE-2020-20237 - http://packetstormsecurity.com/files/162513/Mikrotik-RouterOS-6.46.5-Memory-Corruption-Assertion-Failure.html
|
|
CVE-2020-20237 - http://seclists.org/fulldisclosure/2021/May/15
|
|
CVE-2020-2024 - https://github.com/kata-containers/runtime/issues/2474
|
|
CVE-2020-20245 - http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html
|
|
CVE-2020-20245 - http://seclists.org/fulldisclosure/2021/May/23
|
|
CVE-2020-20246 - http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html
|
|
CVE-2020-20246 - http://seclists.org/fulldisclosure/2021/May/23
|
|
CVE-2020-20248 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20248/README.md
|
|
CVE-2020-20249 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20249/README.md
|
|
CVE-2020-20250 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20250/README.md
|
|
CVE-2020-20252 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20252/README.md
|
|
CVE-2020-20253 - http://seclists.org/fulldisclosure/2021/May/14
|
|
CVE-2020-20253 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_lcdstat_4/README.md
|
|
CVE-2020-20254 - http://seclists.org/fulldisclosure/2021/May/14
|
|
CVE-2020-20254 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_lcdstat_2/README.md
|
|
CVE-2020-20262 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_ipsec/README.md
|
|
CVE-2020-20262 - https://seclists.org/fulldisclosure/2021/May/2
|
|
CVE-2020-20264 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_netwatch/README.md
|
|
CVE-2020-20264 - https://seclists.org/fulldisclosure/2021/May/11
|
|
CVE-2020-20265 - http://seclists.org/fulldisclosure/2021/May/12
|
|
CVE-2020-20265 - https://seclists.org/fulldisclosure/2021/May/11
|
|
CVE-2020-20266 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_dot1x/README.md
|
|
CVE-2020-20266 - https://seclists.org/fulldisclosure/2021/May/11
|
|
CVE-2020-20267 - http://seclists.org/fulldisclosure/2021/May/12
|
|
CVE-2020-20269 - http://packetstormsecurity.com/files/161072/Caret-Editor-4.0.0-rc21-Remote-Code-Execution.html
|
|
CVE-2020-20276 - https://arinerron.com/blog/posts/6
|
|
CVE-2020-20277 - http://packetstormsecurity.com/files/167908/uftpd-2.10-Directory-Traversal.html
|
|
CVE-2020-20277 - https://arinerron.com/blog/posts/6
|
|
CVE-2020-20285 - https://github.com/iohex/ZZCMS/blob/master/zzcms2019_login_xss.md
|
|
CVE-2020-20335 - https://github.com/antirez/kilo/issues/60
|
|
CVE-2020-20340 - https://github.com/mntn0x/POC/blob/master/S-CMS/S-CMS-SQL%E6%B3%A8%E5%85%A5.md
|
|
CVE-2020-20343 - https://github.com/taosir/wtcms/issues/8
|
|
CVE-2020-20344 - https://github.com/taosir/wtcms/issues/9
|
|
CVE-2020-20345 - https://github.com/taosir/wtcms
|
|
CVE-2020-20345 - https://github.com/taosir/wtcms/issues/10
|
|
CVE-2020-20347 - https://github.com/taosir/wtcms/issues/11
|
|
CVE-2020-20348 - https://github.com/taosir/wtcms/issues/11
|
|
CVE-2020-20349 - https://github.com/taosir/wtcms/issues/11
|
|
CVE-2020-2035 - https://www.mnemonic.no/blog/introducing-snicat/
|
|
CVE-2020-2036 - https://security.paloaltonetworks.com/CVE-2020-2036
|
|
CVE-2020-2037 - https://security.paloaltonetworks.com/CVE-2020-2037
|
|
CVE-2020-2038 - http://packetstormsecurity.com/files/168008/PAN-OS-10.0-Remote-Code-Execution.html
|
|
CVE-2020-2038 - http://packetstormsecurity.com/files/168408/Palo-Alto-Networks-Authenticated-Remote-Code-Execution.html
|
|
CVE-2020-2038 - https://security.paloaltonetworks.com/CVE-2020-2038
|
|
CVE-2020-2039 - https://security.paloaltonetworks.com/CVE-2020-2039
|
|
CVE-2020-20412 - https://github.com/stepmania/stepmania/issues/1890
|
|
CVE-2020-20444 - https://github.com/jact/openclinic/issues/8
|
|
CVE-2020-20451 - https://trac.ffmpeg.org/ticket/8094
|
|
CVE-2020-20466 - https://github.com/itodaro/WhiteSharkSystem_cve
|
|
CVE-2020-20467 - https://github.com/itodaro/WhiteSharkSystem_cve
|
|
CVE-2020-20468 - https://github.com/itodaro/WhiteSharkSystem_cve
|
|
CVE-2020-20469 - https://github.com/itodaro/WhiteSharkSystem_cve
|
|
CVE-2020-20470 - https://github.com/itodaro/WhiteSharkSystem_cve
|
|
CVE-2020-20471 - https://github.com/itodaro/WhiteSharkSystem_cve
|
|
CVE-2020-20472 - https://github.com/itodaro/WhiteSharkSystem_cve
|
|
CVE-2020-20473 - https://github.com/itodaro/WhiteSharkSystem_cve
|
|
CVE-2020-20474 - https://github.com/itodaro/WhiteSharkSystem_cve
|
|
CVE-2020-20502 - https://github.com/yzmcms/yzmcms/issues/27
|
|
CVE-2020-20514 - https://github.com/magicblack/maccms10/issues/76
|
|
CVE-2020-20521 - https://github.com/Kitesky/KiteCMS/issues/1
|
|
CVE-2020-20522 - https://github.com/Kitesky/KiteCMS/issues/1
|
|
CVE-2020-20582 - https://github.com/sansanyun/mipcms5/issues/5
|
|
CVE-2020-20583 - https://github.com/0xyu/PHP_Learning/issues/1
|
|
CVE-2020-20584 - https://github.com/baigoStudio/baigoSSO
|
|
CVE-2020-20584 - https://github.com/baigoStudio/baigoSSO/
|
|
CVE-2020-20584 - https://github.com/baigoStudio/baigoSSO/issues/13
|
|
CVE-2020-20585 - https://github.com/0xyu/PHP_Learning/issues/3
|
|
CVE-2020-20586 - https://github.com/0xyu/PHP_Learning/issues/4
|
|
CVE-2020-20589 - https://github.com/liufee/cms/issues/45
|
|
CVE-2020-20593 - https://github.com/alixiaowei/alixiaowei.github.io/issues/1
|
|
CVE-2020-20595 - https://github.com/lock-upme/OPMS/issues/25
|
|
CVE-2020-20597 - https://github.com/xuhuisheng/lemon/issues/198
|
|
CVE-2020-20598 - https://github.com/xuhuisheng/lemon/issues/199
|
|
CVE-2020-20600 - https://github.com/alixiaowei/cve_test/issues/2
|
|
CVE-2020-20640 - https://www.jianshu.com/p/219755c047a1
|
|
CVE-2020-20642 - https://github.com/eyoucms/eyoucms/issues/5
|
|
CVE-2020-20670 - https://github.com/yilezhu/Czar.Cms/issues/6
|
|
CVE-2020-20671 - https://github.com/Kitesky/KiteCMS/issues/3
|
|
CVE-2020-20672 - https://github.com/Kitesky/KiteCMS/issues/3
|
|
CVE-2020-20693 - https://github.com/GilaCMS/gila/issues/51
|
|
CVE-2020-20695 - https://github.com/GilaCMS/gila/issues/52
|
|
CVE-2020-20703 - https://github.com/vim/vim/issues/5041
|
|
CVE-2020-20726 - https://github.com/GilaCMS/gila/issues/51
|
|
CVE-2020-20740 - https://github.com/enferex/pdfresurrect/issues/14
|
|
CVE-2020-20797 - https://github.com/FlameNET/FlameCMS/issues/26
|
|
CVE-2020-20799 - https://github.com/blackjliuyun/cvetest/issues/1
|
|
CVE-2020-20808 - https://github.com/alorfm/vuln/blob/master/qibosoft_cross_Site_Scripting.md
|
|
CVE-2020-20891 - https://trac.ffmpeg.org/ticket/8282
|
|
CVE-2020-20892 - https://trac.ffmpeg.org/ticket/8265
|
|
CVE-2020-20896 - https://trac.ffmpeg.org/ticket/8273
|
|
CVE-2020-20898 - https://trac.ffmpeg.org/ticket/8263
|
|
CVE-2020-20902 - https://trac.ffmpeg.org/ticket/8176
|
|
CVE-2020-20907 - https://github.com/cby234/cve_request/issues/1
|
|
CVE-2020-20907 - https://github.com/cby234/cve_request/issues/2
|
|
CVE-2020-20908 - https://packetstormsecurity.com/files/154691/Akaunting-1.3.17-Cross-Site-Scripting.html
|
|
CVE-2020-20943 - https://blog.csdn.net/he_and/article/details/102698171
|
|
CVE-2020-20944 - https://blog.csdn.net/he_and/article/details/102698171
|
|
CVE-2020-20945 - https://blog.csdn.net/he_and/article/details/102698171
|
|
CVE-2020-20946 - https://blog.csdn.net/he_and/article/details/102698171
|
|
CVE-2020-20949 - https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb
|
|
CVE-2020-20950 - http://microchip.com
|
|
CVE-2020-20950 - https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb
|
|
CVE-2020-2096 - http://packetstormsecurity.com/files/155967/Jenkins-Gitlab-Hook-1.4.2-Cross-Site-Scripting.html
|
|
CVE-2020-20971 - https://github.com/TplusSs/PbootCMS/issues/1
|
|
CVE-2020-20975 - https://blog.csdn.net/qq_41770175/article/details/93486383
|
|
CVE-2020-20988 - https://mycvee.blogspot.com/p/xss2.html
|
|
CVE-2020-20989 - https://mycvee.blogspot.com/p/csrf.html
|
|
CVE-2020-20990 - https://mycvee.blogspot.com/p/xss1.html
|
|
CVE-2020-21012 - https://github.com/hitIer/web_test/tree/master/hotel
|
|
CVE-2020-21013 - https://github.com/emlog/emlog/issues/52
|
|
CVE-2020-21014 - https://github.com/emlog/emlog/issues/53
|
|
CVE-2020-21016 - https://github.com/dahua966/Routers-vuls/blob/master/DIR-846/GuestWLanSetting_RCE.md
|
|
CVE-2020-21016 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2020-21038 - https://github.com/typecho/typecho/issues/952
|
|
CVE-2020-21046 - https://medium.com/@n1pwn/local-privilege-escalation-in-eagleget-1fde79fe47c0
|
|
CVE-2020-21048 - https://github.com/saitoha/libsixel/blob/master/ChangeLog
|
|
CVE-2020-21048 - https://github.com/saitoha/libsixel/issues/73
|
|
CVE-2020-21049 - https://github.com/saitoha/libsixel/blob/master/ChangeLog
|
|
CVE-2020-21049 - https://github.com/saitoha/libsixel/issues/74
|
|
CVE-2020-21050 - https://github.com/saitoha/libsixel/blob/master/ChangeLog
|
|
CVE-2020-21050 - https://github.com/saitoha/libsixel/issues/75
|
|
CVE-2020-21058 - https://github.com/typora/typora-issues/issues/2959
|
|
CVE-2020-21060 - https://github.com/gaozhifeng/PHPMyWind/issues/10
|
|
CVE-2020-21066 - https://github.com/axiomatic-systems/Bento4/issues/408
|
|
CVE-2020-21120 - https://github.com/alixiaowei/cve_test/issues/3
|
|
CVE-2020-21126 - https://github.com/Echox1/metinfo_csrf/issues/1
|
|
CVE-2020-21130 - https://github.com/hisiphp/hisiphp/issues/7
|
|
CVE-2020-21139 - https://github.com/Ryan0lb/EC-cloud-e-commerce-system-CVE-application/blob/master/README.md
|
|
CVE-2020-21141 - https://github.com/hxcc/just_for_fun/blob/master/ICMS%20CSRF
|
|
CVE-2020-21142 - https://bugzilla.ipfire.org/show_bug.cgi?id=12226
|
|
CVE-2020-21146 - https://github.com/liufee/cms/issues/43
|
|
CVE-2020-21147 - https://blog.csdn.net/adminxw/article/details/102881463
|
|
CVE-2020-21147 - https://github.com/alixiaowei/alixiaowei.github.io/issues/2
|
|
CVE-2020-21161 - https://dollahibrahim.blogspot.com/2019/11/cross-site-scripting-on-ruckus.html
|
|
CVE-2020-21179 - https://github.com/wclimb/Koa2-blog/issues/40
|
|
CVE-2020-21180 - https://github.com/wclimb/Koa2-blog/issues/41
|
|
CVE-2020-21228 - https://github.com/Cherry-toto/jizhicms
|
|
CVE-2020-21236 - https://github.com/wind-cyber/DamiCMS-v6.0.0-have-csrf-and-xss-Vulnerabilities-/blob/master/README.md
|
|
CVE-2020-21246 - https://github.com/yongshengli/yiicms/issues/6
|
|
CVE-2020-21268 - https://github.com/easysoft/zentaopms/issues/40
|
|
CVE-2020-21325 - https://github.com/wuzhicms/wuzhicms/issues/188
|
|
CVE-2020-21356 - https://github.com/PopojiCMS/PopojiCMS/issues/23
|
|
CVE-2020-21357 - https://github.com/PopojiCMS/PopojiCMS/issues/24
|
|
CVE-2020-21366 - https://github.com/GreenCMS/GreenCMS/issues/115
|
|
CVE-2020-21400 - https://github.com/gaozhifeng/PHPMyWind/issues/11
|
|
CVE-2020-21480 - https://www.porlockz.com/A-arbitrary-file-write-vulnerability-in-RGCMS-V1-06/
|
|
CVE-2020-21481 - https://www.porlockz.com/A-arbitrary-file-upload-vulnerability-in-RGCMS-V1-06/
|
|
CVE-2020-21482 - https://www.porlockz.com/A-xss-vulnerability-in-RGCMS-V1-06/
|
|
CVE-2020-21483 - https://www.porlockz.com/A-arbitrary-file-upload-vulnerability-in-jizhicms-v1-5/
|
|
CVE-2020-21485 - https://github.com/Alluxio/alluxio/issues/10552
|
|
CVE-2020-21493 - https://github.com/wanghaiwei/xiuno-docker/issues/3
|
|
CVE-2020-21494 - https://github.com/wanghaiwei/xiuno-docker/issues/4
|
|
CVE-2020-21495 - https://github.com/wanghaiwei/xiuno-docker/issues/5
|
|
CVE-2020-21496 - https://github.com/wanghaiwei/xiuno-docker/issues/5
|
|
CVE-2020-21503 - https://github.com/caokang/waimai/issues/15
|
|
CVE-2020-21517 - https://github.com/lvyyevd/cms/blob/master/metinfo/metinfo7.0.0.md
|
|
CVE-2020-21529 - https://sourceforge.net/p/mcj/tickets/65/
|
|
CVE-2020-21530 - https://sourceforge.net/p/mcj/tickets/61/
|
|
CVE-2020-21531 - https://sourceforge.net/p/mcj/tickets/63/
|
|
CVE-2020-21532 - https://sourceforge.net/p/mcj/tickets/64/
|
|
CVE-2020-21533 - https://sourceforge.net/p/mcj/tickets/59/
|
|
CVE-2020-21534 - https://sourceforge.net/p/mcj/tickets/58/
|
|
CVE-2020-21535 - https://sourceforge.net/p/mcj/tickets/62/
|
|
CVE-2020-21547 - https://github.com/saitoha/libsixel/issues/114
|
|
CVE-2020-21548 - https://github.com/saitoha/libsixel/issues/116
|
|
CVE-2020-21564 - https://github.com/pluck-cms/pluck/issues/83
|
|
CVE-2020-21583 - https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html
|
|
CVE-2020-21585 - https://github.com/pwnninja/emlog/issues/1
|
|
CVE-2020-21594 - https://github.com/strukturag/libde265/issues/233
|
|
CVE-2020-21595 - https://github.com/strukturag/libde265/issues/239
|
|
CVE-2020-21596 - https://github.com/strukturag/libde265/issues/236
|
|
CVE-2020-21597 - https://github.com/strukturag/libde265/issues/238
|
|
CVE-2020-21598 - https://github.com/strukturag/libde265/issues/237
|
|
CVE-2020-21599 - https://github.com/strukturag/libde265/issues/235
|
|
CVE-2020-21600 - https://github.com/strukturag/libde265/issues/243
|
|
CVE-2020-21601 - https://github.com/strukturag/libde265/issues/241
|
|
CVE-2020-21602 - https://github.com/strukturag/libde265/issues/242
|
|
CVE-2020-21603 - https://github.com/strukturag/libde265/issues/240
|
|
CVE-2020-21604 - https://github.com/strukturag/libde265/issues/231
|
|
CVE-2020-21605 - https://github.com/strukturag/libde265/issues/234
|
|
CVE-2020-21606 - https://github.com/strukturag/libde265/issues/232
|
|
CVE-2020-21643 - https://github.com/Neeke/HongCMS/issues/15
|
|
CVE-2020-21658 - https://github.com/shadoweb/wdja/issues/10
|
|
CVE-2020-21667 - https://github.com/che-my/fastadmin-tp6/issues/2
|
|
CVE-2020-21675 - https://sourceforge.net/p/mcj/tickets/78/
|
|
CVE-2020-21676 - https://sourceforge.net/p/mcj/tickets/76/
|
|
CVE-2020-21677 - https://github.com/saitoha/libsixel/issues/123
|
|
CVE-2020-21678 - https://sourceforge.net/p/mcj/tickets/71/
|
|
CVE-2020-21679 - https://sourceforge.net/p/graphicsmagick/bugs/619/
|
|
CVE-2020-21680 - https://sourceforge.net/p/mcj/tickets/74/
|
|
CVE-2020-21681 - https://sourceforge.net/p/mcj/tickets/73/
|
|
CVE-2020-21682 - https://sourceforge.net/p/mcj/tickets/72/
|
|
CVE-2020-21683 - https://sourceforge.net/p/mcj/tickets/77/
|
|
CVE-2020-21684 - https://sourceforge.net/p/mcj/tickets/75/
|
|
CVE-2020-21688 - https://trac.ffmpeg.org/ticket/8186
|
|
CVE-2020-21697 - https://trac.ffmpeg.org/ticket/8188
|
|
CVE-2020-21699 - https://github.com/ZxDecide/Nginx-variants/blob/master/%E9%99%84%E4%BB%B6(Tengine).docx
|
|
CVE-2020-21710 - https://bugs.ghostscript.com/show_bug.cgi?id=701843
|
|
CVE-2020-21725 - https://github.com/CoColizdf/CVE/issues/1
|
|
CVE-2020-21726 - https://github.com/CoColizdf/CVE/issues/2
|
|
CVE-2020-21729 - https://github.com/CoColizdf/CVE/issues/3
|
|
CVE-2020-21806 - https://github.com/ectouch/ectouch/issues/5
|
|
CVE-2020-21808 - https://whitehub.net/submissions/1516
|
|
CVE-2020-21809 - https://whitehub.net/submissions/1517
|
|
CVE-2020-21809 - https://whitehub.net/submissions/1518
|
|
CVE-2020-21813 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890969
|
|
CVE-2020-21814 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891083
|
|
CVE-2020-21815 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890932
|
|
CVE-2020-21816 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865
|
|
CVE-2020-21817 - https://github.com/LibreDWG/libredwg/issues/182#issue-547887727
|
|
CVE-2020-21818 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891053
|
|
CVE-2020-21819 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890901
|
|
CVE-2020-21827 - https://github.com/LibreDWG/libredwg/issues/183
|
|
CVE-2020-21830 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493134
|
|
CVE-2020-21831 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493267
|
|
CVE-2020-21832 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492612
|
|
CVE-2020-21833 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493364
|
|
CVE-2020-21834 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492468
|
|
CVE-2020-21835 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493046
|
|
CVE-2020-21836 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493437
|
|
CVE-2020-21838 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492816
|
|
CVE-2020-21839 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492707
|
|
CVE-2020-21840 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493513
|
|
CVE-2020-21841 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493775
|
|
CVE-2020-21842 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493684
|
|
CVE-2020-21843 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493857
|
|
CVE-2020-21844 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493607
|
|
CVE-2020-21845 - https://vyshnavvizz.blogspot.com/2020/01/html-injection-in-codoforum-v483.html
|
|
CVE-2020-21881 - https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG
|
|
CVE-2020-21883 - https://s3curityb3ast.github.io/KSA-Dev-009.txt
|
|
CVE-2020-21883 - https://www.mail-archive.com/fulldisclosure@seclists.org/msg07140.html
|
|
CVE-2020-21884 - https://s3curityb3ast.github.io/KSA-Dev-008.txt
|
|
CVE-2020-21884 - https://www.mail-archive.com/fulldisclosure@seclists.org/msg07139.html
|
|
CVE-2020-21890 - https://bugs.ghostscript.com/show_bug.cgi?id=701846
|
|
CVE-2020-21896 - https://bugs.ghostscript.com/show_bug.cgi?id=701294
|
|
CVE-2020-21913 - https://unicode-org.atlassian.net/browse/ICU-20850
|
|
CVE-2020-21929 - https://github.com/eyoucms/eyoucms/issues/8
|
|
CVE-2020-21930 - https://github.com/eyoucms/eyoucms/issues/9
|
|
CVE-2020-21932 - https://github.com/cc-crack/router/blob/master/motocx2.md
|
|
CVE-2020-21932 - https://l0n0l.xyz/post/motocx2/
|
|
CVE-2020-21933 - https://github.com/cc-crack/router/blob/master/motocx2.md
|
|
CVE-2020-21933 - https://l0n0l.xyz/post/motocx2/
|
|
CVE-2020-21934 - https://github.com/cc-crack/router/blob/master/motocx2.md
|
|
CVE-2020-21934 - https://l0n0l.xyz/post/motocx2/
|
|
CVE-2020-21935 - https://github.com/cc-crack/router/blob/master/motocx2.md
|
|
CVE-2020-21935 - https://l0n0l.xyz/post/motocx2/
|
|
CVE-2020-21936 - https://github.com/cc-crack/router/blob/master/motocx2.md
|
|
CVE-2020-21936 - https://l0n0l.xyz/post/motocx2/
|
|
CVE-2020-21937 - https://github.com/cc-crack/router/blob/master/motocx2.md
|
|
CVE-2020-21937 - https://l0n0l.xyz/post/motocx2/
|
|
CVE-2020-21967 - http://packetstormsecurity.com/files/167742/PrestaShop-1.7.6.7-Cross-Site-Scripting.html
|
|
CVE-2020-21976 - https://cxsecurity.com/issue/WLB-2020010143
|
|
CVE-2020-21987 - https://www.exploit-db.com/exploits/47806
|
|
CVE-2020-21987 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5556.php
|
|
CVE-2020-21989 - https://www.exploit-db.com/exploits/47808
|
|
CVE-2020-21989 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5558.php
|
|
CVE-2020-21990 - https://www.exploit-db.com/exploits/47824
|
|
CVE-2020-21990 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.php
|
|
CVE-2020-21991 - https://www.exploit-db.com/exploits/47822
|
|
CVE-2020-21991 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5549.php
|
|
CVE-2020-21992 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5544.php
|
|
CVE-2020-21993 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5551.php
|
|
CVE-2020-21994 - https://www.exploit-db.com/exploits/47819
|
|
CVE-2020-21994 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5550.php
|
|
CVE-2020-21995 - https://www.exploit-db.com/exploits/47763
|
|
CVE-2020-21995 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5546.php
|
|
CVE-2020-21996 - https://www.exploit-db.com/exploits/47820
|
|
CVE-2020-21996 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5548.php
|
|
CVE-2020-21997 - https://www.exploit-db.com/exploits/47596
|
|
CVE-2020-21997 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5541.php
|
|
CVE-2020-21998 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5559.php
|
|
CVE-2020-21999 - https://www.exploit-db.com/exploits/47066
|
|
CVE-2020-21999 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5525.php
|
|
CVE-2020-22000 - https://www.exploit-db.com/exploits/47809
|
|
CVE-2020-22000 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5560.php
|
|
CVE-2020-22001 - https://www.exploit-db.com/exploits/47807
|
|
CVE-2020-22001 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5557.php
|
|
CVE-2020-22002 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5545.php
|
|
CVE-2020-22007 - https://gist.github.com/tanprathan/69fbf6fbac11988e12f44069ec5b18ea#file-cve-2020-22007-txt
|
|
CVE-2020-22015 - https://trac.ffmpeg.org/ticket/8190
|
|
CVE-2020-22016 - https://trac.ffmpeg.org/ticket/8183
|
|
CVE-2020-22017 - https://trac.ffmpeg.org/ticket/8309
|
|
CVE-2020-22019 - https://trac.ffmpeg.org/ticket/8241
|
|
CVE-2020-22020 - https://trac.ffmpeg.org/ticket/8239
|
|
CVE-2020-22021 - https://trac.ffmpeg.org/ticket/8240
|
|
CVE-2020-22022 - https://trac.ffmpeg.org/ticket/8264
|
|
CVE-2020-22023 - https://trac.ffmpeg.org/ticket/8244
|
|
CVE-2020-22024 - https://trac.ffmpeg.org/ticket/8310
|
|
CVE-2020-22025 - https://trac.ffmpeg.org/ticket/8260
|
|
CVE-2020-22026 - https://trac.ffmpeg.org/ticket/8317
|
|
CVE-2020-22027 - https://trac.ffmpeg.org/ticket/8242
|
|
CVE-2020-22028 - https://trac.ffmpeg.org/ticket/8274
|
|
CVE-2020-22029 - https://trac.ffmpeg.org/ticket/8250
|
|
CVE-2020-22031 - https://trac.ffmpeg.org/ticket/8243
|
|
CVE-2020-22032 - https://trac.ffmpeg.org/ticket/8275
|
|
CVE-2020-22033 - https://trac.ffmpeg.org/ticket/8246
|
|
CVE-2020-22034 - https://trac.ffmpeg.org/ticket/8236
|
|
CVE-2020-22035 - https://trac.ffmpeg.org/ticket/8262
|
|
CVE-2020-22036 - https://trac.ffmpeg.org/ticket/8261
|
|
CVE-2020-22037 - https://trac.ffmpeg.org/ticket/8281
|
|
CVE-2020-22038 - https://trac.ffmpeg.org/ticket/8285
|
|
CVE-2020-22039 - https://trac.ffmpeg.org/ticket/8302
|
|
CVE-2020-22040 - https://trac.ffmpeg.org/ticket/8283
|
|
CVE-2020-22041 - https://trac.ffmpeg.org/ticket/8296
|
|
CVE-2020-22042 - https://trac.ffmpeg.org/ticket/8267
|
|
CVE-2020-22043 - https://trac.ffmpeg.org/ticket/8284
|
|
CVE-2020-22044 - https://trac.ffmpeg.org/ticket/8295
|
|
CVE-2020-22046 - https://trac.ffmpeg.org/ticket/8294
|
|
CVE-2020-22048 - https://trac.ffmpeg.org/ticket/8303
|
|
CVE-2020-22049 - https://trac.ffmpeg.org/ticket/8314
|
|
CVE-2020-22051 - https://trac.ffmpeg.org/ticket/8313
|
|
CVE-2020-22054 - https://trac.ffmpeg.org/ticket/8315
|
|
CVE-2020-22056 - https://trac.ffmpeg.org/ticket/8304
|
|
CVE-2020-22079 - https://github.com/Lyc-heng/routers/blob/main/routers/stack1.md
|
|
CVE-2020-22122 - https://github.com/876054426/vul/blob/master/ljcms_sql.md
|
|
CVE-2020-22148 - https://github.com/Piwigo/Piwigo/issues/1157
|
|
CVE-2020-22150 - https://github.com/Piwigo/Piwigo/issues/1158
|
|
CVE-2020-22158 - https://sku11army.blogspot.com/2020/02/ericsson-multiple-stored-reflected-xss.html
|
|
CVE-2020-22159 - https://sku11army.blogspot.com/2020/02/evertz-path-transversal-arbitrary-file.html
|
|
CVE-2020-22198 - http://www.hackdig.com/?02/hack-8391.htm
|
|
CVE-2020-22198 - https://github.com/blindkey/DedeCMSv5/issues/1
|
|
CVE-2020-22200 - https://github.com/blindkey/cve_like/issues/2
|
|
CVE-2020-22201 - https://github.com/blindkey/cve_like/issues/4
|
|
CVE-2020-22203 - https://github.com/blindkey/cve_like/issues/6
|
|
CVE-2020-22208 - https://github.com/blindkey/cve_like/issues/10
|
|
CVE-2020-22209 - https://github.com/blindkey/cve_like/issues/12
|
|
CVE-2020-22210 - https://github.com/blindkey/cve_like/issues/11
|
|
CVE-2020-22211 - https://github.com/blindkey/cve_like/issues/13
|
|
CVE-2020-22249 - https://drive.google.com/open?id=1znDU4fDKA_seg16mJLLtgaaFfvmf-mS6
|
|
CVE-2020-22251 - https://github.com/phpList/phplist3/issues/660
|
|
CVE-2020-2229 - http://packetstormsecurity.com/files/160443/Jenkins-2.235.3-Cross-Site-Scripting.html
|
|
CVE-2020-2230 - http://packetstormsecurity.com/files/160443/Jenkins-2.235.3-Cross-Site-Scripting.html
|
|
CVE-2020-2231 - http://packetstormsecurity.com/files/160616/Jenkins-2.251-LTS-2.235.3-Cross-Site-Scripting.html
|
|
CVE-2020-22312 - https://github.com/wlx65003/HZNUOJ/issues/17
|
|
CVE-2020-22334 - https://github.com/source-trace/beescms/issues/5
|
|
CVE-2020-22352 - https://github.com/gpac/gpac/issues/1423
|
|
CVE-2020-22403 - https://github.com/mrvautin/expressCart/issues/120
|
|
CVE-2020-22421 - https://github.com/congcong9184-123/congcong9184-123.github.io/blob/master/74cms.docx
|
|
CVE-2020-22425 - https://code610.blogspot.com/2020/04/postauth-sqli-in-centreon-1910-1el7.html,
|
|
CVE-2020-22425 - https://github.com/c610/free/
|
|
CVE-2020-22427 - https://code610.blogspot.com/2020/03/postauth-rce-bugs-in-nagiosxi-5611.html
|
|
CVE-2020-22428 - https://github.com/matrix
|
|
CVE-2020-22428 - https://www.linkedin.com/in/gabrielegristina
|
|
CVE-2020-22453 - https://robin.meis.space/2020/03/11/notenmanipulation-in-elektronischen-klassenbuchern/
|
|
CVE-2020-22475 - https://www.exploit-db.com/exploits/49563
|
|
CVE-2020-22550 - https://gist.github.com/Sp3eD-X/22640377f96340544baf12891f708b8f
|
|
CVE-2020-22552 - https://sourceforge.net/p/snap7/discussion/bugfix/thread/456d76fdde/
|
|
CVE-2020-22628 - https://github.com/LibRaw/LibRaw/issues/269
|
|
CVE-2020-22669 - https://github.com/coreruleset/coreruleset/pull/1793
|
|
CVE-2020-22673 - https://github.com/gpac/gpac/issues/1342
|
|
CVE-2020-22674 - https://github.com/gpac/gpac/issues/1346
|
|
CVE-2020-22675 - https://github.com/gpac/gpac/issues/1344
|
|
CVE-2020-22677 - https://github.com/gpac/gpac/issues/1341
|
|
CVE-2020-22678 - https://github.com/gpac/gpac/issues/1339
|
|
CVE-2020-22679 - https://github.com/gpac/gpac/issues/1345
|
|
CVE-2020-22721 - https://syhack.wordpress.com/2020/04/18/pnotes-insecure-file-upload-vulnerability-code-execution/
|
|
CVE-2020-22722 - https://syhack.wordpress.com/2020/04/21/rapid-scada-local-privilege-escalation-vulnerability/
|
|
CVE-2020-22807 - https://cloud.tencent.com/developer/article/1612208
|
|
CVE-2020-22809 - https://www.exploit-db.com/exploits/48306
|
|
CVE-2020-22818 - https://unc1e.blogspot.com/2020/04/mkcms-v62-has-mutilple-vulnerabilities.html
|
|
CVE-2020-22819 - https://unc1e.blogspot.com/2020/04/mkcms-v62-has-mutilple-vulnerabilities.html
|
|
CVE-2020-22820 - https://unc1e.blogspot.com/2020/04/mkcms-v62-has-mutilple-vulnerabilities.html
|
|
CVE-2020-22839 - http://packetstormsecurity.com/files/161363/b2evolution-CMS-6.11.6-Cross-Site-Scripting.html
|
|
CVE-2020-22839 - https://sohambakore.medium.com/b2evolution-cms-reflected-xss-in-tab-type-parameter-in-evoadm-php-38886216cdd3
|
|
CVE-2020-22839 - https://www.exploit-db.com/exploits/49555
|
|
CVE-2020-22840 - http://packetstormsecurity.com/files/161362/b2evolution-CMS-6.11.6-Open-Redirection.html
|
|
CVE-2020-22840 - https://www.exploit-db.com/exploits/49554
|
|
CVE-2020-22841 - http://packetstormsecurity.com/files/161363/b2evolution-CMS-6.11.6-Cross-Site-Scripting.html
|
|
CVE-2020-22841 - https://www.exploit-db.com/exploits/49551
|
|
CVE-2020-22844 - https://github.com/colorlight/mikrotik_poc/blob/master/two_vulns.md
|
|
CVE-2020-22845 - https://github.com/colorlight/mikrotik_poc/blob/master/two_vulns.md
|
|
CVE-2020-22864 - https://github.com/froala/wysiwyg-editor/issues/3880
|
|
CVE-2020-22864 - https://www.youtube.com/watch?v=WE3b1iSnWJY
|
|
CVE-2020-22874 - https://github.com/pcmacdon/jsish/issues/5
|
|
CVE-2020-22875 - https://github.com/pcmacdon/jsish/issues/10
|
|
CVE-2020-22876 - https://github.com/ldarren/QuickJS/issues/11
|
|
CVE-2020-22882 - https://github.com/Moddable-OpenSource/moddable/issues/351
|
|
CVE-2020-22884 - https://github.com/espruino/Espruino/issues/1799
|
|
CVE-2020-22885 - https://github.com/ccxvii/mujs/issues/133
|
|
CVE-2020-22886 - https://github.com/ccxvii/mujs/issues/134
|
|
CVE-2020-22907 - https://github.com/pcmacdon/jsish/issues/16
|
|
CVE-2020-22916 - http://web.archive.org/web/20230918084612/https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability
|
|
CVE-2020-22916 - https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability
|
|
CVE-2020-22983 - https://medium.com/@win3zz/how-i-made-31500-by-submitting-a-bug-to-facebook-d31bb046e204
|
|
CVE-2020-22984 - https://medium.com/@win3zz/simple-story-of-some-complicated-xss-on-facebook-8a9c0d80969d
|
|
CVE-2020-22985 - https://medium.com/@win3zz/simple-story-of-some-complicated-xss-on-facebook-8a9c0d80969d
|
|
CVE-2020-22986 - https://medium.com/@win3zz/simple-story-of-some-complicated-xss-on-facebook-8a9c0d80969d
|
|
CVE-2020-22987 - https://medium.com/@win3zz/simple-story-of-some-complicated-xss-on-facebook-8a9c0d80969d
|
|
CVE-2020-23014 - https://seekurity.com/blog/2020/04/19/admin/advisories/apfell-post-exploitation-red-team-framework-authenticated-cross-site-scripting-vulnerability
|
|
CVE-2020-23036 - https://www.vulnerability-lab.com/get_content.php?id=2211
|
|
CVE-2020-23037 - https://www.vulnerability-lab.com/get_content.php?id=2198
|
|
CVE-2020-23038 - https://www.vulnerability-lab.com/get_content.php?id=2205
|
|
CVE-2020-23039 - https://www.vulnerability-lab.com/get_content.php?id=2210
|
|
CVE-2020-23040 - https://www.vulnerability-lab.com/get_content.php?id=2207
|
|
CVE-2020-23041 - https://www.vulnerability-lab.com/get_content.php?id=2204
|
|
CVE-2020-23042 - https://www.vulnerability-lab.com/get_content.php?id=2201
|
|
CVE-2020-23043 - https://www.vulnerability-lab.com/get_content.php?id=2212
|
|
CVE-2020-23044 - https://www.vulnerability-lab.com/get_content.php?id=2195
|
|
CVE-2020-23045 - https://www.vulnerability-lab.com/get_content.php?id=2206
|
|
CVE-2020-23046 - https://www.vulnerability-lab.com/get_content.php?id=2194
|
|
CVE-2020-23047 - https://www.vulnerability-lab.com/get_content.php?id=2206
|
|
CVE-2020-23048 - https://www.vulnerability-lab.com/get_content.php?id=2209
|
|
CVE-2020-23049 - https://www.vulnerability-lab.com/get_content.php?id=2208
|
|
CVE-2020-23050 - https://www.vulnerability-lab.com/get_content.php?id=2215
|
|
CVE-2020-23051 - https://www.vulnerability-lab.com/get_content.php?id=2216
|
|
CVE-2020-23052 - https://www.vulnerability-lab.com/get_content.php?id=2217
|
|
CVE-2020-23054 - https://www.vulnerability-lab.com/get_content.php?id=2189
|
|
CVE-2020-23055 - https://www.vulnerability-lab.com/get_content.php?id=2196
|
|
CVE-2020-23058 - https://www.vulnerability-lab.com/get_content.php?id=2219
|
|
CVE-2020-23060 - https://www.vulnerability-lab.com/get_content.php?id=2236
|
|
CVE-2020-23061 - https://www.vulnerability-lab.com/get_content.php?id=2200
|
|
CVE-2020-23064 - https://snyk.io/vuln/SNYK-JS-JQUERY-565129
|
|
CVE-2020-23069 - https://www.exploit-db.com/exploits/48312
|
|
CVE-2020-23109 - https://github.com/strukturag/libheif/issues/207
|
|
CVE-2020-23127 - https://toandak.blogspot.com/2020/05/csrf-vulnerbility-in-chamilo-lms.html
|
|
CVE-2020-23128 - https://toandak.blogspot.com/2020/05/improper-privilege-management-in.html
|
|
CVE-2020-23160 - https://github.com/Outpost24/Pyrescom-Termod-PoC
|
|
CVE-2020-23160 - https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device
|
|
CVE-2020-23161 - https://github.com/Outpost24/Pyrescom-Termod-PoC
|
|
CVE-2020-23161 - https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device
|
|
CVE-2020-23162 - https://github.com/Outpost24/Pyrescom-Termod-PoC
|
|
CVE-2020-23162 - https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device
|
|
CVE-2020-23171 - https://github.com/nim-lang/zip/issues/54
|
|
CVE-2020-23172 - https://github.com/kuba--/zip/issues/123
|
|
CVE-2020-23178 - https://github.com/PHPFusion/PHPFusion/issues/2314
|
|
CVE-2020-23182 - https://github.com/phpfusion/PHPFusion/issues/2329
|
|
CVE-2020-23208 - https://github.com/phpList/phplist3/issues/665
|
|
CVE-2020-23209 - https://github.com/phpList/phplist3/issues/666
|
|
CVE-2020-23214 - https://github.com/phpList/phplist3/issues/669
|
|
CVE-2020-23217 - https://github.com/phpList/phplist3/issues/672
|
|
CVE-2020-23257 - https://github.com/espruino/Espruino/issues/1820
|
|
CVE-2020-23258 - https://github.com/pcmacdon/jsish/issues/12
|
|
CVE-2020-23259 - https://github.com/pcmacdon/jsish/issues/13
|
|
CVE-2020-23260 - https://github.com/pcmacdon/jsish/issues/14
|
|
CVE-2020-23260 - https://jsish.org/fossil/jsi2/tktview?name=3e211e44b1
|
|
CVE-2020-23266 - https://github.com/gpac/gpac/issues/1481
|
|
CVE-2020-23267 - https://github.com/gpac/gpac/issues/1479
|
|
CVE-2020-23269 - https://github.com/gpac/gpac/issues/1482
|
|
CVE-2020-23273 - https://github.com/appneta/tcpreplay/issues/579
|
|
CVE-2020-23283 - https://www.linkedin.com/pulse/descobrindo-usu%C3%A1rios-brute-force-iran/
|
|
CVE-2020-23342 - http://packetstormsecurity.com/files/161048/Anchor-CMS-0.12.7-Cross-Site-Request-Forgery.html
|
|
CVE-2020-23363 - https://github.com/Verytops/verydows/issues/17
|
|
CVE-2020-23369 - https://github.com/yzmcms/yzmcms/issues/46
|
|
CVE-2020-23370 - https://github.com/yzmcms/yzmcms/issues/45
|
|
CVE-2020-23371 - https://github.com/nangge/noneCms/issues/30
|
|
CVE-2020-23373 - https://github.com/nangge/noneCms/issues/33
|
|
CVE-2020-23374 - https://github.com/nangge/noneCms/issues/32
|
|
CVE-2020-23376 - https://github.com/nangge/noneCms/issues/35
|
|
CVE-2020-23446 - http://cvewalkthrough.com/variant-unauthenticated-information-disclosure-via-api/
|
|
CVE-2020-23446 - https://tejaspingulkar.blogspot.com/2020/09/cve-2020-23446-verint-workforce.html
|
|
CVE-2020-23450 - https://abuyv.com
|
|
CVE-2020-23466 - https://www.exploit-db.com/exploits/48522
|
|
CVE-2020-23517 - https://vulnerabilitypublishing.blogspot.com/2021/03/aryanic-highmail-high-cms-reflected.html
|
|
CVE-2020-23518 - https://www.exploit-db.com/exploits/47289
|
|
CVE-2020-23522 - http://packetstormsecurity.com/files/161276/Pixelimity-1.0-Cross-Site-Request-Forgery.html
|
|
CVE-2020-23522 - https://github.com/pixelimity/pixelimity/issues/20
|
|
CVE-2020-23533 - https://www.dropbox.com/s/6smwnbrp0kgsgrc/poc_code.py?dl=0
|
|
CVE-2020-23534 - https://github.com/gopeak/masterlab/issues/254
|
|
CVE-2020-23539 - https://github.com/pokerfacett/MY_REQUEST/blob/df73fe140655ea44542b03ac186e6c2b47e97540/Realtek%208723ds%20BLE%20SDK%20denial%20of%20service%20attack.md
|
|
CVE-2020-23565 - https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/3
|
|
CVE-2020-23566 - https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/1
|
|
CVE-2020-23567 - https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/2
|
|
CVE-2020-23575 - https://www.exploit-db.com/exploits/48561
|
|
CVE-2020-23580 - https://github.com/DengyigeFeng/vuln/issues/1
|
|
CVE-2020-23595 - https://github.com/yzmcms/yzmcms/issues/47
|
|
CVE-2020-23622 - https://zh-cn.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of?tns_redirect=true
|
|
CVE-2020-23630 - https://github.com/Pandora1m2/zzcms201910/issues/1
|
|
CVE-2020-23643 - https://github.com/Cherry-toto/jizhicms/issues/29
|
|
CVE-2020-23644 - https://github.com/Cherry-toto/jizhicms/issues/28
|
|
CVE-2020-23648 - https://gist.github.com/ninj4c0d3r/574d2753d469e4ba51dfe555d9c2d4fb
|
|
CVE-2020-23653 - https://github.com/zoujingli/ThinkAdmin/issues/238
|
|
CVE-2020-23686 - https://github.com/loadream/AyaCMS/issues/1
|
|
CVE-2020-23705 - https://github.com/rockcarry/ffjpeg/issues/25
|
|
CVE-2020-23706 - https://github.com/brackeen/ok-file-formats/issues/7
|
|
CVE-2020-23707 - https://github.com/brackeen/ok-file-formats/issues/8
|
|
CVE-2020-23715 - https://github.com/luuthehienhbit/LFI-Vulnerability-Webport-CMS-version-1.19.10.17121/blob/master/README.md
|
|
CVE-2020-23721 - https://github.com/daylightstudio/FUEL-CMS/issues/559
|
|
CVE-2020-23761 - http://hidden-one.co.in/2021/04/09/cve-2020-23761-stored-xss-vulnerability-in-subrion-cms-version/
|
|
CVE-2020-23762 - http://hidden-one.co.in/2021/04/09/cve-2020-23762-stored-xss-vulnerability-in-the-larsens-calender-plugin-version/
|
|
CVE-2020-23763 - http://hidden-one.co.in/2021/04/09/cve-2020-23763-sql-injection-leading-to-authentication-bypass-in-online-book-store-1-0/
|
|
CVE-2020-23790 - https://github.com/vladvector/vladvector.github.io/blob/master/exploit/2020-07-02-golo-business-listing-city-travel-guide-laravel-theme-v1-1-5.txt
|
|
CVE-2020-23814 - https://github.com/xuxueli/xxl-job/issues/1866
|
|
CVE-2020-23824 - https://github.com/V1n1v131r4/CSRF-on-ArGoSoft-Mail-Server/blob/master/README.md
|
|
CVE-2020-23826 - https://whiterosezex.blogspot.com/2021/01/cve-2020-23826-rce-vulnerability-in.html
|
|
CVE-2020-23828 - https://www.exploit-db.com/exploits/48704
|
|
CVE-2020-23829 - https://www.exploit-db.com/exploits/48702
|
|
CVE-2020-23830 - https://www.exploit-db.com/exploits/48783
|
|
CVE-2020-23831 - https://packetstormsecurity.com/files/158813/Tailor-MS-1.0-Cross-Site-Scripting.html
|
|
CVE-2020-23832 - https://github.com/projectworlds32/Car-Rental-Syatem-PHP-MYSQL/archive/master.zip
|
|
CVE-2020-23832 - https://packetstormsecurity.com/files/158795/Car-Rental-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2020-23833 - https://packetstormsecurity.com/files/158811/House-Rental-1.0-SQL-Injection.html
|
|
CVE-2020-23834 - https://www.exploit-db.com/exploits/48789
|
|
CVE-2020-23835 - https://www.exploit-db.com/exploits/48813
|
|
CVE-2020-23836 - https://www.exploit-db.com/exploits/48738
|
|
CVE-2020-23837 - https://www.exploit-db.com/exploits/48745
|
|
CVE-2020-23839 - http://packetstormsecurity.com/files/162016/GetSimple-CMS-3.3.16-Cross-Site-Scripting-Shell-Upload.html
|
|
CVE-2020-23839 - https://github.com/boku7/CVE-2020-23839
|
|
CVE-2020-23839 - https://www.exploit-db.com/exploits/49726
|
|
CVE-2020-23849 - https://github.com/josdejong/jsoneditor/issues/1029
|
|
CVE-2020-23851 - https://github.com/rockcarry/ffjpeg/issues/27
|
|
CVE-2020-23852 - https://github.com/rockcarry/ffjpeg/issues/28
|
|
CVE-2020-23856 - https://github.com/yangjiageng/PoC/blob/master/PoC_cflow_uaf_parser_line1284
|
|
CVE-2020-23856 - https://lists.gnu.org/archive/html/bug-cflow/2020-07/msg00000.html
|
|
CVE-2020-23861 - https://github.com/LibreDWG/libredwg/issues/248
|
|
CVE-2020-23864 - http://daniels-it-blog.blogspot.com/2020/07/iobit-malware-fighter-arbitrary-code.html
|
|
CVE-2020-23872 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml
|
|
CVE-2020-23872 - https://github.com/kermitt2/pdf2xml/issues/10
|
|
CVE-2020-23873 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml
|
|
CVE-2020-23873 - https://github.com/kermitt2/pdf2xml/issues/11
|
|
CVE-2020-23874 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml
|
|
CVE-2020-23874 - https://github.com/kermitt2/pdf2xml/issues/12
|
|
CVE-2020-23876 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml
|
|
CVE-2020-23876 - https://github.com/kermitt2/pdf2xml/issues/14
|
|
CVE-2020-23877 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml
|
|
CVE-2020-23877 - https://github.com/kermitt2/pdf2xml/issues/15
|
|
CVE-2020-23878 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2json
|
|
CVE-2020-23878 - https://github.com/flexpaper/pdf2json/issues/45
|
|
CVE-2020-23879 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2json
|
|
CVE-2020-23879 - https://github.com/flexpaper/pdf2json/issues/44
|
|
CVE-2020-23910 - https://github.com/vlm/asn1c/issues/396
|
|
CVE-2020-23911 - https://github.com/vlm/asn1c/issues/394
|
|
CVE-2020-23912 - https://github.com/axiomatic-systems/Bento4/issues/540
|
|
CVE-2020-23914 - https://github.com/yhirose/cpp-peglib/issues/121
|
|
CVE-2020-23915 - https://github.com/yhirose/cpp-peglib/issues/122
|
|
CVE-2020-23921 - https://github.com/Samuel-Tyler/fast_ber/issues/30
|
|
CVE-2020-23928 - https://github.com/gpac/gpac/issues/1568
|
|
CVE-2020-23928 - https://github.com/gpac/gpac/issues/1569
|
|
CVE-2020-23930 - https://github.com/gpac/gpac/issues/1565
|
|
CVE-2020-23931 - https://github.com/gpac/gpac/issues/1564
|
|
CVE-2020-23931 - https://github.com/gpac/gpac/issues/1567
|
|
CVE-2020-23932 - https://github.com/gpac/gpac/issues/1566
|
|
CVE-2020-23934 - https://www.exploit-db.com/exploits/48636
|
|
CVE-2020-23935 - http://packetstormsecurity.com/files/165215/Kabir-Alhasan-Student-Management-System-1.0-SQL-Injection.html
|
|
CVE-2020-23945 - https://github.com/VictorAlagwu/CMSsite/issues/14
|
|
CVE-2020-23957 - https://jayaramyalla.medium.com/cross-site-scripting-in-pega-cve-2020-23957-16d1c417da5f
|
|
CVE-2020-23966 - https://github.com/VictorAlagwu/CMSsite/issues/15
|
|
CVE-2020-23967 - https://www.youtube.com/watch?v=q7Kqi7kE59U
|
|
CVE-2020-23971 - https://packetstormsecurity.com/files/156889/Joomla-GMapFP-3.30-Arbitrary-File-Upload.html
|
|
CVE-2020-23972 - http://packetstormsecurity.com/files/159072/Joomla-GMapFP-J3.5-J3.5F-Arbitrary-File-Upload.html
|
|
CVE-2020-23972 - https://raw.githubusercontent.com/me4yoursecurity/Reports/master/README.md
|
|
CVE-2020-23973 - https://packetstormsecurity.com/files/157049/KandNconcepts-Club-CMS-1.1-1.2-Cross-Site-Scripting-SQL-Injection.html
|
|
CVE-2020-23974 - https://cxsecurity.com/issue/WLB-2020050071
|
|
CVE-2020-23974 - https://packetstormsecurity.com/files/157599/Create-Project-Manager-1.07-Cross-Site-Scripting-HTML-Injection.html
|
|
CVE-2020-23975 - https://cxsecurity.com/issue/WLB-2020030174
|
|
CVE-2020-23975 - https://packetstormsecurity.com/files/156948/Webexcels-Ecommerce-CMS-2.x-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2020-23976 - https://cxsecurity.com/issue/WLB-2020030174
|
|
CVE-2020-23976 - https://packetstormsecurity.com/files/156948/Webexcels-Ecommerce-CMS-2.x-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2020-23977 - https://packetstormsecurity.com/files/157049/KandNconcepts-Club-CMS-1.1-1.2-Cross-Site-Scripting-SQL-Injection.html
|
|
CVE-2020-23978 - https://cxsecurity.com/issue/WLB-2020030150
|
|
CVE-2020-23978 - https://packetstormsecurity.com/files/156939/Soluzione-Globale-Ecommerce-CMS-1-SQL-Injection.html
|
|
CVE-2020-23979 - https://packetstormsecurity.com/files/157094/13enforme-CMS-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2020-23980 - https://cxsecurity.com/issue/WLB-2020030177
|
|
CVE-2020-23980 - https://packetstormsecurity.com/files/156959/DesignMasterEvents-CMS-1.0-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2020-23981 - https://packetstormsecurity.com/files/157094/13enforme-CMS-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2020-23982 - https://cxsecurity.com/issue/WLB-2020030177
|
|
CVE-2020-23982 - https://packetstormsecurity.com/files/156959/DesignMasterEvents-CMS-1.0-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2020-23983 - https://packetstormsecurity.com/files/157594/iChat-1.6-Cross-Site-Scripting.html
|
|
CVE-2020-23984 - https://packetstormsecurity.com/files/157117/Online-Hotel-Booking-System-Pro-1.3-Cross-Site-Scripting.html
|
|
CVE-2020-23989 - https://gist.github.com/harsh-bothra/d8c86b8279b23ff6d371f832ba0a5b6b
|
|
CVE-2020-23992 - https://github.com/EmreOvunc/Nagios-XI-Reflected-XSS
|
|
CVE-2020-24000 - https://github.com/eyoucms/eyoucms/issues/13
|
|
CVE-2020-24003 - https://www.hdwsec.fr/blog/20200608-skype/
|
|
CVE-2020-24007 - https://github.com/inflixim4be/Brute-Force-on-Umanni-RH
|
|
CVE-2020-24008 - https://github.com/inflixim4be/User-Enumeration-on-Umanni-RH
|
|
CVE-2020-24026 - https://github.com/jianyan74/TinyShop
|
|
CVE-2020-24026 - https://github.com/jianyan74/TinyShop/issues/14
|
|
CVE-2020-24027 - http://lists.live555.com/pipermail/live-devel/2020-July/021662.html
|
|
CVE-2020-24033 - https://github.com/M0NsTeRRR/CVE-2020-24033
|
|
CVE-2020-24033 - https://github.com/M0NsTeRRR/S3900-24T4S-CSRF-vulnerability
|
|
CVE-2020-24034 - http://packetstormsecurity.com/files/159026/Sagemcom-F-ST-5280-Privilege-Escalation.html
|
|
CVE-2020-24034 - http://seclists.org/fulldisclosure/2020/Sep/3
|
|
CVE-2020-24034 - https://seclists.org/fulldisclosure/2020/Sep/3
|
|
CVE-2020-24036 - http://seclists.org/fulldisclosure/2021/Mar/31
|
|
CVE-2020-24036 - https://tech.feedyourhead.at/content/ForkCMS-PHP-Object-Injection-CVE-2020-24036
|
|
CVE-2020-24036 - https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-04
|
|
CVE-2020-24038 - https://github.com/Dmitriy-area51/Exploit/tree/master/CVE-2020-24038
|
|
CVE-2020-24045 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/
|
|
CVE-2020-24046 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/
|
|
CVE-2020-24088 - http://blog.rewolf.pl/blog/?p=1630
|
|
CVE-2020-24104 - http://n0hat.blogspot.com/2020/07/stored-cross-site-scripting-xss-at-pix.html
|
|
CVE-2020-24119 - https://github.com/upx/upx/issues/388
|
|
CVE-2020-24135 - https://github.com/vedees/wcms/issues/9
|
|
CVE-2020-24136 - https://github.com/vedees/wcms/issues/12
|
|
CVE-2020-24137 - https://github.com/vedees/wcms/issues/7
|
|
CVE-2020-24138 - https://github.com/vedees/wcms/issues/10
|
|
CVE-2020-24139 - https://github.com/vedees/wcms/issues/8
|
|
CVE-2020-24140 - https://github.com/vedees/wcms/issues/11
|
|
CVE-2020-24175 - https://gist.github.com/illikainen/ced14e08e00747fef613ba619bb25bb4
|
|
CVE-2020-24175 - https://illikainen.dev/advisories/014-yz1-izarc
|
|
CVE-2020-24186 - http://packetstormsecurity.com/files/162983/WordPress-wpDiscuz-7.0.4-Shell-Upload.html
|
|
CVE-2020-24186 - http://packetstormsecurity.com/files/163012/WordPress-wpDiscuz-7.0.4-Remote-Code-Execution.html
|
|
CVE-2020-24186 - http://packetstormsecurity.com/files/163302/WordPress-wpDiscuz-7.0.4-Shell-Upload.html
|
|
CVE-2020-24186 - https://www.wordfence.com/blog/2020/07/critical-arbitrary-file-upload-vulnerability-patched-in-wpdiscuz-plugin/
|
|
CVE-2020-24187 - https://github.com/Aurorainfinity/Poc/tree/master/jerryscript/NULL-dereference-ecma_get_lex_env_type
|
|
CVE-2020-24193 - https://www.exploit-db.com/exploits/48787
|
|
CVE-2020-24194 - https://cxsecurity.com/issue/WLB-2020090030
|
|
CVE-2020-24195 - https://packetstormsecurity.com/files/158704/Online-Bike-Rental-1.0-Shell-Upload.html
|
|
CVE-2020-24196 - https://packetstormsecurity.com/files/158683/Online-Bike-Rental-1.0-Shell-Upload.html
|
|
CVE-2020-24208 - https://packetstormsecurity.com/files/158684/Online-Shopping-Alphaware-1.0-SQL-Injection.html
|
|
CVE-2020-24208 - https://www.exploit-db.com/exploits/48725
|
|
CVE-2020-24213 - https://github.com/Fluorohydride/ygopro/issues/2314
|
|
CVE-2020-24214 - http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html
|
|
CVE-2020-24215 - http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html
|
|
CVE-2020-24217 - http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html
|
|
CVE-2020-24217 - http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html
|
|
CVE-2020-24219 - http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html
|
|
CVE-2020-24221 - https://github.com/miniupnp/ngiflib/issues/17
|
|
CVE-2020-24223 - http://packetstormsecurity.com/files/158728/Mara-CMS-7.5-Cross-Site-Scripting.html
|
|
CVE-2020-24223 - https://github.com/FreySolarEye/CVE/blob/master/Mara%20CMS%207.5%20-%20Cross%20Site%20Scripting
|
|
CVE-2020-24223 - https://www.exploit-db.com/exploits/48777
|
|
CVE-2020-24240 - https://lists.gnu.org/r/bug-bison/2020-07/msg00051.html
|
|
CVE-2020-24241 - https://bugzilla.nasm.us/show_bug.cgi?id=3392707
|
|
CVE-2020-24242 - https://bugzilla.nasm.us/show_bug.cgi?id=3392708
|
|
CVE-2020-24265 - https://github.com/appneta/tcpreplay/issues/616
|
|
CVE-2020-24266 - https://github.com/appneta/tcpreplay/issues/617
|
|
CVE-2020-24275 - https://github.com/swoole/swoole-src/pull/3539
|
|
CVE-2020-24285 - https://github.com/SecLoop/CVE/blob/main/telefone_ip_tip200.md
|
|
CVE-2020-24297 - https://the-hyperbolic.com/posts/vulnerabilities-in-tlwpa4220/
|
|
CVE-2020-24301 - https://github.com/jamesagnew/hapi-fhir/issues/2026
|
|
CVE-2020-24303 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md#710-beta-1-2020-07-01
|
|
CVE-2020-24307 - https://packetstormsecurity.com/files/170794/mRemoteNG-1.76.20-Privilege-Escalation.html
|
|
CVE-2020-24333 - https://www.arista.com/en/support/advisories-notices
|
|
CVE-2020-24342 - http://lua-users.org/lists/lua-l/2020-07/msg00052.html
|
|
CVE-2020-24343 - https://github.com/ccxvii/mujs/issues/136
|
|
CVE-2020-24344 - https://github.com/jerryscript-project/jerryscript/issues/3976
|
|
CVE-2020-24345 - https://github.com/jerryscript-project/jerryscript/issues/3977
|
|
CVE-2020-24346 - https://github.com/nginx/njs/issues/325
|
|
CVE-2020-24347 - https://github.com/nginx/njs/issues/323
|
|
CVE-2020-24348 - https://github.com/nginx/njs/issues/322
|
|
CVE-2020-24349 - https://github.com/nginx/njs/issues/324
|
|
CVE-2020-24365 - http://packetstormsecurity.com/files/160136/Gemtek-WVRTM-127ACN-01.01.02.141-Command-Injection.html
|
|
CVE-2020-24370 - http://lua-users.org/lists/lua-l/2020-07/msg00324.html
|
|
CVE-2020-24372 - https://github.com/LuaJIT/LuaJIT/issues/603
|
|
CVE-2020-24379 - https://github.com/vulnbe/poc-yaws-dav-xxe
|
|
CVE-2020-24379 - https://packetstormsecurity.com/files/159106/Yaws-2.0.7-XML-Injection-Command-Injection.html
|
|
CVE-2020-24379 - https://vuln.be/post/yaws-xxe-and-shell-injections/
|
|
CVE-2020-24381 - https://emaragkos.gr/cve-2020-24381/
|
|
CVE-2020-24381 - https://github.com/gunet/openeclass/issues/39
|
|
CVE-2020-24385 - http://www.midnightbsd.org/security/adv/MIDNIGHTBSD-SA-20:02.txt
|
|
CVE-2020-24386 - http://packetstormsecurity.com/files/160842/Dovecot-2.3.11.3-Access-Bypass.html
|
|
CVE-2020-24387 - https://blog.inhq.net/posts/yubico-libyubihsm-vuln/
|
|
CVE-2020-24388 - https://blog.inhq.net/posts/yubico-libyubihsm-vuln/
|
|
CVE-2020-24394 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.8
|
|
CVE-2020-24394 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=22cf8419f1319ff87ec759d0ebdff4cbafaee832
|
|
CVE-2020-24394 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-24395 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-026.txt
|
|
CVE-2020-24395 - https://www.syss.de/pentest-blog/
|
|
CVE-2020-24396 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-027.txt
|
|
CVE-2020-24396 - https://www.syss.de/pentest-blog/
|
|
CVE-2020-24437 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1156
|
|
CVE-2020-24548 - http://packetstormsecurity.com/files/158962/Ericom-Access-Server-9.2.0-Server-Side-Request-Forgery.html
|
|
CVE-2020-24548 - https://www.youtube.com/watch?v=oDTd-yRxVJ0
|
|
CVE-2020-24549 - https://www.exploit-db.com/exploits/48866
|
|
CVE-2020-24550 - https://labs.nettitude.com/blog/cve-2020-24550-open-redirect-in-episerver-find/
|
|
CVE-2020-24553 - http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
|
|
CVE-2020-24553 - http://seclists.org/fulldisclosure/2020/Sep/5
|
|
CVE-2020-24553 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-24553 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-24553 - https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
|
|
CVE-2020-24567 - https://www.cymaera.com/articles/everything.html
|
|
CVE-2020-24574 - https://github.com/jtesta/gog_galaxy_client_service_poc
|
|
CVE-2020-24574 - https://github.com/jtesta/gog_galaxy_client_service_poc/issues/1#issuecomment-926932218
|
|
CVE-2020-24574 - https://www.gog.com/galaxy
|
|
CVE-2020-24574 - https://www.positronsecurity.com/blog/2020-08-13-gog-galaxy_client-local-privilege-escalation_deuce/
|
|
CVE-2020-24576 - https://www.netskope.com
|
|
CVE-2020-24577 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/
|
|
CVE-2020-24577 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/
|
|
CVE-2020-24577 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28241
|
|
CVE-2020-24578 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/
|
|
CVE-2020-24578 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/
|
|
CVE-2020-24579 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/
|
|
CVE-2020-24579 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/
|
|
CVE-2020-24580 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/
|
|
CVE-2020-24580 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/
|
|
CVE-2020-24581 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/
|
|
CVE-2020-24581 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/
|
|
CVE-2020-24583 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-24584 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-24586 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
|
|
CVE-2020-24587 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
|
|
CVE-2020-24588 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
|
|
CVE-2020-24600 - https://cybersecurityworks.com/zerodays/cve-2020-24600-sql-injection-in-capexweb.html
|
|
CVE-2020-24601 - https://cybersecurityworks.com/zerodays/cve-2020-24601-ignite-realtime-openfire.html
|
|
CVE-2020-24601 - https://issues.igniterealtime.org/browse/OF-1963
|
|
CVE-2020-24602 - https://cybersecurityworks.com/zerodays/cve-2020-24602-ignite-realtime-openfire.html
|
|
CVE-2020-24602 - https://issues.igniterealtime.org/browse/OF-1963
|
|
CVE-2020-24604 - https://cybersecurityworks.com/zerodays/cve-2020-24604-ignite-realtime-openfire.html
|
|
CVE-2020-24604 - https://issues.igniterealtime.org/browse/OF-1963
|
|
CVE-2020-24609 - https://www.exploit-db.com/exploits/48753
|
|
CVE-2020-24609 - https://www.exploit-db.com/exploits/48785
|
|
CVE-2020-24613 - https://research.nccgroup.com/2020/08/24/technical-advisory-wolfssl-tls-1-3-client-man-in-the-middle-attack/
|
|
CVE-2020-24616 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-24616 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-24616 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-24616 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-24616 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-24616 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-24616 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-24621 - https://issues.openmrs.org/browse/HTML-730
|
|
CVE-2020-24622 - https://support.sonatype.com/hc/en-us/articles/360053516793
|
|
CVE-2020-24654 - https://kde.org/info/security/advisory-20200827-1.txt
|
|
CVE-2020-24700 - http://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html
|
|
CVE-2020-24700 - http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html
|
|
CVE-2020-24700 - http://seclists.org/fulldisclosure/2021/Jul/33
|
|
CVE-2020-24701 - http://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html
|
|
CVE-2020-24701 - http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html
|
|
CVE-2020-24701 - http://seclists.org/fulldisclosure/2021/Jul/33
|
|
CVE-2020-24707 - https://herolab.usd.de/security-advisories/usd-2020-0052/
|
|
CVE-2020-24708 - https://herolab.usd.de/security-advisories/usd-2020-0048/
|
|
CVE-2020-24709 - https://herolab.usd.de/security-advisories/usd-2020-0049/
|
|
CVE-2020-24710 - https://herolab.usd.de/security-advisories/usd-2020-0054/
|
|
CVE-2020-24711 - https://herolab.usd.de/security-advisories/usd-2020-0051/
|
|
CVE-2020-24712 - https://herolab.usd.de/security-advisories/usd-2020-0050/
|
|
CVE-2020-24713 - https://herolab.usd.de/security-advisories/usd-2020-0053/
|
|
CVE-2020-24716 - https://jira.ixsystems.com/browse/NAS-107270
|
|
CVE-2020-24717 - https://jira.ixsystems.com/browse/NAS-107270
|
|
CVE-2020-24721 - http://packetstormsecurity.com/files/159419/Corona-Exposure-Notifications-API-Data-Leakage.html
|
|
CVE-2020-24722 - http://packetstormsecurity.com/files/159496/GAEN-Protocol-Metadata-Deanonymization-Risk-Score-Inflation.html
|
|
CVE-2020-24723 - https://phpgurukul.com/
|
|
CVE-2020-24723 - https://systemweakness.com/cve-2020-24723-89ea76588286
|
|
CVE-2020-24740 - https://github.com/pluck-cms/pluck/issues/81
|
|
CVE-2020-24750 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-24750 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-24750 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-24750 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-24750 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-24750 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-24753 - https://warcollar.com/cve-2020-24753.html
|
|
CVE-2020-24755 - https://www.youtube.com/watch?v=T41h4yeh9dk
|
|
CVE-2020-24765 - https://github.com/trump88/CVE-2020-24765
|
|
CVE-2020-24772 - https://github.com/Dreamacro/clash/issues/910
|
|
CVE-2020-24786 - https://medium.com/@frycos/another-zoho-manageengine-story-7b472f1515f5
|
|
CVE-2020-24791 - https://github.com/daylightstudio/FUEL-CMS/issues/561
|
|
CVE-2020-24791 - https://github.com/leerina/vulnerability/blob/master/Fuel%20CMS%201.4.8%20SQLi%20vulnerability.txt
|
|
CVE-2020-24791 - https://www.exploit-db.com/exploits/48778
|
|
CVE-2020-24794 - https://devnet.kentico.com/download/hotfixes
|
|
CVE-2020-24821 - https://github.com/aclements/libelfin/issues/52
|
|
CVE-2020-24841 - https://www.exploit-db.com/exploits/48757
|
|
CVE-2020-24842 - https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-15-288-01
|
|
CVE-2020-24847 - https://github.com/xtr4nge/FruityWifi/issues/277
|
|
CVE-2020-24860 - http://packetstormsecurity.com/files/159434/CMS-Made-Simple-2.2.14-Cross-Site-Scripting.html
|
|
CVE-2020-24860 - https://www.exploit-db.com/exploits/48851
|
|
CVE-2020-24860 - https://www.youtube.com/watch?v=M6D7DmmjLak&t=22s
|
|
CVE-2020-24861 - https://www.exploit-db.com/exploits/48850
|
|
CVE-2020-24861 - https://www.youtube.com/watch?v=8IMfD5KGt_U
|
|
CVE-2020-24862 - https://www.exploit-db.com/exploits/48752
|
|
CVE-2020-24870 - https://github.com/LibRaw/LibRaw/issues/330
|
|
CVE-2020-24876 - https://www.vaadata.com/blog/hardcoded-secret-leads-to-account-takeover/
|
|
CVE-2020-24881 - http://packetstormsecurity.com/files/160995/osTicket-1.14.2-Server-Side-Request-Forgery.html
|
|
CVE-2020-24881 - https://blackbatsec.medium.com/cve-2020-24881-server-side-request-forgery-in-osticket-eea175e147f0
|
|
CVE-2020-24889 - https://github.com/LibRaw/LibRaw/issues/334
|
|
CVE-2020-24890 - https://github.com/LibRaw/LibRaw/issues/335
|
|
CVE-2020-24897 - https://stiltsoft.atlassian.net/browse/VD-2
|
|
CVE-2020-24898 - https://stiltsoft.atlassian.net/browse/VD-1
|
|
CVE-2020-24899 - https://code610.blogspot.com/2020/08/postauth-rce-in-nagios-572.html
|
|
CVE-2020-24900 - https://packetstormsecurity.com/files/159477/Krpano-Panorama-Viewer-1.20.8-Cross-Site-Scripting.html
|
|
CVE-2020-24901 - https://packetstormsecurity.com/files/159477/Krpano-Panorama-Viewer-1.20.8-Cross-Site-Scripting.html
|
|
CVE-2020-24902 - https://dl.packetstormsecurity.net/1804-exploits/quixplorer241beta-xss.txt
|
|
CVE-2020-24903 - https://seclists.org/bugtraq/2016/Mar/104
|
|
CVE-2020-24904 - https://github.com/davesteele/gnome-gmail/issues/84
|
|
CVE-2020-24908 - https://compass-security.com/fileadmin/Research/Advisories/2020-05_CSNC-2020-005_Checkmk_Local_Privilege_Escalation.txt
|
|
CVE-2020-24912 - http://seclists.org/fulldisclosure/2021/Mar/30
|
|
CVE-2020-24912 - https://tech.feedyourhead.at/content/QCubed-Cross-Site-Scripting-CVE-2020-24912
|
|
CVE-2020-24912 - https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03
|
|
CVE-2020-24913 - http://seclists.org/fulldisclosure/2021/Mar/30
|
|
CVE-2020-24916 - https://github.com/vulnbe/poc-yaws-cgi-shell-injection
|
|
CVE-2020-24916 - https://packetstormsecurity.com/files/159106/Yaws-2.0.7-XML-Injection-Command-Injection.html
|
|
CVE-2020-24916 - https://vuln.be/post/yaws-xxe-and-shell-injections/
|
|
CVE-2020-24918 - https://somersetrecon.squarespace.com/blog/2021/hacking-the-furbo-part-1
|
|
CVE-2020-24918 - https://www.somersetrecon.com/blog
|
|
CVE-2020-24922 - https://github.com/xuxueli/xxl-job/issues/1921
|
|
CVE-2020-24930 - https://github.com/wuzhicms/wuzhicms/issues/191
|
|
CVE-2020-24932 - https://www.exploit-db.com/exploits/48758
|
|
CVE-2020-24939 - https://github.com/stampit-org/supermixer/issues/9
|
|
CVE-2020-24948 - http://packetstormsecurity.com/files/160850/WordPress-Autoptimize-Shell-Upload.html
|
|
CVE-2020-24948 - https://wpvulndb.com/vulnerabilities/10372
|
|
CVE-2020-24949 - http://packetstormsecurity.com/files/162852/PHPFusion-9.03.50-Remote-Code-Execution.html
|
|
CVE-2020-24955 - https://www.youtube.com/watch?v=jdcqbev-H5I
|
|
CVE-2020-24963 - https://medium.com/@ex.mi/php-best-support-system-v3-0-4-authenticated-persistent-xss-dfe6d4a06f75
|
|
CVE-2020-24977 - https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
|
|
CVE-2020-24977 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-24977 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-24977 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-24978 - https://bugzilla.nasm.us/show_bug.cgi?id=3392712
|
|
CVE-2020-24982 - https://c41nc.co.uk/cve-2020-24982/
|
|
CVE-2020-24983 - https://c41nc.co.uk/cve-2020-24983/
|
|
CVE-2020-24985 - https://c41nc.co.uk/cve-2020-24985/
|
|
CVE-2020-24990 - http://packetstormsecurity.com/files/159699/QSC-Q-SYS-Core-Manager-8.2.1-Directory-Traversal.html
|
|
CVE-2020-24994 - https://github.com/libass/libass/issues/422
|
|
CVE-2020-24994 - https://github.com/libass/libass/issues/422#issuecomment-806002919
|
|
CVE-2020-24994 - https://github.com/libass/libass/issues/423
|
|
CVE-2020-24996 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42028
|
|
CVE-2020-24999 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42029
|
|
CVE-2020-25004 - https://www.exploit-db.com/
|
|
CVE-2020-25005 - https://www.exploit-db.com/
|
|
CVE-2020-25006 - https://www.exploit-db.com/
|
|
CVE-2020-25010 - https://github.com/AnfieldQi/CVE_list/blob/master/CVE-2020-25010.md
|
|
CVE-2020-25011 - https://github.com/AnfieldQi/CVE_list/blob/master/CVE-2020-25011.md
|
|
CVE-2020-25015 - http://packetstormsecurity.com/files/159936/Genexis-Platinum-4410-P4410-V2-1.28-Missing-Access-Control-CSRF.html
|
|
CVE-2020-25019 - https://security.stackexchange.com/questions/225799
|
|
CVE-2020-25020 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-25021 - http://packetstormsecurity.com/files/159057/Noise-Java-ChaChaPolyCipherState.encryptWithAd-Insufficient-Boundary-Checks.html
|
|
CVE-2020-25021 - http://seclists.org/fulldisclosure/2020/Sep/14
|
|
CVE-2020-25022 - http://packetstormsecurity.com/files/159055/Noise-Java-AESGCMFallbackCipherState.encryptWithAd-Insufficient-Boundary-Checks.html
|
|
CVE-2020-25022 - http://seclists.org/fulldisclosure/2020/Sep/11
|
|
CVE-2020-25023 - http://packetstormsecurity.com/files/159056/Noise-Java-AESGCMOnCtrCipherState.encryptWithAd-Insufficient-Boundary-Checks.html
|
|
CVE-2020-25023 - http://seclists.org/fulldisclosure/2020/Sep/13
|
|
CVE-2020-25034 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-031.txt
|
|
CVE-2020-25042 - http://packetstormsecurity.com/files/159304/MaraCMS-7.5-Remote-Code-Execution.html
|
|
CVE-2020-25042 - https://www.exploit-db.com/exploits/48780
|
|
CVE-2020-25043 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#290720
|
|
CVE-2020-25044 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#290720
|
|
CVE-2020-25045 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#290720
|
|
CVE-2020-25046 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-25047 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-25048 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-25049 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-25050 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-25051 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-25052 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-25053 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-25054 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-25055 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-25056 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-25068 - https://www.youtube.com/watch?v=CLAHE0qUHXs
|
|
CVE-2020-25071 - https://medium.com/@muffydium/a-tale-of-reflected-xss-to-stored-which-ultimately-resulted-into-a-cve-82981f8648d7
|
|
CVE-2020-2510 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25106 - http://packetstormsecurity.com/files/160666/SUPREMO-4.1.3.2348-Privilege-Escalation.html
|
|
CVE-2020-25106 - https://seclists.org/fulldisclosure/2020/Dec/42
|
|
CVE-2020-2511 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2512 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2513 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2514 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-25142 - https://gist.github.com/ahpaleus/76aa81ec82644a89c2088ab3ea99f07c
|
|
CVE-2020-2515 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2516 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2517 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2518 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2519 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25203 - http://packetstormsecurity.com/files/159264/Framer-Preview-12-Content-Injection.html
|
|
CVE-2020-25204 - http://packetstormsecurity.com/files/159747/God-Kings-0.60.1-Notification-Spoofing.html
|
|
CVE-2020-25205 - https://labs.f-secure.com/advisories/
|
|
CVE-2020-25206 - https://labs.f-secure.com/advisories/
|
|
CVE-2020-25211 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1cc5ef91d2ff94d2bf2de3b3585423e8a1051cb6
|
|
CVE-2020-25212 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.3
|
|
CVE-2020-25212 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b4487b93545214a9db8cbf32e86411677b0cca21
|
|
CVE-2020-25213 - http://packetstormsecurity.com/files/160003/WordPress-File-Manager-6.8-Remote-Code-Execution.html
|
|
CVE-2020-25213 - http://packetstormsecurity.com/files/171650/WordPress-File-Manager-6.9-Shell-Upload.html
|
|
CVE-2020-25213 - https://hotforsecurity.bitdefender.com/blog/wordpress-websites-attacked-via-file-manager-plugin-vulnerability-24048.html
|
|
CVE-2020-25213 - https://seravo.com/blog/0-day-vulnerability-in-wp-file-manager/
|
|
CVE-2020-25213 - https://wordfence.com/blog/2020/09/700000-wordpress-users-affected-by-zero-day-vulnerability-in-file-manager-plugin/
|
|
CVE-2020-2522 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-25220 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.194
|
|
CVE-2020-25220 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.233
|
|
CVE-2020-25221 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.7
|
|
CVE-2020-25223 - http://packetstormsecurity.com/files/164697/Sophos-UTM-WebAdmin-SID-Command-Injection.html
|
|
CVE-2020-25223 - https://community.sophos.com/b/security-blog
|
|
CVE-2020-25223 - https://community.sophos.com/b/security-blog/posts/advisory-resolved-rce-in-sg-utm-webadmin-cve-2020-25223
|
|
CVE-2020-2524 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-25247 - http://seclists.org/fulldisclosure/2020/Oct/9
|
|
CVE-2020-25248 - http://seclists.org/fulldisclosure/2020/Oct/9
|
|
CVE-2020-25248 - https://seclists.org/fulldisclosure/2020/Oct/9
|
|
CVE-2020-25254 - http://seclists.org/fulldisclosure/2020/Oct/9
|
|
CVE-2020-25254 - https://seclists.org/fulldisclosure/2020/Oct/9
|
|
CVE-2020-25265 - https://github.com/refi64/CVE-2020-25265-25266
|
|
CVE-2020-25266 - https://github.com/refi64/CVE-2020-25265-25266
|
|
CVE-2020-25267 - https://medium.com/bugbountywriteup/exploiting-ilias-learning-management-system-4eda9e120620
|
|
CVE-2020-25268 - https://medium.com/bugbountywriteup/exploiting-ilias-learning-management-system-4eda9e120620
|
|
CVE-2020-2527 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25270 - http://packetstormsecurity.com/files/159614/Hostel-Management-System-2.1-Cross-Site-Scripting.html
|
|
CVE-2020-25270 - https://phpgurukul.com
|
|
CVE-2020-25271 - https://phpgurukul.com
|
|
CVE-2020-25275 - http://packetstormsecurity.com/files/160841/Dovecot-2.3.11.3-Denial-Of-Service.html
|
|
CVE-2020-25278 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-25279 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-25280 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-25284 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f44d04e696feaf13d192d942c4f14ad2e117065a
|
|
CVE-2020-25285 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.8
|
|
CVE-2020-25285 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17743798d81238ab13050e8e2833699b54e15467
|
|
CVE-2020-25287 - https://github.com/jenaye/pligg/blob/master/README.md
|
|
CVE-2020-25288 - https://mantisbt.org/bugs/view.php?id=27275
|
|
CVE-2020-25289 - http://zeifan.my/security/arbitrary%20file/eop/2020/07/21/avast-secureline-vpn-arb-file-eop.html
|
|
CVE-2020-25291 - http://zeifan.my/security/rce/heap/2020/09/03/wps-rce-heap.html
|
|
CVE-2020-2530 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2531 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2533 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2534 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25343 - https://www.exploit-db.com/exploits/48773
|
|
CVE-2020-2535 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2536 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25362 - https://www.exploit-db.com/exploits/48771
|
|
CVE-2020-25366 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2020-25367 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2020-25368 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2020-2537 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25374 - https://medium.com/@virajmota38/full-path-disclosure-8a9358e5a867
|
|
CVE-2020-2538 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25385 - https://github.com/EmreOvunc/Nagios-Log-Server-2.1.7-Persistent-Cross-Site-Scripting
|
|
CVE-2020-2539 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25398 - https://github.com/h3llraiser/CVE-2020-25398
|
|
CVE-2020-25399 - https://github.com/h3llraiser/CVE-2020-25399
|
|
CVE-2020-2540 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25408 - https://nikhilkumar01.medium.com/cve-2020-25408-97eb7bcc23a6
|
|
CVE-2020-25409 - https://nikhilkumar01.medium.com/cve-2020-25409-5ecbe735c004
|
|
CVE-2020-2541 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25411 - https://nikhilkumar01.medium.com/cve-2020-25411-a245bdf88fb5
|
|
CVE-2020-25412 - https://sourceforge.net/p/gnuplot/bugs/2303/
|
|
CVE-2020-2542 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25427 - https://github.com/gpac/gpac/issues/1406
|
|
CVE-2020-2543 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2544 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25444 - https://medium.com/@singh.satyam158/vulnerabilities-in-booking-core-1-7-d85d1dfae44e
|
|
CVE-2020-25445 - https://medium.com/@singh.satyam158/vulnerabilities-in-booking-core-1-7-d85d1dfae44e
|
|
CVE-2020-25449 - https://packetstormsecurity.com/files/159070/Cabot-0.11.12-Cross-Site-Scripting.html
|
|
CVE-2020-25449 - https://www.exploit-db.com/exploits/48791
|
|
CVE-2020-25449 - https://www.exploitalert.com/view-details.html?id=36106
|
|
CVE-2020-2545 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25453 - http://packetstormsecurity.com/files/159237/BlackCat-CMS-1.3.6-Cross-Site-Request-Forgery.html
|
|
CVE-2020-25453 - https://github.com/BlackCatDevelopment/BlackCatCMS/issues/389
|
|
CVE-2020-25454 - http://packetstormsecurity.com/files/160107/Grocy-Household-Management-Solution-2.7.1-Cross-Site-Scripting.html
|
|
CVE-2020-2546 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25461 - https://github.com/Moddable-OpenSource/moddable/issues/441
|
|
CVE-2020-25462 - https://github.com/Moddable-OpenSource/moddable/issues/432
|
|
CVE-2020-25463 - https://github.com/Moddable-OpenSource/moddable/issues/440
|
|
CVE-2020-25464 - https://github.com/Moddable-OpenSource/moddable/issues/431
|
|
CVE-2020-25465 - https://github.com/Moddable-OpenSource/moddable/issues/442
|
|
CVE-2020-25466 - https://github.com/crmeb/CRMEB/issues/22
|
|
CVE-2020-25467 - https://bugs.launchpad.net/ubuntu/+source/lrzip/+bug/1893641
|
|
CVE-2020-25467 - https://github.com/ckolivas/lrzip/issues/163
|
|
CVE-2020-2547 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25472 - https://news.websec.nl
|
|
CVE-2020-25472 - https://websec.nl
|
|
CVE-2020-25472 - https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752
|
|
CVE-2020-25473 - https://news.websec.nl/
|
|
CVE-2020-25473 - https://websec.nl/
|
|
CVE-2020-25473 - https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752
|
|
CVE-2020-25474 - https://news.websec.nl
|
|
CVE-2020-25474 - https://websec.nl
|
|
CVE-2020-25474 - https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752
|
|
CVE-2020-25475 - https://websec.nl/
|
|
CVE-2020-25475 - https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752
|
|
CVE-2020-2548 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2549 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25494 - http://packetstormsecurity.com/files/160635/SCO-Openserver-5.0.7-Command-Injection.html
|
|
CVE-2020-25494 - https://github.com/Ramikan/Vulnerabilities/blob/master/SCO%20Openserver%20OS%20Command%20Injection%20Vulnerability
|
|
CVE-2020-25495 - http://packetstormsecurity.com/files/160634/SCO-Openserver-5.0.7-Cross-Site-Scripting.html
|
|
CVE-2020-25495 - https://github.com/Ramikan/Vulnerabilities/blob/master/SCO%20Openserver%20XSS%20%26%20HTML%20Injection%20vulnerability
|
|
CVE-2020-25498 - https://github.com/the-girl-who-lived/CVE-2020-25498
|
|
CVE-2020-25498 - https://youtu.be/qeVHvmS5wtI
|
|
CVE-2020-25498 - https://youtu.be/u_6yBIMF74A
|
|
CVE-2020-2550 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25506 - https://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675
|
|
CVE-2020-25506 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2020-25507 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-002.md
|
|
CVE-2020-25507 - https://sick.codes/sick-2020-002/
|
|
CVE-2020-2551 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25516 - https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0781
|
|
CVE-2020-25516 - https://github.com/piuppi/Proof-of-Concepts/blob/main/WSO2/CVE-2020-25516.md
|
|
CVE-2020-2552 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2553 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-25538 - http://packetstormsecurity.com/files/161162/CMSUno-1.6.2-Remote-Code-Execution.html
|
|
CVE-2020-25538 - https://fatihhcelik.blogspot.com/2020/09/cmsuno-162-remote-code-execution_30.html
|
|
CVE-2020-25540 - http://packetstormsecurity.com/files/159177/ThinkAdmin-6-Arbitrary-File-Read.html
|
|
CVE-2020-2555 - http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html
|
|
CVE-2020-2555 - http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html
|
|
CVE-2020-2555 - http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html
|
|
CVE-2020-2555 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2555 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-2555 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2555 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2020-2555 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-25557 - http://packetstormsecurity.com/files/161162/CMSUno-1.6.2-Remote-Code-Execution.html
|
|
CVE-2020-25557 - https://fatihhcelik.blogspot.com/2020/09/cmsuno-162-remote-code-execution.html
|
|
CVE-2020-2556 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25560 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25560-sapphireims-unauthenticated-remote-command-execution-on-server/
|
|
CVE-2020-25561 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25561-sapphireims-hardcoded-credentials/
|
|
CVE-2020-25562 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25562-sapphireims-csrf/
|
|
CVE-2020-25563 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25563-sapphireims-unauthenticated-remote-command-execution-create-local-admin-on-clients/
|
|
CVE-2020-25564 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25564-sapphireims-unprivileged-user-remote-command-execution-create-local-admin-on-clients/
|
|
CVE-2020-25565 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25565-sapphireims-unprivileged-user-remote-command-execution-on-server/
|
|
CVE-2020-25566 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25566-sapphireims-unauthenticated-account-takeover/
|
|
CVE-2020-2557 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2558 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2559 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25592 - http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html
|
|
CVE-2020-25593 - https://www.acronis.com/en-us/blog/
|
|
CVE-2020-2560 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2561 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2562 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2563 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25638 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-25638 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-25638 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-2564 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25641 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124
|
|
CVE-2020-25643 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105
|
|
CVE-2020-25645 - http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html
|
|
CVE-2020-25648 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-25648 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-25648 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-25649 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-25649 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-25649 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-25649 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-25649 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-25649 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-2565 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25656 - https://lkml.org/lkml/2020/10/16/84
|
|
CVE-2020-25659 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-25659 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-2566 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25663 - https://bugzilla.redhat.com/show_bug.cgi?id=1891601
|
|
CVE-2020-25663 - https://github.com/ImageMagick/ImageMagick/issues/1723
|
|
CVE-2020-25663 - https://github.com/ImageMagick/ImageMagick/issues/1723#issuecomment-718275153
|
|
CVE-2020-25668 - http://www.openwall.com/lists/oss-security/2020/10/30/1
|
|
CVE-2020-25668 - http://www.openwall.com/lists/oss-security/2020/11/04/3
|
|
CVE-2020-25668 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=90bfdeef83f1d6c696039b6a917190dcbbad3220
|
|
CVE-2020-25668 - https://www.openwall.com/lists/oss-security/2020/10/30/1,
|
|
CVE-2020-25668 - https://www.openwall.com/lists/oss-security/2020/11/04/3,
|
|
CVE-2020-25669 - http://www.openwall.com/lists/oss-security/2020/11/05/2
|
|
CVE-2020-25669 - http://www.openwall.com/lists/oss-security/2020/11/20/5
|
|
CVE-2020-25669 - https://www.openwall.com/lists/oss-security/2020/11/05/2,
|
|
CVE-2020-25669 - https://www.openwall.com/lists/oss-security/2020/11/20/5,
|
|
CVE-2020-2567 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2568 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2569 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2570 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25704 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00
|
|
CVE-2020-2571 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2572 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2573 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25733 - https://medium.com/@tehwinsam/webtareas-2-1-c8b406c68c2a
|
|
CVE-2020-25733 - https://sourceforge.net/projects/webtareas/files/
|
|
CVE-2020-25734 - https://medium.com/@tehwinsam/webtareas-2-1-c8b406c68c2a
|
|
CVE-2020-25734 - https://sourceforge.net/projects/webtareas/files/
|
|
CVE-2020-25735 - https://medium.com/@tehwinsam/webtareas-2-1-c8b406c68c2a
|
|
CVE-2020-25735 - https://sourceforge.net/projects/webtareas/files/
|
|
CVE-2020-25736 - http://packetstormsecurity.com/files/170246/Acronis-TrueImage-XPC-Privilege-Escalation.html
|
|
CVE-2020-25736 - https://www.acronis.com/en-us/blog/
|
|
CVE-2020-2574 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25744 - https://medium.com/@thebinary0x1/safervpn-for-windows-arbitrary-file-overwrite-dos-bdc88fdb5ead
|
|
CVE-2020-25744 - https://www.youtube.com/watch?v=0QdRJdA_aos
|
|
CVE-2020-25746 - https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/878641153/v1.40.9
|
|
CVE-2020-2575 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-25751 - https://geekwire.eu/2020/09/14/joomla-pago-commerce-2-5-9-0-sql-injection-authenticated/
|
|
CVE-2020-25751 - https://www.exploit-db.com/exploits/48811
|
|
CVE-2020-25752 - https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-fake-clean-energy-credits-4a7322e7661a
|
|
CVE-2020-25753 - https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-fake-clean-energy-credits-4a7322e7661a
|
|
CVE-2020-25754 - https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-fake-clean-energy-credits-4a7322e7661a
|
|
CVE-2020-25755 - https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-fake-clean-energy-credits-4a7322e7661a
|
|
CVE-2020-25757 - https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/
|
|
CVE-2020-25758 - https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/
|
|
CVE-2020-25759 - https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/
|
|
CVE-2020-2576 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25760 - http://packetstormsecurity.com/files/159262/Visitor-Management-System-In-PHP-1.0-SQL-Injection.html
|
|
CVE-2020-25760 - http://packetstormsecurity.com/files/159637/Visitor-Management-System-In-PHP-1.0-SQL-Injection.html
|
|
CVE-2020-25760 - http://seclists.org/fulldisclosure/2020/Sep/43
|
|
CVE-2020-25760 - https://packetstormsecurity.com/files/author/15149/
|
|
CVE-2020-25761 - http://packetstormsecurity.com/files/159263/Visitor-Management-System-In-PHP-1.0-Cross-Site-Scripting.html
|
|
CVE-2020-25761 - http://seclists.org/fulldisclosure/2020/Sep/45
|
|
CVE-2020-25761 - https://packetstormsecurity.com/files/author/15149/
|
|
CVE-2020-25762 - http://packetstormsecurity.com/files/159261/Seat-Reservation-System-1.0-SQL-Injection.html
|
|
CVE-2020-25762 - http://seclists.org/fulldisclosure/2020/Sep/42
|
|
CVE-2020-25762 - https://packetstormsecurity.com/files/author/15149
|
|
CVE-2020-25763 - http://packetstormsecurity.com/files/159260/Seat-Reservation-System-1.0-Shell-Upload.html
|
|
CVE-2020-25763 - http://seclists.org/fulldisclosure/2020/Sep/41
|
|
CVE-2020-25763 - https://packetstormsecurity.com/files/author/15149
|
|
CVE-2020-25765 - https://www.westerndigital.com/support/productsecurity
|
|
CVE-2020-25765 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114
|
|
CVE-2020-25767 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
|
CVE-2020-25767 - https://www.kb.cert.org/vuls/id/608209
|
|
CVE-2020-2577 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2578 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25782 - https://github.com/tezeb/accfly/blob/master/Readme.md
|
|
CVE-2020-25783 - https://github.com/tezeb/accfly/blob/master/Readme.md
|
|
CVE-2020-25784 - https://github.com/tezeb/accfly/blob/master/Readme.md
|
|
CVE-2020-25785 - https://github.com/tezeb/accfly/blob/master/Readme.md
|
|
CVE-2020-25786 - https://github.com/sek1th/iot/blob/master/DIR-816L_XSS.md
|
|
CVE-2020-25786 - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10190
|
|
CVE-2020-25787 - http://packetstormsecurity.com/files/161606/TinyTinyRSS-Remote-Code-Execution.html
|
|
CVE-2020-2579 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25790 - http://packetstormsecurity.com/files/159503/Typesetter-CMS-5.1-Remote-Code-Execution.html
|
|
CVE-2020-25790 - http://packetstormsecurity.com/files/159615/Typesetter-CMS-5.1-Remote-Code-Execution.html
|
|
CVE-2020-25790 - https://github.com/Typesetter/Typesetter/issues/674
|
|
CVE-2020-2580 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2581 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2582 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25820 - http://packetstormsecurity.com/files/159667/BigBlueButton-2.2.25-File-Disclosure-Server-Side-Request-Forgery.html
|
|
CVE-2020-25820 - https://www.redteam-pentesting.de/advisories/rt-sa-2020-005
|
|
CVE-2020-2583 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25830 - https://mantisbt.org/bugs/view.php?id=27304
|
|
CVE-2020-2584 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2585 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25858 - http://vdoo.com/blog/qualcomm-qcmap-vulnerabilities
|
|
CVE-2020-25859 - http://vdoo.com/blog/qualcomm-qcmap-vulnerabilities
|
|
CVE-2020-2586 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25860 - https://github.com/rauc/rauc/security/advisories/GHSA-cgf3-h62j-w9vv
|
|
CVE-2020-25860 - https://www.vdoo.com/blog/cve-2020-25860-significant-vulnerability-discovered-rauc-embedded-firmware-update-framework
|
|
CVE-2020-25862 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-25863 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-25866 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-2587 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2588 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25889 - http://packetstormsecurity.com/files/160397/Online-Bus-Booking-System-Project-Using-PHP-MySQL-1.0-SQL-Injection.html
|
|
CVE-2020-25889 - http://seclists.org/fulldisclosure/2020/Dec/4
|
|
CVE-2020-25889 - https://seclists.org/fulldisclosure/2020/Dec/4
|
|
CVE-2020-2589 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25890 - https://vitor-santos.medium.com/xss-in-kyocera-printer-ecosys-m2640idw-cf6d3bc525e3
|
|
CVE-2020-2590 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25901 - http://packetstormsecurity.com/files/160631/Spiceworks-7.5-HTTP-Header-Injection.html
|
|
CVE-2020-25901 - https://frontend.spiceworks.com/topic/2309457-desktop-host-header-injection-vulnerability
|
|
CVE-2020-25905 - https://packetstormsecurity.com/files/159132/Mobile-Shop-System-1.0-SQL-Injection.html
|
|
CVE-2020-25905 - https://www.exploit-db.com/exploits/48916
|
|
CVE-2020-2591 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25915 - https://github.com/thinkcmf/thinkcmf/issues/675
|
|
CVE-2020-25917 - http://packetstormsecurity.com/files/160652/Stratodesk-NoTouch-Center-Privilege-Escalation.html
|
|
CVE-2020-2592 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25925 - https://ashketchum.medium.com/cross-site-scripting-xss-in-webmail-calender-in-icewarp-webclient-cve-2020-25925-67e1cbc40bd9
|
|
CVE-2020-25926 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
|
CVE-2020-25926 - https://www.kb.cert.org/vuls/id/608209
|
|
CVE-2020-25927 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
|
CVE-2020-25927 - https://www.kb.cert.org/vuls/id/608209
|
|
CVE-2020-25928 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
|
CVE-2020-25928 - https://www.kb.cert.org/vuls/id/608209
|
|
CVE-2020-2593 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2594 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2595 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25950 - https://www.exploit-db.com/exploits/49369
|
|
CVE-2020-25952 - https://phpgurukul.com/
|
|
CVE-2020-25952 - https://systemweakness.com/cve-2020-25952-f60fff8ffac
|
|
CVE-2020-25952 - https://www.exploit-db.com/exploits/49052
|
|
CVE-2020-25955 - http://packetstormsecurity.com/files/160398/Student-Management-System-Project-PHP-1.0-Cross-Site-Scripting.html
|
|
CVE-2020-25955 - http://seclists.org/fulldisclosure/2020/Dec/4
|
|
CVE-2020-25955 - https://seclists.org/fulldisclosure/2020/Dec/4
|
|
CVE-2020-2596 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25967 - https://www.cnpanda.net/codeaudit/777.html
|
|
CVE-2020-2597 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2598 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25985 - https://www.exploit-db.com/exploits/48848
|
|
CVE-2020-25986 - http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html
|
|
CVE-2020-25987 - http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html
|
|
CVE-2020-25988 - https://medium.com/@niteshsurana/424f0db73129
|
|
CVE-2020-25988 - https://www.exploit-db.com/exploits/49075
|
|
CVE-2020-25988 - https://youtu.be/GOMLavacqSI
|
|
CVE-2020-25989 - https://vkas-afk.github.io/vuln-disclosures/
|
|
CVE-2020-2599 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-25990 - https://www.exploit-db.com/exploits/48849
|
|
CVE-2020-2600 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26006 - https://nikhilkumar01.medium.com/cve-2020-26006-31f847e16019
|
|
CVE-2020-2601 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2602 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2603 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2604 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2604 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2020-26045 - https://github.com/daylightstudio/FUEL-CMS/issues/575
|
|
CVE-2020-26048 - https://github.com/CuppaCMS/CuppaCMS/issues/7
|
|
CVE-2020-26049 - https://hardik-solanki.medium.com/html-injection-stored-which-ultimately-resulted-into-a-cve-2020-26049-61c1a47dc2e8
|
|
CVE-2020-2605 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26050 - https://thebinary0x1.medium.com/cve-2020-26050-safervpn-for-windows-local-privilege-escalation-da069bb1373c
|
|
CVE-2020-26051 - https://www.exploit-db.com/exploits/48593
|
|
CVE-2020-26052 - https://www.exploit-db.com/exploits/48522
|
|
CVE-2020-2606 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26061 - https://github.com/missing0x00/CVE-2020-26061
|
|
CVE-2020-2607 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2608 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26088 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.2
|
|
CVE-2020-2609 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2610 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2611 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26116 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-2612 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26124 - http://packetstormsecurity.com/files/160223/OpenMediaVault-rpc.php-Authenticated-PHP-Code-Injection.html
|
|
CVE-2020-2613 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26130 - https://github.com/an0ry/advisories
|
|
CVE-2020-26131 - https://github.com/an0ry/advisories
|
|
CVE-2020-26132 - https://github.com/an0ry/advisories
|
|
CVE-2020-26133 - https://github.com/an0ry/advisories
|
|
CVE-2020-26137 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-26137 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-26139 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
|
|
CVE-2020-2614 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26140 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
|
|
CVE-2020-26141 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
|
|
CVE-2020-26142 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
|
|
CVE-2020-26143 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
|
|
CVE-2020-26144 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
|
|
CVE-2020-26146 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
|
|
CVE-2020-26147 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
|
|
CVE-2020-2615 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26153 - https://labs.nettitude.com/blog/cve-2020-26153-event-espresso-core-cross-site-scripting/
|
|
CVE-2020-2616 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26164 - https://github.com/KDE/kdeconnect-kde/commit/8112729eb0f13e6947984416118531078e65580d
|
|
CVE-2020-26165 - http://packetstormsecurity.com/files/160733/qdPM-9.1-PHP-Object-Injection.html
|
|
CVE-2020-26165 - http://seclists.org/fulldisclosure/2021/Jan/10
|
|
CVE-2020-26167 - https://github.com/daylightstudio/FUEL-CMS/
|
|
CVE-2020-26168 - https://hazelcast.zendesk.com/hc/en-us/articles/360050161951--IMDG-Enterprise-4-0-4-0-1-4-0-2-LDAP-Authentication-Bypass
|
|
CVE-2020-2617 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26171 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/
|
|
CVE-2020-26172 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/
|
|
CVE-2020-26173 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/
|
|
CVE-2020-26174 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/
|
|
CVE-2020-26175 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/
|
|
CVE-2020-26176 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/
|
|
CVE-2020-26177 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/
|
|
CVE-2020-26178 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/
|
|
CVE-2020-2618 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26184 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-26185 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-2619 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2620 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26200 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#170221
|
|
CVE-2020-26201 - https://medium.com/csg-govtech/bolstering-security-how-i-breached-a-wifi-mesh-access-point-from-close-proximity-to-uncover-f8f77dc3cd5d
|
|
CVE-2020-26201 - https://www.askey.com.tw/
|
|
CVE-2020-26201 - https://www.askey.com.tw/incident_report_notifications.html
|
|
CVE-2020-26205 - https://hackerone.com/reports/995995
|
|
CVE-2020-26208 - https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821
|
|
CVE-2020-26208 - https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-7pr6-xq4f-qhgc
|
|
CVE-2020-26208 - https://github.com/Matthias-Wandel/jhead/issues/7
|
|
CVE-2020-2621 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26217 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-26217 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-26217 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-26217 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-26217 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-2622 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26223 - https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status
|
|
CVE-2020-2623 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26235 - https://github.com/time-rs/time/issues/293
|
|
CVE-2020-26237 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-26238 - https://github.com/jmrozanec/cron-utils/issues/461
|
|
CVE-2020-2624 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26248 - http://packetstormsecurity.com/files/160539/PrestaShop-ProductComments-4.2.0-SQL-Injection.html
|
|
CVE-2020-2625 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26251 - https://github.com/open-zaak/open-zaak/blob/master/CHANGELOG.rst#133-2020-12-17
|
|
CVE-2020-26257 - https://github.com/matrix-org/synapse/blob/develop/CHANGES.md#synapse-1231-2020-12-09
|
|
CVE-2020-2626 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2627 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2628 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26280 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-043.txt
|
|
CVE-2020-26282 - https://securitylab.github.com/research/bean-validation-RCE
|
|
CVE-2020-26287 - https://github.com/hackmdio/codimd/issues/1630
|
|
CVE-2020-26287 - https://github.com/hedgedoc/hedgedoc/commit/58276ebbf4504a682454a3686dcaff88bc1069d4
|
|
CVE-2020-2629 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26299 - https://www.npmjs.com/package/ftp-srv
|
|
CVE-2020-2630 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26301 - https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/
|
|
CVE-2020-26302 - https://securitylab.github.com/advisories/GHSL-2020-295-redos-is.js
|
|
CVE-2020-2631 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26312 - https://securitylab.github.com/advisories/GHSL-2020-254-zipslip-dotmesh/
|
|
CVE-2020-2632 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2633 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2634 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2635 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2636 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2637 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2638 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2639 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2640 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26409 - https://gitlab.com/gitlab-org/gitlab/-/issues/259626
|
|
CVE-2020-2641 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26418 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-26419 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-2642 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26420 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-26421 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-26422 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-2643 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2644 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2645 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2646 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2647 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2648 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2649 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2650 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26508 - https://www.syss.de/pentest-blog/
|
|
CVE-2020-26509 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-033.txt
|
|
CVE-2020-2651 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26510 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-033.txt
|
|
CVE-2020-26511 - https://wpvulndb.com/vulnerabilities/10418
|
|
CVE-2020-26511 - https://www.wpo365.com/change-log/
|
|
CVE-2020-26515 - https://www.compass-security.com/fileadmin/Research/Advisories/2021-09_CSNC-2020-010-codebeamer_ALM_Insecure-RememberMe.txt
|
|
CVE-2020-26516 - https://www.compass-security.com/fileadmin/Research/Advisories/2021-08_CSNC-2020-009-codebeamer_ALM_Missing-CSRF.txt
|
|
CVE-2020-2652 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26522 - http://packetstormsecurity.com/files/159520/Garfield-Petshop-2020-10-01-Cross-Site-Request-Forgery.html
|
|
CVE-2020-2653 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2654 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26542 - https://www.percona.com/blog/2020/10/13/percona-distribution-for-mysql-pxc-variant-8-0-20-fixes-for-security-vulnerability-release-roundup-october-13-2020/
|
|
CVE-2020-2655 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26554 - http://packetstormsecurity.com/files/160077/MailDepot-2033-2.3.3022-Cross-Site-Scripting.html
|
|
CVE-2020-26554 - https://www.syss.de/pentest-blog/syss-2020-037-persistent-cross-site-scripting-schwachstelle-in-reddoxx-maildepot
|
|
CVE-2020-26555 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
|
|
CVE-2020-26556 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
|
|
CVE-2020-26557 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
|
|
CVE-2020-26558 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
|
|
CVE-2020-26559 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
|
|
CVE-2020-2656 - http://packetstormsecurity.com/files/155990/Solaris-xlock-Information-Disclosure.html
|
|
CVE-2020-2656 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26560 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
|
|
CVE-2020-26561 - https://research.nccgroup.com/2020/10/20/wrt160nl-cve-2020-26561-bof/
|
|
CVE-2020-26563 - https://packetstormsecurity.com/files/163699/ObjectPlanet-Opinio-7.12-Cross-Site-Scripting.html
|
|
CVE-2020-26564 - https://packetstormsecurity.com/files/163707/ObjectPlanet-Opinio-7.13-7.14-XML-Injection.html
|
|
CVE-2020-26565 - https://packetstormsecurity.com/files/163708/ObjectPlanet-Opinio-7.13-Expression-Language-Injection.html
|
|
CVE-2020-26566 - https://github.com/Motion-Project/motion/issues/1227#issuecomment-715927776
|
|
CVE-2020-26567 - http://packetstormsecurity.com/files/159516/D-Link-DSR-250N-Denial-Of-Service.html
|
|
CVE-2020-26567 - http://seclists.org/fulldisclosure/2020/Oct/14
|
|
CVE-2020-26567 - https://www.redteam-pentesting.de/advisories/rt-sa-2020-002
|
|
CVE-2020-2657 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26574 - https://adepts.of0x.cc/leostream-xss-to-rce/
|
|
CVE-2020-26574 - https://www.leostream.com/resources/product-lifecycle/
|
|
CVE-2020-26575 - https://gitlab.com/wireshark/wireshark/-/issues/16887
|
|
CVE-2020-26575 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-2658 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26583 - https://seclists.org/fulldisclosure/2020/Oct/17
|
|
CVE-2020-26584 - https://seclists.org/fulldisclosure/2020/Oct/17
|
|
CVE-2020-2659 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26599 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-2660 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26600 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-26601 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-26602 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-26603 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-26604 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-26605 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-26606 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-26607 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-2661 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2662 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26623 - https://packetstormsecurity.com/files/176301/GilaCMS-1.15.4-SQL-Injection.html
|
|
CVE-2020-26624 - https://packetstormsecurity.com/files/176301/GilaCMS-1.15.4-SQL-Injection.html
|
|
CVE-2020-26625 - https://packetstormsecurity.com/files/176301/GilaCMS-1.15.4-SQL-Injection.html
|
|
CVE-2020-26627 - https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html
|
|
CVE-2020-26628 - https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html
|
|
CVE-2020-26629 - https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html
|
|
CVE-2020-2663 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26630 - https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html
|
|
CVE-2020-2664 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2665 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26652 - https://github.com/aircrack-ng/rtl8812au/issues/730
|
|
CVE-2020-2666 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26668 - https://www.exploit-db.com/exploits/48831
|
|
CVE-2020-26669 - https://www.exploit-db.com/exploits/48831
|
|
CVE-2020-2667 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26670 - https://www.exploit-db.com/exploits/48831
|
|
CVE-2020-26672 - https://wpvulndb.com/vulnerabilities/10272
|
|
CVE-2020-2668 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26682 - https://github.com/libass/libass/issues/431
|
|
CVE-2020-2669 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2670 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26701 - http://packetstormsecurity.com/files/160082/Kaa-IoT-Platform-1.2.0-Cross-Site-Scripting.html
|
|
CVE-2020-26705 - https://github.com/darkfoxprime/python-easy_xml/issues/1
|
|
CVE-2020-26707 - https://github.com/shenzhim/aaptjs/issues/2
|
|
CVE-2020-26708 - https://github.com/erinxocon/requests-xml/issues/7
|
|
CVE-2020-26709 - https://github.com/PinaeOS/py-xml/issues/2
|
|
CVE-2020-2671 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26710 - https://github.com/uncmath25/easy-parse/issues/3
|
|
CVE-2020-26712 - https://github.com/vuongdq54/RedCap
|
|
CVE-2020-26713 - https://github.com/vuongdq54/RedCap
|
|
CVE-2020-2672 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26728 - https://github.com/Lyc-heng/routers/blob/a80b30bccfc9b76f3a4868ff28ad5ce2e0fca180/routers/rce1.md
|
|
CVE-2020-26728 - https://github.com/Lyc-heng/routers/blob/main/routers/rce1.md
|
|
CVE-2020-2673 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26732 - https://github.com/swzhouu/CVE-2020-26732
|
|
CVE-2020-26733 - https://github.com/swzhouu/CVE-2020-26733
|
|
CVE-2020-2674 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2675 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2676 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26766 - https://www.exploit-db.com/exploits/49180
|
|
CVE-2020-2677 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26773 - https://packetstormsecurity.com/files/159475/Restaurant-Reservation-System-1.0-SQL-Injection.html
|
|
CVE-2020-2678 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2679 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26797 - https://sourceforge.net/p/mediainfo/bugs/1154/
|
|
CVE-2020-2680 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26802 - https://www.exploit-db.com/exploits/48494
|
|
CVE-2020-26806 - https://packetstormsecurity.com/files/163709/ObjectPlanet-Opinio-7.13-Shell-Upload.html
|
|
CVE-2020-26808 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html
|
|
CVE-2020-26808 - http://seclists.org/fulldisclosure/2022/May/42
|
|
CVE-2020-26809 - http://packetstormsecurity.com/files/163146/SAP-Hybris-eCommerce-Information-Disclosure.html
|
|
CVE-2020-2681 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26811 - http://packetstormsecurity.com/files/163143/SAP-Hybris-eCommerce-Server-Side-Request-Forgery.html
|
|
CVE-2020-2682 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26820 - http://packetstormsecurity.com/files/162086/SAP-Java-OS-Remote-Code-Execution.html
|
|
CVE-2020-26829 - http://packetstormsecurity.com/files/163166/SAP-Netweaver-JAVA-7.50-Missing-Authorization.html
|
|
CVE-2020-2683 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26830 - http://packetstormsecurity.com/files/163161/SAP-Solution-Manager-7.2-Missing-Authorization.html
|
|
CVE-2020-26832 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html
|
|
CVE-2020-26832 - http://seclists.org/fulldisclosure/2022/May/42
|
|
CVE-2020-26836 - http://packetstormsecurity.com/files/163136/SAP-Solution-Manager-7.2-ST-720-Open-Redirection.html
|
|
CVE-2020-26837 - http://packetstormsecurity.com/files/163160/SAP-Solution-Manager-7.2-File-Disclosure-Denial-Of-Service.html
|
|
CVE-2020-2684 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2685 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2686 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26867 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-015-remote-code-execution-in-arc-informatique-pcvue/
|
|
CVE-2020-26868 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-016-denial-of-service-in-arc-informatique-pcvue/
|
|
CVE-2020-26869 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-017-session-information-exposure-in-arc-informatique-pcvue/
|
|
CVE-2020-2687 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26870 - https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d
|
|
CVE-2020-26870 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-26878 - https://adepts.of0x.cc
|
|
CVE-2020-26878 - https://adepts.of0x.cc/ruckus-vriot-rce/
|
|
CVE-2020-26878 - https://support.ruckuswireless.com/documents
|
|
CVE-2020-26878 - https://x-c3ll.github.io
|
|
CVE-2020-26879 - https://adepts.of0x.cc
|
|
CVE-2020-26879 - https://adepts.of0x.cc/ruckus-vriot-rce/
|
|
CVE-2020-26879 - https://support.ruckuswireless.com/documents
|
|
CVE-2020-26879 - https://x-c3ll.github.io
|
|
CVE-2020-2688 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26880 - https://github.com/sympa-community/sympa/issues/943#issuecomment-704779420
|
|
CVE-2020-26880 - https://github.com/sympa-community/sympa/issues/943#issuecomment-704842235
|
|
CVE-2020-26882 - https://www.playframework.com/security/vulnerability
|
|
CVE-2020-26883 - https://www.playframework.com/security/vulnerability
|
|
CVE-2020-26885 - https://2SXC.org/en/blog/post/2sxc-security-notification-2021-001
|
|
CVE-2020-26886 - https://vulnerable.af
|
|
CVE-2020-26886 - https://vulnerable.af/posts/cve-2020-26886/
|
|
CVE-2020-26887 - http://packetstormsecurity.com/files/159606/FRITZ-Box-7.20-DNS-Rebinding-Protection-Bypass.html
|
|
CVE-2020-26887 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
|
CVE-2020-2689 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26899 - https://kb.netgear.com/000062355/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-WiFi-Systems-PSV-2020-0030
|
|
CVE-2020-2690 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26905 - https://kb.netgear.com/000062349/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0047
|
|
CVE-2020-26907 - https://kb.netgear.com/000062347/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0264
|
|
CVE-2020-2691 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26912 - https://kb.netgear.com/000062341/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Routers-PSV-2019-0018
|
|
CVE-2020-26913 - https://kb.netgear.com/000062340/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-WiFi-Systems-PSV-2018-0140
|
|
CVE-2020-26916 - https://kb.netgear.com/000062337/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-PSV-2019-0012
|
|
CVE-2020-26917 - https://kb.netgear.com/000062336/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Extender-and-Routers-PSV-2018-0242
|
|
CVE-2020-26918 - https://kb.netgear.com/000062335/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Extenders-and-Routers-PSV-2018-0243
|
|
CVE-2020-26919 - https://kb.netgear.com/000062334/Security-Advisory-for-Missing-Function-Level-Access-Control-on-JGS516PE-PSV-2020-0377
|
|
CVE-2020-2692 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26921 - https://kb.netgear.com/000062332/Security-Advisory-for-Authentication-Bypass-on-Some-Smart-Managed-Plus-Switches-PSV-2020-0305
|
|
CVE-2020-26922 - https://kb.netgear.com/000062330/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Wireless-Controllers-PSV-2020-0139
|
|
CVE-2020-26924 - https://kb.netgear.com/000062328/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Wireless-Access-Points-PSV-2020-0141
|
|
CVE-2020-2693 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26930 - https://kb.netgear.com/000062322/Security-Advisory-for-Security-Misconfiguration-on-EX7700-PSV-2020-0109
|
|
CVE-2020-2694 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26943 - https://launchpad.net/bugs/1895688
|
|
CVE-2020-26947 - https://github.com/monero-project/monero-gui/issues/3142#issuecomment-705940446
|
|
CVE-2020-2695 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26950 - http://packetstormsecurity.com/files/166175/Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free.html
|
|
CVE-2020-26950 - https://bugzilla.mozilla.org/show_bug.cgi?id=1675905
|
|
CVE-2020-26953 - https://bugzilla.mozilla.org/show_bug.cgi?id=1656741
|
|
CVE-2020-26959 - https://bugzilla.mozilla.org/show_bug.cgi?id=1669466
|
|
CVE-2020-2696 - http://packetstormsecurity.com/files/155963/SunOS-5.10-Generic_147148-26-Local-Privilege-Escalation.html
|
|
CVE-2020-2696 - http://packetstormsecurity.com/files/155991/Common-Desktop-Environment-2.3.1-Buffer-Overflow.html
|
|
CVE-2020-2696 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26960 - https://bugzilla.mozilla.org/show_bug.cgi?id=1670358
|
|
CVE-2020-26962 - https://bugzilla.mozilla.org/show_bug.cgi?id=610997
|
|
CVE-2020-26966 - https://bugzilla.mozilla.org/show_bug.cgi?id=1663571
|
|
CVE-2020-2697 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26971 - https://bugzilla.mozilla.org/show_bug.cgi?id=1663466
|
|
CVE-2020-26975 - https://bugzilla.mozilla.org/show_bug.cgi?id=1661071
|
|
CVE-2020-26977 - https://bugzilla.mozilla.org/show_bug.cgi?id=1676311
|
|
CVE-2020-2698 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-26989 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf
|
|
CVE-2020-2699 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2700 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2701 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27016 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/
|
|
CVE-2020-27017 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/
|
|
CVE-2020-27018 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/
|
|
CVE-2020-27019 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/
|
|
CVE-2020-2702 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27020 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#270421
|
|
CVE-2020-2703 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2704 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2705 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2706 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2707 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2709 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2710 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2711 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2712 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2713 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2714 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27149 - https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities
|
|
CVE-2020-2715 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27150 - https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities
|
|
CVE-2020-27151 - https://bugs.launchpad.net/katacontainers.io/+bug/1878234
|
|
CVE-2020-27151 - https://github.com/kata-containers/kata-containers/releases/tag/2.0.0
|
|
CVE-2020-27152 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.2
|
|
CVE-2020-27152 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=77377064c3a94911339f13ce113b3abf265e06da
|
|
CVE-2020-27158 - https://www.westerndigital.com/support/productsecurity
|
|
CVE-2020-27158 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114
|
|
CVE-2020-27159 - https://www.westerndigital.com/support/productsecurity
|
|
CVE-2020-27159 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114
|
|
CVE-2020-2716 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27160 - https://www.westerndigital.com/support/productsecurity
|
|
CVE-2020-27160 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114
|
|
CVE-2020-2717 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27170 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
|
|
CVE-2020-27170 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8
|
|
CVE-2020-27170 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f232326f6966cf2a1d1db7bc917a4ce5f9f55f76
|
|
CVE-2020-27170 - https://www.openwall.com/lists/oss-security/2021/03/19/2
|
|
CVE-2020-27171 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
|
|
CVE-2020-27171 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8
|
|
CVE-2020-27171 - https://www.openwall.com/lists/oss-security/2021/03/19/3
|
|
CVE-2020-27176 - https://github.com/marktext/marktext/issues/2360
|
|
CVE-2020-27179 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/
|
|
CVE-2020-27179 - https://seclists.org/fulldisclosure/2020/Oct/28
|
|
CVE-2020-2718 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27180 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/
|
|
CVE-2020-27180 - https://seclists.org/fulldisclosure/2020/Oct/28
|
|
CVE-2020-27181 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/
|
|
CVE-2020-27181 - https://seclists.org/fulldisclosure/2020/Oct/28
|
|
CVE-2020-27182 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/
|
|
CVE-2020-27182 - https://seclists.org/fulldisclosure/2020/Oct/28
|
|
CVE-2020-27183 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/
|
|
CVE-2020-27183 - https://seclists.org/fulldisclosure/2020/Oct/28
|
|
CVE-2020-27184 - https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities
|
|
CVE-2020-27185 - https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities
|
|
CVE-2020-2719 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27191 - https://www.junebug.site/blog/cve-2020-27191-lionwiki-3-2-11-lfi
|
|
CVE-2020-27193 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-27193 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-27193 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-27194 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15
|
|
CVE-2020-27196 - https://www.playframework.com/security/vulnerability
|
|
CVE-2020-27197 - http://packetstormsecurity.com/files/159662/Libtaxii-1.1.117-OpenTaxi-0.2.0-Server-Side-Request-Forgery.html
|
|
CVE-2020-27197 - https://github.com/eclecticiq/OpenTAXII/issues/176
|
|
CVE-2020-27199 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/magic-home-pro-mobile-application-authentication-bypass-cve-2020-27199/
|
|
CVE-2020-2720 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27207 - https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842
|
|
CVE-2020-27208 - https://eprint.iacr.org/2021/640
|
|
CVE-2020-27208 - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html
|
|
CVE-2020-27209 - https://eprint.iacr.org/2021/640
|
|
CVE-2020-27209 - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html
|
|
CVE-2020-2721 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27211 - https://eprint.iacr.org/2021/640
|
|
CVE-2020-27211 - https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/
|
|
CVE-2020-27211 - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html
|
|
CVE-2020-27212 - https://eprint.iacr.org/2021/640
|
|
CVE-2020-27212 - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html
|
|
CVE-2020-27216 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-27216 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-27216 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-27216 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-27216 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-27218 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-27218 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-27218 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-27218 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-2722 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27223 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-27224 - https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/
|
|
CVE-2020-27226 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1202
|
|
CVE-2020-27227 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1203
|
|
CVE-2020-27228 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1204
|
|
CVE-2020-27229 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205
|
|
CVE-2020-2723 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27230 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205
|
|
CVE-2020-27231 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205
|
|
CVE-2020-27232 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1206
|
|
CVE-2020-27233 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207
|
|
CVE-2020-27234 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207
|
|
CVE-2020-27235 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207
|
|
CVE-2020-27236 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207
|
|
CVE-2020-27237 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207
|
|
CVE-2020-27238 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207
|
|
CVE-2020-27239 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207
|
|
CVE-2020-2724 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27240 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207
|
|
CVE-2020-27241 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207
|
|
CVE-2020-27242 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208
|
|
CVE-2020-27243 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208
|
|
CVE-2020-27244 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208
|
|
CVE-2020-27245 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208
|
|
CVE-2020-27246 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208
|
|
CVE-2020-27247 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210
|
|
CVE-2020-27248 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210
|
|
CVE-2020-27249 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210
|
|
CVE-2020-2725 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27250 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210
|
|
CVE-2020-2726 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2727 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2728 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2729 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2730 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-27301 - https://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day
|
|
CVE-2020-27302 - https://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day
|
|
CVE-2020-2731 - https://www.oracle.com/security-alerts/cpujan2020.html
|
|
CVE-2020-2733 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2734 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27348 - https://bugs.launchpad.net/bugs/1901572
|
|
CVE-2020-27349 - https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1899193
|
|
CVE-2020-2735 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27350 - https://bugs.launchpad.net/bugs/1899193
|
|
CVE-2020-27351 - https://bugs.launchpad.net/bugs/1899193
|
|
CVE-2020-27368 - https://github.com/swzhouu/CVE-2020-27368
|
|
CVE-2020-2737 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27373 - https://nvermaa.medium.com/cve-on-radio-technology-d-4b65efa1ba5c
|
|
CVE-2020-27374 - https://nvermaa.medium.com/cve-on-radio-technology-d-4b65efa1ba5c
|
|
CVE-2020-27375 - https://nvermaa.medium.com/cve-on-radio-technology-d-4b65efa1ba5c
|
|
CVE-2020-27376 - https://nvermaa.medium.com/cve-on-radio-technology-d-4b65efa1ba5c
|
|
CVE-2020-27379 - https://medium.com/@singh.satyam158/vulnerabilities-in-booking-core-1-7-d85d1dfae44e
|
|
CVE-2020-2738 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27383 - https://github.com/FreySolarEye/CVE/blob/master/Battle%20Net%20Launcher%20Local%20Privilege%20Escalation
|
|
CVE-2020-27384 - https://github.com/FreySolarEye/CVE/blob/master/Guild%20Wars%202%20-%20Local%20Privilege%20Escalation
|
|
CVE-2020-27385 - https://blog.vonahi.io/whats-in-a-re-name/
|
|
CVE-2020-27386 - http://packetstormsecurity.com/files/160411/FlexDotnetCMS-1.5.8-Arbitrary-ASP-File-Upload.html
|
|
CVE-2020-27386 - https://blog.vonahi.io/whats-in-a-re-name/
|
|
CVE-2020-27387 - http://packetstormsecurity.com/files/160046/HorizontCMS-1.0.0-beta-Shell-Upload.html
|
|
CVE-2020-27387 - https://blog.vonahi.io/whats-in-a-re-name/
|
|
CVE-2020-27388 - http://yourls.com
|
|
CVE-2020-2739 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27397 - https://packetstormsecurity.com/files/160337/Online-Matrimonial-Project-1.0-Remote-Code-Execution.html
|
|
CVE-2020-2740 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27402 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-004.md
|
|
CVE-2020-27402 - https://sick.codes/sick-2020-004/
|
|
CVE-2020-27402 - https://threatpost.com/authentication-bug-android-smart-tv-data-theft/160025/
|
|
CVE-2020-27402 - https://www.cybersecurity-help.cz/vdb/SB2020101404
|
|
CVE-2020-27402 - https://www.securitylab.ru/news/513051.php
|
|
CVE-2020-27403 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-009.md
|
|
CVE-2020-27403 - https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/
|
|
CVE-2020-27403 - https://sick.codes/sick-2020-009
|
|
CVE-2020-27406 - https://www.exploit-db.com/exploits/48865
|
|
CVE-2020-2741 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27413 - https://cvewalkthrough.com/cve-2020-27413-mahavitaran-android-application-clear-text-password-storage/
|
|
CVE-2020-27414 - https://cvewalkthrough.com/cve-2020-27414-mahavitaran-android-application-insecure-communication-of-sensitive-dat/
|
|
CVE-2020-27416 - https://cvewalkthrough.com/cve-2021-41716-mahavitaran-android-application-account-take-over-via-otp-fixation/
|
|
CVE-2020-2742 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27422 - https://packetstormsecurity.com/files/160051/Anuko-Time-Tracker-1.19.23.5311-Password-Reset.html
|
|
CVE-2020-27423 - https://packetstormsecurity.com/files/160052/Anuko-Time-Tracker-1.19.23.5311-Missing-Rate-Limiting.html
|
|
CVE-2020-2743 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2744 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2745 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27459 - https://github.com/nugmubs/chronoforums-cve/wiki/Stored-XSS-Vulnerability-in-Chronoforum-v2.0.11-(Joomla-plugin)
|
|
CVE-2020-2746 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27461 - https://www.exploit-db.com/exploits/48862
|
|
CVE-2020-27467 - https://github.com/ceng-yildirim/LFI-processwire
|
|
CVE-2020-2747 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27478 - https://github.com/simplcommerce/SimplCommerce/issues/943
|
|
CVE-2020-2748 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27481 - https://gist.github.com/0xx7/a7aaa8b0515139cf7e30c808c8d54070
|
|
CVE-2020-27484 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0004.md
|
|
CVE-2020-27488 - https://iot-lab-fh-ooe.github.io/loxone_clouddns_schwachstelle/
|
|
CVE-2020-27488 - https://iot-lab-fh-ooe.github.io/loxone_clouddns_vulnerability/
|
|
CVE-2020-2749 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2750 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27509 - https://medium.com/@tomhulme_74888/persistent-cross-site-scripting-leading-to-full-account-takeover-on-galaxkey-v5-6-11-4-8bf96be35b54
|
|
CVE-2020-2751 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27511 - https://github.com/yetingli/PoCs/blob/main/CVE-2020-27511/Prototype.md
|
|
CVE-2020-27515 - https://www.exploit-db.com/exploits/49208
|
|
CVE-2020-27518 - https://jeffs.sh/CVEs/CVE-2020-27518.txt
|
|
CVE-2020-2752 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27523 - https://www.youtube.com/watch?v=EGW_M1MqAG0
|
|
CVE-2020-27524 - https://www.youtube.com/watch?v=BQUVgAdhwQs
|
|
CVE-2020-2753 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27533 - http://packetstormsecurity.com/files/159772/DedeCMS-5.8-Cross-Site-Scripting.html
|
|
CVE-2020-27539 - https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707
|
|
CVE-2020-2754 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-2754 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27540 - https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707
|
|
CVE-2020-27541 - https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707
|
|
CVE-2020-27542 - https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707
|
|
CVE-2020-27543 - https://github.com/secoats/cve/tree/master/CVE-2020-27543_dos_restify-paginate
|
|
CVE-2020-27545 - https://www.prevanders.net/dwarfbug.html#DW202010-001
|
|
CVE-2020-2755 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-2755 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27553 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns
|
|
CVE-2020-27554 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns
|
|
CVE-2020-27555 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns
|
|
CVE-2020-27556 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns
|
|
CVE-2020-27557 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns
|
|
CVE-2020-27558 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns
|
|
CVE-2020-2756 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-2756 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27568 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#insecure-file-permissions
|
|
CVE-2020-27569 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#openvpn-abitrary-file-write
|
|
CVE-2020-2757 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-2757 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27574 - https://tvrbk.github.io/cve/2021/03/07/rumpus.html
|
|
CVE-2020-27575 - https://tvrbk.github.io/cve/2021/03/07/rumpus.html
|
|
CVE-2020-27576 - https://tvrbk.github.io/cve/2021/03/07/rumpus.html
|
|
CVE-2020-2758 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27583 - https://n4nj0.github.io/advisories/ibm-infosphere-java-deserialization/
|
|
CVE-2020-2759 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2760 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27600 - https://github.com/pwnninja/dlink/blob/main/DIR-846_SetMasterWLanSettingsCI.md
|
|
CVE-2020-27600 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2020-2761 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27615 - https://wpdeeply.com/loginizer-before-1-6-4-sqli-injection/
|
|
CVE-2020-27615 - https://wpscan.com/vulnerability/10441
|
|
CVE-2020-27615 - https://www.zdnet.com/article/wordpress-deploys-forced-security-update-for-dangerous-bug-in-popular-plugin/
|
|
CVE-2020-27618 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-27618 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-27619 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-2762 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27621 - https://phabricator.wikimedia.org/T265810
|
|
CVE-2020-2763 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27637 - https://labs.bishopfox.com/advisories/cran-version-4.0.2
|
|
CVE-2020-2764 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-2764 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2765 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27652 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1061
|
|
CVE-2020-27653 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1061
|
|
CVE-2020-27659 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1087
|
|
CVE-2020-2766 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27660 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1087
|
|
CVE-2020-27664 - https://github.com/strapi/strapi/pull/8442
|
|
CVE-2020-27664 - https://github.com/strapi/strapi/releases/tag/v3.2.5
|
|
CVE-2020-27665 - https://github.com/strapi/strapi/pull/8439
|
|
CVE-2020-27665 - https://github.com/strapi/strapi/releases/tag/v3.2.5
|
|
CVE-2020-27666 - https://github.com/strapi/strapi/pull/8440
|
|
CVE-2020-27666 - https://github.com/strapi/strapi/releases/tag/v3.2.5
|
|
CVE-2020-2767 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2768 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27687 - https://gist.github.com/vin01/26a8bb13233acd9425e7575a7ad4c936
|
|
CVE-2020-27688 - https://github.com/matthiasmaes/CVE-2020-27688
|
|
CVE-2020-27689 - https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf
|
|
CVE-2020-2769 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27690 - https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf
|
|
CVE-2020-27691 - https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf
|
|
CVE-2020-27692 - https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf
|
|
CVE-2020-27693 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/
|
|
CVE-2020-27694 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/
|
|
CVE-2020-2770 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2771 - http://packetstormsecurity.com/files/157282/Oracle-Solaris-11.x-10-whodo-w-Buffer-Overflow.html
|
|
CVE-2020-2771 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2772 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2773 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-2773 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27735 - https://wshenk.blogspot.com/2021/01/xss-in-wing-ftps-web-interface-cve-2020.html
|
|
CVE-2020-2774 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27744 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114
|
|
CVE-2020-2775 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2776 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2777 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2778 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27783 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-27784 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8d5f92b8d30bb4ade76494490c3c065e12411b1
|
|
CVE-2020-27786 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d
|
|
CVE-2020-27787 - https://github.com/upx/upx/issues/333
|
|
CVE-2020-27788 - https://github.com/upx/upx/issues/332
|
|
CVE-2020-2779 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27790 - https://github.com/upx/upx/issues/331
|
|
CVE-2020-27792 - https://bugs.ghostscript.com/show_bug.cgi?id=701844
|
|
CVE-2020-27796 - https://github.com/upx/upx/issues/392
|
|
CVE-2020-27797 - https://github.com/upx/upx/issues/390
|
|
CVE-2020-27798 - https://github.com/upx/upx/issues/396
|
|
CVE-2020-27799 - https://github.com/upx/upx/issues/391
|
|
CVE-2020-2780 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27800 - https://github.com/upx/upx/issues/395
|
|
CVE-2020-27801 - https://github.com/upx/upx/issues/394
|
|
CVE-2020-27802 - https://github.com/upx/upx/issues/393
|
|
CVE-2020-2781 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27813 - https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh
|
|
CVE-2020-27814 - https://github.com/uclouvain/openjpeg/issues/1283
|
|
CVE-2020-27814 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-27815 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c
|
|
CVE-2020-2782 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27820 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-27824 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-27828 - https://github.com/jasper-software/jasper/issues/252
|
|
CVE-2020-27829 - https://github.com/ImageMagick/ImageMagick/commit/6ee5059cd3ac8d82714a1ab1321399b88539abf0
|
|
CVE-2020-2783 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2784 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27841 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-27841 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-27842 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-27842 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-27843 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-27843 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-27844 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-27844 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-27845 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-27845 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-2785 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2786 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2787 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27885 - https://www.rodrigofavarini.com.br/cybersecurity/multiple-xss-on-api-manager-3-1-0/
|
|
CVE-2020-2789 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2790 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2791 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2793 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27930 - http://packetstormsecurity.com/files/161294/Apple-Safari-Remote-Code-Execution.html
|
|
CVE-2020-27932 - http://packetstormsecurity.com/files/161295/XNU-Kernel-Turnstiles-Type-Confusion.html
|
|
CVE-2020-2794 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2795 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27950 - http://packetstormsecurity.com/files/161296/XNU-Kernel-Mach-Message-Trailers-Memory-Disclosure.html
|
|
CVE-2020-27955 - http://packetstormsecurity.com/files/159923/git-lfs-Remote-Code-Execution.html
|
|
CVE-2020-27955 - http://packetstormsecurity.com/files/164180/Git-git-lfs-Remote-Code-Execution.html
|
|
CVE-2020-27955 - http://seclists.org/fulldisclosure/2020/Nov/1
|
|
CVE-2020-27955 - https://exploitbox.io
|
|
CVE-2020-27955 - https://legalhackers.com
|
|
CVE-2020-27955 - https://legalhackers.com/advisories/Git-LFS-RCE-Exploit-CVE-2020-27955.html
|
|
CVE-2020-27956 - https://www.exploit-db.com/exploits/48931
|
|
CVE-2020-2796 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2797 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27974 - https://herolab.usd.de/security-advisories/usd-2020-0029/
|
|
CVE-2020-27975 - https://herolab.usd.de/security-advisories/usd-2020-0027/
|
|
CVE-2020-27976 - https://herolab.usd.de/security-advisories/usd-2020-0026/
|
|
CVE-2020-2798 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27980 - https://www.exploit-db.com/exploits/48948
|
|
CVE-2020-27982 - http://packetstormsecurity.com/files/159763/Icewarp-WebMail-11.4.5.0-Cross-Site-Scripting.html
|
|
CVE-2020-27982 - https://cxsecurity.com/issue/WLB-2020100161
|
|
CVE-2020-2799 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-27992 - https://packetstormsecurity.com/files/159775/Wondershare-Dr.Fone-3.0.0-Unquoted-Service-Path.html
|
|
CVE-2020-27993 - https://www.exploit-db.com/exploits/48920
|
|
CVE-2020-27994 - http://packetstormsecurity.com/files/161399/SolarWinds-Serv-U-FTP-Server-15.2.1-Path-Traversal.html
|
|
CVE-2020-27994 - http://seclists.org/fulldisclosure/2021/Feb/36
|
|
CVE-2020-27996 - https://securitylab.github.com/advisories/GHSL-2020-138-139-SmartstoreAG-SmartStoreNET
|
|
CVE-2020-27997 - https://securitylab.github.com/advisories/GHSL-2020-138-139-SmartstoreAG-SmartStoreNET
|
|
CVE-2020-2800 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28001 - http://packetstormsecurity.com/files/161400/SolarWinds-Serv-U-FTP-Server-15.2.1-Cross-Site-Scripting.html
|
|
CVE-2020-28001 - http://seclists.org/fulldisclosure/2021/Feb/37
|
|
CVE-2020-28005 - https://the-hyperbolic.com/posts/vulnerabilities-in-tlwpa4220/
|
|
CVE-2020-28007 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt
|
|
CVE-2020-28008 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt
|
|
CVE-2020-28009 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt
|
|
CVE-2020-2801 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28010 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt
|
|
CVE-2020-28011 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt
|
|
CVE-2020-28012 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt
|
|
CVE-2020-28013 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt
|
|
CVE-2020-28014 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt
|
|
CVE-2020-28015 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt
|
|
CVE-2020-28016 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt
|
|
CVE-2020-28017 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt
|
|
CVE-2020-28018 - http://www.openwall.com/lists/oss-security/2021/05/11/5
|
|
CVE-2020-28018 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28018-OCORK.txt
|
|
CVE-2020-28019 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt
|
|
CVE-2020-2802 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28020 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28020-HSIZE.txt
|
|
CVE-2020-28021 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt
|
|
CVE-2020-28022 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt
|
|
CVE-2020-28023 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt
|
|
CVE-2020-28024 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt
|
|
CVE-2020-28025 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt
|
|
CVE-2020-28026 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt
|
|
CVE-2020-2803 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28030 - https://gitlab.com/wireshark/wireshark/-/issues/16887
|
|
CVE-2020-28032 - https://wpscan.com/vulnerability/10446
|
|
CVE-2020-28036 - https://wpscan.com/vulnerability/10449
|
|
CVE-2020-28037 - https://wpscan.com/vulnerability/10450
|
|
CVE-2020-28038 - https://blog.ripstech.com
|
|
CVE-2020-28039 - https://wpscan.com/vulnerability/10452
|
|
CVE-2020-2804 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28041 - https://github.com/samyk/slipstream
|
|
CVE-2020-28041 - https://samy.pl/slipstream/
|
|
CVE-2020-28042 - https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/
|
|
CVE-2020-28047 - https://github.com/piuppi/Proof-of-Concepts/blob/main/AudimexEE/Reflected-XSS.md
|
|
CVE-2020-28049 - https://github.com/sddm/sddm/releases
|
|
CVE-2020-2805 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28052 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-28052 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-28052 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-28052 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-28052 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-28052 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-28054 - https://voidsec.com
|
|
CVE-2020-28054 - https://voidsec.com/tivoli-madness/
|
|
CVE-2020-28055 - https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/
|
|
CVE-2020-28055 - https://sick.codes/sick-2020-012
|
|
CVE-2020-2806 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28062 - https://github.com/hisiphp/hisiphp/issues/10
|
|
CVE-2020-2807 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28070 - http://packetstormsecurity.com/files/160583/Alumni-Management-System-1.0-Blind-SQL-Injection.html
|
|
CVE-2020-28071 - http://packetstormsecurity.com/files/160591/Alumni-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2020-28072 - http://packetstormsecurity.com/files/160508/Alumni-Management-System-1.0-Shell-Upload.html
|
|
CVE-2020-28073 - http://packetstormsecurity.com/files/160606/Library-Management-System-1.0-SQL-Injection.html
|
|
CVE-2020-28074 - http://packetstormsecurity.com/files/160599/Online-Health-Card-System-1.0-SQL-Injection.html
|
|
CVE-2020-2808 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2809 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28091 - http://packetstormsecurity.com/files/160129/xuucms-3-SQL-Injection.html
|
|
CVE-2020-28092 - http://packetstormsecurity.com/files/160128/PESCMS-TEAM-2.3.2-Cross-Site-Scripting.html
|
|
CVE-2020-28097 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.10
|
|
CVE-2020-28097 - https://seclists.org/oss-sec/2020/q3/176
|
|
CVE-2020-2810 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2811 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28115 - https://github.com/piuppi/Proof-of-Concepts/blob/main/AudimexEE/README.md
|
|
CVE-2020-28119 - https://github.com/i900008/panexiang.github.io/blob/gh-pages/CVE-2020-28119.md
|
|
CVE-2020-2812 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28129 - https://www.exploit-db.com/exploits/48941
|
|
CVE-2020-2813 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28130 - https://www.exploit-db.com/exploits/48928
|
|
CVE-2020-28133 - https://www.exploit-db.com/exploits/48879
|
|
CVE-2020-28136 - https://www.exploit-db.com/exploits/48892
|
|
CVE-2020-28137 - https://www.exploit-db.com/exploits/48972
|
|
CVE-2020-28138 - https://www.exploit-db.com/exploits/48429
|
|
CVE-2020-28139 - https://www.exploit-db.com/exploits/48426
|
|
CVE-2020-2814 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28140 - https://www.exploit-db.com/exploits/48438
|
|
CVE-2020-28141 - https://www.exploit-db.com/exploits/48897
|
|
CVE-2020-28145 - https://github.com/wuzhicms/wuzhicms/issues/191
|
|
CVE-2020-28146 - https://github.com/eyoucms/eyoucms/issues/12
|
|
CVE-2020-28146 - https://www.exploit-db.com/exploits/48530
|
|
CVE-2020-28149 - https://c41nc.co.uk/cve-2020-28149/
|
|
CVE-2020-2815 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28150 - https://c41nc.co.uk/?page_id=85
|
|
CVE-2020-2816 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28163 - https://www.prevanders.net/dwarfbug.html#DW202010-003
|
|
CVE-2020-28169 - http://packetstormsecurity.com/files/160791/Fluentd-TD-agent-4.0.1-Insecure-Folder-Permission.html
|
|
CVE-2020-28169 - https://github.com/fluent/fluentd/issues/3201
|
|
CVE-2020-2817 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28172 - https://github.com/yunaranyancat/poc-dump/blob/main/simplecollegewebsite/sqli_rce.py
|
|
CVE-2020-28172 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip
|
|
CVE-2020-28173 - https://github.com/yunaranyancat/poc-dump/blob/main/simplecollegewebsite/sqli_rce.py
|
|
CVE-2020-28173 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip
|
|
CVE-2020-2818 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28183 - https://www.exploit-db.com/exploits/49032
|
|
CVE-2020-28184 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
|
|
CVE-2020-28185 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
|
|
CVE-2020-28186 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
|
|
CVE-2020-28187 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
|
|
CVE-2020-28188 - http://packetstormsecurity.com/files/172880/TerraMaster-TOS-4.2.06-Remote-Code-Execution.html
|
|
CVE-2020-28188 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
|
|
CVE-2020-2819 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28190 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
|
|
CVE-2020-28196 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-28196 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-28196 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-28198 - https://github.com/VoidSec/Exploit-Development/blob/master/windows/x86/local/IBM_ITSM_Administrator_Client_v.5.2.0.1/IBM_TSM_v.5.2.0.1_exploit.py
|
|
CVE-2020-28198 - https://voidsec.com/tivoli-madness/#IBM_Tivoli_Storage_Manager
|
|
CVE-2020-28199 - https://aramido.de/media/aramido-2020-006-disclosure-amazon-secret-access-key.md
|
|
CVE-2020-2820 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28206 - https://justrealstag.medium.com/user-enumeration-improper-restriction-of-excessive-authentication-attempts-in-bitrix-98933a97e0e6
|
|
CVE-2020-28208 - http://packetstormsecurity.com/files/160845/Rocket.Chat-3.7.1-Email-Address-Enumeration.html
|
|
CVE-2020-28208 - http://seclists.org/fulldisclosure/2021/Jan/32
|
|
CVE-2020-28208 - http://seclists.org/fulldisclosure/2021/Jan/43
|
|
CVE-2020-28208 - http://www.openwall.com/lists/oss-security/2021/01/07/1
|
|
CVE-2020-28208 - http://www.openwall.com/lists/oss-security/2021/01/08/1
|
|
CVE-2020-28208 - http://www.openwall.com/lists/oss-security/2021/01/13/1
|
|
CVE-2020-28208 - https://trovent.github.io/security-advisories/TRSA-2010-01/TRSA-2010-01.txt
|
|
CVE-2020-28208 - https://trovent.io/security-advisory-2010-01
|
|
CVE-2020-2821 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2822 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2823 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2824 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28241 - https://github.com/maxmind/libmaxminddb/issues/236
|
|
CVE-2020-28243 - https://sec.stealthcopter.com/cve-2020-28243/
|
|
CVE-2020-28249 - https://github.com/fhlip0/JopinXSS
|
|
CVE-2020-28249 - https://github.com/laurent22/joplin/releases
|
|
CVE-2020-2825 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2826 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28267 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28267
|
|
CVE-2020-28268 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28268
|
|
CVE-2020-28269 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269
|
|
CVE-2020-2827 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28270 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270
|
|
CVE-2020-28271 - https://github.com/sharpred/deepHas/commit/2fe011713a6178c50f7deb6f039a8e5435981e20
|
|
CVE-2020-28271 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28271
|
|
CVE-2020-28272 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28272
|
|
CVE-2020-28273 - https://www.whitesourcesoftware.com/vulnerability-database
|
|
CVE-2020-28273 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28273
|
|
CVE-2020-28276 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28276
|
|
CVE-2020-28277 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28277
|
|
CVE-2020-28278 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28278
|
|
CVE-2020-28279 - https://github.com/sahellebusch/flattenizer/pull/13
|
|
CVE-2020-28279 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28279
|
|
CVE-2020-2828 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28280 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28280
|
|
CVE-2020-28281 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28281
|
|
CVE-2020-28282 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28282
|
|
CVE-2020-2829 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2830 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2831 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2832 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28328 - http://packetstormsecurity.com/files/159937/SuiteCRM-7.11.15-Remote-Code-Execution.html
|
|
CVE-2020-28328 - http://packetstormsecurity.com/files/162975/SuiteCRM-Log-File-Remote-Code-Execution.html
|
|
CVE-2020-28328 - http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html
|
|
CVE-2020-28328 - https://github.com/mcorybillington/SuiteCRM-RCE
|
|
CVE-2020-28329 - https://korelogic.com/Resources/Advisories/KL-001-2020-004.txt
|
|
CVE-2020-2833 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28330 - https://korelogic.com/Resources/Advisories/KL-001-2020-005.txt
|
|
CVE-2020-28331 - http://packetstormsecurity.com/files/160162/Barco-wePresent-Undocumented-SSH-Interface.html
|
|
CVE-2020-28331 - https://korelogic.com/Resources/Advisories/KL-001-2020-007.txt
|
|
CVE-2020-28332 - http://packetstormsecurity.com/files/160164/Barco-wePresent-Insecure-Firmware-Image.html
|
|
CVE-2020-28332 - https://korelogic.com/Resources/Advisories/KL-001-2020-009.txt
|
|
CVE-2020-28333 - http://packetstormsecurity.com/files/160161/Barco-wePresent-Authentication-Bypass.html
|
|
CVE-2020-28333 - https://korelogic.com/Resources/Advisories/KL-001-2020-006.txt
|
|
CVE-2020-28334 - http://packetstormsecurity.com/files/160163/Barco-wePresent-Global-Hardcoded-Root-SSH-Password.html
|
|
CVE-2020-28334 - https://korelogic.com/Resources/Advisories/KL-001-2020-008.txt
|
|
CVE-2020-28337 - http://packetstormsecurity.com/files/162514/Microweber-CMS-1.1.20-Remote-Code-Execution.html
|
|
CVE-2020-28337 - https://sl1nki.page/advisories/CVE-2020-28337
|
|
CVE-2020-28337 - https://sl1nki.page/blog/2021/02/01/microweber-zip-slip
|
|
CVE-2020-2834 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28340 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-28341 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-28342 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-28343 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-28347 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2019/lao_bomb/lao_bomb.md
|
|
CVE-2020-28347 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/minesweeper.md
|
|
CVE-2020-28347 - https://github.com/rapid7/metasploit-framework/pull/14365
|
|
CVE-2020-28347 - https://github.com/rdomanski/Exploits_and_Advisories/blob/master/advisories/Pwn2Own/Tokyo2019/lao_bomb.md
|
|
CVE-2020-28347 - https://github.com/rdomanski/Exploits_and_Advisories/blob/master/advisories/Pwn2Own/Tokyo2020/minesweeper.md
|
|
CVE-2020-28349 - https://www.cyberark.com/resources/threat-research-blog/lorawan-mqtt-what-to-know-when-securing-your-iot-network
|
|
CVE-2020-2835 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28351 - http://packetstormsecurity.com/files/159987/ShoreTel-Conferencing-19.46.1802.0-Cross-Site-Scripting.html
|
|
CVE-2020-2836 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28361 - https://packetstormsecurity.com/files/159030/Kamailio-5.4.0-Header-Smuggling.html
|
|
CVE-2020-28362 - https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
|
|
CVE-2020-2837 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28373 - https://github.com/cpeggg/Netgear-upnpd-poc
|
|
CVE-2020-28374 - http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html
|
|
CVE-2020-28374 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.7
|
|
CVE-2020-2838 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28381 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf
|
|
CVE-2020-28382 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf
|
|
CVE-2020-28383 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf
|
|
CVE-2020-28384 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf
|
|
CVE-2020-28386 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf
|
|
CVE-2020-2839 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2840 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28408 - https://mattschmidt.net/2020/11/10/dundas-persistent-xss/
|
|
CVE-2020-28409 - https://mattschmidt.net/2020/11/10/dundas-persistent-xss/
|
|
CVE-2020-2841 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28413 - http://packetstormsecurity.com/files/160750/Mantis-Bug-Tracker-2.24.3-SQL-Injection.html
|
|
CVE-2020-28413 - https://ethicalhcop.medium.com/cve-2020-28413-blind-sql-injection-en-mantis-bug-tracker-2-24-3-api-soap-54238f8e046d
|
|
CVE-2020-2842 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28423 - https://security.snyk.io/vuln/SNYK-JS-MONOREPOBUILD-1050392
|
|
CVE-2020-28424 - https://security.snyk.io/vuln/SNYK-JS-S3KILATSTORAGE-1050396
|
|
CVE-2020-28425 - https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404
|
|
CVE-2020-28426 - https://snyk.io/vuln/SNYK-JS-KILLPROCESSONPORT-1055458
|
|
CVE-2020-28429 - https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412
|
|
CVE-2020-2843 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28433 - https://security.snyk.io/vuln/SNYK-JS-NODELATEXPDF-1050426
|
|
CVE-2020-28434 - https://security.snyk.io/vuln/SNYK-JS-GITBLAME-1050430
|
|
CVE-2020-28435 - https://security.snyk.io/vuln/SNYK-JS-FFMPEGSDK-1050429
|
|
CVE-2020-28436 - https://security.snyk.io/vuln/SNYK-JS-GOOGLECLOUDSTORAGECOMMANDS-1050431
|
|
CVE-2020-28437 - https://security.snyk.io/vuln/SNYK-JS-HEROKUENV-1050432
|
|
CVE-2020-28438 - https://security.snyk.io/vuln/SNYK-JS-DEFERREDEXEC-1050433
|
|
CVE-2020-28439 - https://snyk.io/vuln/SNYK-JS-CORENLPJSPREFAB-1050434
|
|
CVE-2020-2844 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28440 - https://snyk.io/vuln/SNYK-JS-CORENLPJSINTERFACE-1050435
|
|
CVE-2020-28441 - https://security.snyk.io/vuln/SNYK-JS-CONFCFGINI-1048973
|
|
CVE-2020-28442 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1050978
|
|
CVE-2020-28442 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050979
|
|
CVE-2020-28442 - https://snyk.io/vuln/SNYK-JS-JSDATA-1023655
|
|
CVE-2020-28443 - https://security.snyk.io/vuln/SNYK-JS-SONARWRAPPER-1050980
|
|
CVE-2020-28445 - https://security.snyk.io/vuln/SNYK-JS-NPMHELP-1050983
|
|
CVE-2020-28446 - https://security.snyk.io/vuln/SNYK-JS-NTESSERACT-1050982
|
|
CVE-2020-28447 - https://security.snyk.io/vuln/SNYK-JS-XOPEN-1050981
|
|
CVE-2020-28448 - https://github.com/evangelion1204/multi-ini/pull/37
|
|
CVE-2020-28448 - https://snyk.io/vuln/SNYK-JS-MULTIINI-1048969
|
|
CVE-2020-28449 - https://snyk.io/vuln/SNYK-JS-DECAL-1051007
|
|
CVE-2020-2845 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28450 - https://snyk.io/vuln/SNYK-JS-DECAL-1051028
|
|
CVE-2020-28451 - https://security.snyk.io/vuln/SNYK-JS-IMAGETILER-1051029
|
|
CVE-2020-28453 - https://security.snyk.io/vuln/SNYK-JS-NPOSTESSERACT-1051031
|
|
CVE-2020-28455 - https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITTOC-1044067
|
|
CVE-2020-28456 - https://github.com/s-cart/s-cart/issues/52
|
|
CVE-2020-28457 - https://snyk.io/vuln/SNYK-PHP-SCARTCORE-1047342
|
|
CVE-2020-28458 - https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806
|
|
CVE-2020-28459 - https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITDECORATE-1044068
|
|
CVE-2020-2846 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28460 - https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229
|
|
CVE-2020-28461 - https://security.snyk.io/vuln/SNYK-JS-JSINI-1048970
|
|
CVE-2020-28462 - https://security.snyk.io/vuln/SNYK-JS-IONPARSER-1048971
|
|
CVE-2020-28463 - https://snyk.io/vuln/SNYK-PYTHON-REPORTLAB-1022145
|
|
CVE-2020-28464 - https://github.com/korzio/djv/pull/98/files
|
|
CVE-2020-28464 - https://snyk.io/vuln/SNYK-JS-DJV-1014545
|
|
CVE-2020-28468 - https://github.com/Gallopsled/pwntools/issues/1427
|
|
CVE-2020-28468 - https://snyk.io/vuln/SNYK-PYTHON-PWNTOOLS-1047345
|
|
CVE-2020-28469 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093
|
|
CVE-2020-28469 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092
|
|
CVE-2020-28469 - https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905
|
|
CVE-2020-28469 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-2847 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28470 - https://snyk.io/vuln/SNYK-JS-SCULLYIOSCULLY-1055829
|
|
CVE-2020-28471 - https://github.com/steveukx/properties/issues/40
|
|
CVE-2020-28471 - https://security.snyk.io/vuln/SNYK-JS-PROPERTIESREADER-1048968
|
|
CVE-2020-28472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1059426
|
|
CVE-2020-28472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059425
|
|
CVE-2020-28472 - https://snyk.io/vuln/SNYK-JS-AWSSDK-1059424
|
|
CVE-2020-28472 - https://snyk.io/vuln/SNYK-JS-AWSSDKSHAREDINIFILELOADER-1049304
|
|
CVE-2020-28473 - https://snyk.io/vuln/SNYK-PYTHON-BOTTLE-1017108
|
|
CVE-2020-28477 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986
|
|
CVE-2020-28477 - https://snyk.io/vuln/SNYK-JS-IMMER-1019369
|
|
CVE-2020-28478 - https://snyk.io/vuln/SNYK-JS-GSAP-1054614
|
|
CVE-2020-28479 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040
|
|
CVE-2020-28479 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039
|
|
CVE-2020-28479 - https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038
|
|
CVE-2020-2848 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28480 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062037
|
|
CVE-2020-28480 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062036
|
|
CVE-2020-28480 - https://snyk.io/vuln/SNYK-JS-JOINTJS-1024444
|
|
CVE-2020-28481 - https://github.com/socketio/socket.io/issues/3671
|
|
CVE-2020-28481 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1056358
|
|
CVE-2020-28481 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1056357
|
|
CVE-2020-28481 - https://snyk.io/vuln/SNYK-JS-SOCKETIO-1024859
|
|
CVE-2020-28487 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502
|
|
CVE-2020-28487 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501
|
|
CVE-2020-28487 - https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500
|
|
CVE-2020-2849 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28491 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-28493 - https://snyk.io/vuln/SNYK-PYTHON-JINJA2-1012994
|
|
CVE-2020-28494 - https://snyk.io/vuln/SNYK-JS-TOTALJS-1046672
|
|
CVE-2020-28495 - https://snyk.io/vuln/SNYK-JS-TOTALJS-1046671
|
|
CVE-2020-28496 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972
|
|
CVE-2020-28496 - https://snyk.io/vuln/SNYK-JS-THREE-1064931
|
|
CVE-2020-28499 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071049
|
|
CVE-2020-28499 - https://snyk.io/vuln/SNYK-JS-MERGE-1042987
|
|
CVE-2020-2850 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896
|
|
CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894
|
|
CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892
|
|
CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895
|
|
CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893
|
|
CVE-2020-28500 - https://snyk.io/vuln/SNYK-JS-LODASH-1018905
|
|
CVE-2020-28500 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-28500 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-28500 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-28500 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-28502 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937
|
|
CVE-2020-28502 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938
|
|
CVE-2020-28502 - https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935
|
|
CVE-2020-28502 - https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936
|
|
CVE-2020-28503 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047
|
|
CVE-2020-28503 - https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870
|
|
CVE-2020-2851 - http://packetstormsecurity.com/files/157281/Common-Desktop-Environment-2.3.1-1.6-libDtSvc-Buffer-Overflow.html
|
|
CVE-2020-2851 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2852 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2853 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2854 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2855 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2856 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2857 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28574 - https://www.tenable.com/security/research/tra-2020-62
|
|
CVE-2020-28578 - https://www.tenable.com/security/research/tra-2020-63
|
|
CVE-2020-28579 - https://www.tenable.com/security/research/tra-2020-63
|
|
CVE-2020-2858 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28580 - https://www.tenable.com/security/research/tra-2020-63
|
|
CVE-2020-28581 - https://www.tenable.com/security/research/tra-2020-63
|
|
CVE-2020-28587 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210
|
|
CVE-2020-28588 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1211
|
|
CVE-2020-28589 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1212
|
|
CVE-2020-2859 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28590 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1213
|
|
CVE-2020-28591 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1215
|
|
CVE-2020-28592 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1216
|
|
CVE-2020-28593 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1217
|
|
CVE-2020-28594 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1218
|
|
CVE-2020-28595 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1219
|
|
CVE-2020-28596 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1220
|
|
CVE-2020-28597 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1221
|
|
CVE-2020-28598 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1222
|
|
CVE-2020-28599 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1223
|
|
CVE-2020-2860 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28600 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1224
|
|
CVE-2020-28601 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28602 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28603 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28604 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28605 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28606 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28607 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28608 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28609 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-2861 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28610 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28611 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28612 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28613 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28614 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28615 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28616 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28617 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28618 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28619 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-2862 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28620 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28621 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28622 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28623 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28624 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28625 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28626 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28627 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28628 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28629 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-2863 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28630 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28631 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28632 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28633 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28634 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28635 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-28636 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-2864 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28647 - https://labs.secforce.com/posts/progress-moveit-transfer-2020.1-stored-xss-cve-2020-28647/
|
|
CVE-2020-28648 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html
|
|
CVE-2020-28648 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/
|
|
CVE-2020-2865 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28653 - http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html
|
|
CVE-2020-28657 - https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-28657
|
|
CVE-2020-2866 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2867 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28672 - https://github.com/fortest-1/vuln/blob/main/MonoCMS%20Blog/MonoCMS%20Blog%201.0_remote_code_execution.md
|
|
CVE-2020-2868 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28687 - https://packetstormsecurity.com/files/160095/Artworks-Gallery-1.0-Shell-Upload.html
|
|
CVE-2020-28688 - https://packetstormsecurity.com/files/160095/Artworks-Gallery-1.0-Shell-Upload.html
|
|
CVE-2020-2869 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28695 - https://cr1pt0.medium.com/cve-2020-28695-8f8d618ac0b
|
|
CVE-2020-2870 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28705 - https://github.com/daylightstudio/FUEL-CMS/issues/576
|
|
CVE-2020-28707 - https://jondow.eu/cve-2020-28707-xss-in-stockdio-historical-chart-plugin-for-wordpress-before-version-281/
|
|
CVE-2020-2871 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28717 - https://github.com/kindsoft/kindeditor/issues/321
|
|
CVE-2020-2872 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28722 - https://www.r29k.com/articles/bb/stored-xss-in-deskpro
|
|
CVE-2020-2873 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2874 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2875 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28759 - https://github.com/OAID/Tengine/issues/476
|
|
CVE-2020-2876 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2877 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2878 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2879 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2880 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2881 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2882 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2883 - http://packetstormsecurity.com/files/157950/WebLogic-Server-Deserialization-Remote-Code-Execution.html
|
|
CVE-2020-2883 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28838 - https://www.exploit-db.com/exploits/49228
|
|
CVE-2020-2884 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28840 - https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820
|
|
CVE-2020-28841 - https://github.com/datadancer/WinSysVuln/blob/main/DriverGenius-MyDrivers64.md
|
|
CVE-2020-28845 - http://the-it-wonders.blogspot.com/2020/11/netskope-csv-injection-in-admin-ui.html
|
|
CVE-2020-28849 - https://github.com/ChurchCRM/CRM/issues/5477
|
|
CVE-2020-2885 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28856 - http://packetstormsecurity.com/files/160453/OpenAsset-Digital-Asset-Management-IP-Access-Control-Bypass.html
|
|
CVE-2020-28856 - http://seclists.org/fulldisclosure/2020/Dec/17
|
|
CVE-2020-28857 - http://packetstormsecurity.com/files/160455/OpenAsset-Digital-Asset-Management-Cross-Site-Scripting.html
|
|
CVE-2020-28857 - http://seclists.org/fulldisclosure/2020/Dec/18
|
|
CVE-2020-28858 - http://packetstormsecurity.com/files/160458/OpenAsset-Digital-Asset-Management-Cross-Site-Request-Forgery.html
|
|
CVE-2020-28858 - http://seclists.org/fulldisclosure/2020/Dec/19
|
|
CVE-2020-2886 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28860 - http://packetstormsecurity.com/files/160459/OpenAsset-Digital-Asset-Management-SQL-Injection.html
|
|
CVE-2020-28860 - http://seclists.org/fulldisclosure/2020/Dec/21
|
|
CVE-2020-28861 - http://packetstormsecurity.com/files/160457/OpenAsset-Digital-Asset-Management-Insecure-Direct-Object-Reference.html
|
|
CVE-2020-28861 - http://seclists.org/fulldisclosure/2020/Dec/22
|
|
CVE-2020-28864 - https://winscp.net/forum/viewtopic.php?t=30085
|
|
CVE-2020-2887 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28870 - https://www.exploit-db.com/exploits/48946
|
|
CVE-2020-28871 - http://packetstormsecurity.com/files/163263/Monitorr-1.7.6m-Bypass-Information-Disclosure-Shell-Upload.html
|
|
CVE-2020-28871 - http://packetstormsecurity.com/files/170974/Monitorr-1.7.6-Shell-Upload.html
|
|
CVE-2020-28871 - http://packetstormsecurity.com/files/171429/Monitorr-1.7.6m-1.7.7d-Remote-Code-Execution.html
|
|
CVE-2020-28871 - https://www.exploit-db.com/exploits/48980
|
|
CVE-2020-28872 - http://packetstormsecurity.com/files/163263/Monitorr-1.7.6m-Bypass-Information-Disclosure-Shell-Upload.html
|
|
CVE-2020-28872 - https://www.exploit-db.com/exploits/48981
|
|
CVE-2020-28877 - https://github.com/peanuts62/TP-Link-poc
|
|
CVE-2020-2888 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28884 - https://medium.com/@tranpdanh/some-way-to-execute-os-command-in-liferay-portal-84498bde18d3
|
|
CVE-2020-28885 - https://medium.com/@tranpdanh/some-way-to-execute-os-command-in-liferay-portal-84498bde18d3
|
|
CVE-2020-2889 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28895 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-28898 - https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/1318289409/v2021.2+-+March+2021
|
|
CVE-2020-2890 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28900 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html
|
|
CVE-2020-28900 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/
|
|
CVE-2020-28901 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html
|
|
CVE-2020-28901 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/
|
|
CVE-2020-28902 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html
|
|
CVE-2020-28902 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/
|
|
CVE-2020-28903 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html
|
|
CVE-2020-28903 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/
|
|
CVE-2020-28904 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html
|
|
CVE-2020-28904 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/
|
|
CVE-2020-28905 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html
|
|
CVE-2020-28905 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/
|
|
CVE-2020-28906 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html
|
|
CVE-2020-28906 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/
|
|
CVE-2020-28907 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html
|
|
CVE-2020-28907 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/
|
|
CVE-2020-28908 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html
|
|
CVE-2020-28908 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/
|
|
CVE-2020-28909 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html
|
|
CVE-2020-28909 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/
|
|
CVE-2020-2891 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28910 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html
|
|
CVE-2020-28910 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/
|
|
CVE-2020-28911 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html
|
|
CVE-2020-28911 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/
|
|
CVE-2020-28915 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15
|
|
CVE-2020-28915 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5af08640795b2b9a940c9266c0260455377ae262
|
|
CVE-2020-28915 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6735b4632def0640dbdf4eb9f99816aca18c4f16
|
|
CVE-2020-2892 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28923 - https://www.playframework.com/security/vulnerability
|
|
CVE-2020-28926 - https://www.rootshellsecurity.net/remote-heap-corruption-bug-discovery-minidlna/
|
|
CVE-2020-28928 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-28928 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-2893 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28937 - https://labs.bishopfox.com/advisories/openclinic-version-0.8.2
|
|
CVE-2020-28938 - https://labs.bishopfox.com/advisories/openclinic-version-0.8.2
|
|
CVE-2020-28939 - https://labs.bishopfox.com/advisories/openclinic-version-0.8.2
|
|
CVE-2020-2894 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28940 - https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115
|
|
CVE-2020-28941 - http://www.openwall.com/lists/oss-security/2020/11/19/5
|
|
CVE-2020-28941 - https://www.openwall.com/lists/oss-security/2020/11/19/3
|
|
CVE-2020-28943 - http://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html
|
|
CVE-2020-28944 - http://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html
|
|
CVE-2020-28945 - https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html
|
|
CVE-2020-28948 - https://github.com/pear/Archive_Tar/issues/33
|
|
CVE-2020-28949 - http://packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html
|
|
CVE-2020-28949 - https://github.com/pear/Archive_Tar/issues/33
|
|
CVE-2020-2895 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28950 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#290720
|
|
CVE-2020-28955 - https://www.vulnerability-lab.com/get_content.php?id=2257
|
|
CVE-2020-28956 - https://www.vulnerability-lab.com/get_content.php?id=2249
|
|
CVE-2020-28957 - https://www.vulnerability-lab.com/get_content.php?id=2241
|
|
CVE-2020-2896 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28960 - https://www.vulnerability-lab.com/get_content.php?id=2259
|
|
CVE-2020-28961 - https://www.vulnerability-lab.com/get_content.php?id=2231
|
|
CVE-2020-28963 - https://www.vulnerability-lab.com/get_content.php?id=2258
|
|
CVE-2020-28964 - https://www.vulnerability-lab.com/get_content.php?id=2236
|
|
CVE-2020-28967 - https://www.vulnerability-lab.com/get_content.php?id=2248
|
|
CVE-2020-28968 - https://www.vulnerability-lab.com/get_content.php?id=2244
|
|
CVE-2020-2897 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28970 - https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115
|
|
CVE-2020-28971 - https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115
|
|
CVE-2020-28974 - http://www.openwall.com/lists/oss-security/2020/11/25/1
|
|
CVE-2020-28974 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7
|
|
CVE-2020-28974 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804
|
|
CVE-2020-28974 - https://seclists.org/oss-sec/2020/q4/104
|
|
CVE-2020-28975 - http://packetstormsecurity.com/files/160281/SciKit-Learn-0.23.2-Denial-Of-Service.html
|
|
CVE-2020-28975 - https://github.com/scikit-learn/scikit-learn/issues/18891
|
|
CVE-2020-28976 - http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html
|
|
CVE-2020-28977 - http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html
|
|
CVE-2020-28978 - http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html
|
|
CVE-2020-2898 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2899 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-28993 - https://www.exploit-db.com/exploits/49124
|
|
CVE-2020-28994 - https://gist.github.com/wes4m/e32080b02c2cd668d50eeac66613ca1d
|
|
CVE-2020-2900 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29007 - https://github.com/seqred-s-a/cve-2020-29007
|
|
CVE-2020-2901 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29013 - https://fortiguard.com/advisory/FG-IR-20-178
|
|
CVE-2020-2902 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29020 - https://www.secomea.com/support/cybersecurity-advisory/#3217
|
|
CVE-2020-29021 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2020-29022 - https://www.secomea.com/support/cybersecurity-advisory/#2923
|
|
CVE-2020-29023 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2020-29023 - https://www.secomea.com/support/cybersecurity-advisory/#2418
|
|
CVE-2020-29024 - https://www.secomea.com/support/cybersecurity-advisory/#2418
|
|
CVE-2020-29025 - https://www.secomea.com/support/cybersecurity-advisory/#3042
|
|
CVE-2020-29026 - https://www.secomea.com/support/cybersecurity-advisory/#2918
|
|
CVE-2020-29027 - https://www.secomea.com/support/cybersecurity-advisory/#3042
|
|
CVE-2020-29028 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2020-29029 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2020-2903 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29030 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2020-29031 - https://www.secomea.com/support/cybersecurity-advisory/#2920
|
|
CVE-2020-29032 - https://www.secomea.com/support/cybersecurity-advisory/#3737
|
|
CVE-2020-29032 - https://www.tenable.com/security/research/tra-2021-06
|
|
CVE-2020-2904 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29042 - http://packetstormsecurity.com/files/160238/BigBlueButton-2.2.29-Brute-Force.html
|
|
CVE-2020-29043 - http://packetstormsecurity.com/files/160239/BigBlueButton-2.2.29-E-mail-Validation-Bypass.html
|
|
CVE-2020-2905 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29053 - https://grimthereaperteam.medium.com/hrsale-v-2-0-0-reflected-cross-site-scripting-17a5617e2c6e
|
|
CVE-2020-2906 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2907 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29071 - https://lean0x2f.github.io/liquidfiles_advisory
|
|
CVE-2020-29072 - https://lean0x2f.github.io/liquidfiles_advisory
|
|
CVE-2020-2908 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2909 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2910 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2911 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2912 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29127 - http://packetstormsecurity.com/files/160255/Fujitsu-Eternus-Storage-DX200-S4-Broken-Authentication.html
|
|
CVE-2020-2913 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29134 - https://systemweakness.com/cve-2020-29134-totvs-fluig-platform-f298ea84b507
|
|
CVE-2020-29134 - https://www.exploit-db.com/exploits/49622
|
|
CVE-2020-29138 - https://medium.com/@alexandrevvo/improper-access-control-in-the-sagemcom-router-model-f-st3486-net-797968e8adc8
|
|
CVE-2020-2914 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29144 - http://the-it-wonders.blogspot.com/2020/01/ericsson-bscs-ix-r18-billing-rating.html
|
|
CVE-2020-29145 - http://the-it-wonders.blogspot.com/2020/01/ericsson-bscs-ix-r18-billing-rating.html
|
|
CVE-2020-2915 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29163 - https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d
|
|
CVE-2020-29164 - https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d
|
|
CVE-2020-29165 - https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d
|
|
CVE-2020-29166 - https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d
|
|
CVE-2020-29168 - https://www.exploit-db.com/exploits/49059
|
|
CVE-2020-29189 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
|
|
CVE-2020-2920 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29203 - https://github.com/armink/struct2json/issues/13
|
|
CVE-2020-29204 - https://github.com/xuxueli/xxl-job/issues/2083
|
|
CVE-2020-29205 - https://nikhilkumar01.medium.com/cve-2020-29205-a7ab5cbcd156
|
|
CVE-2020-29205 - https://www.exploit-db.com/exploits/48969
|
|
CVE-2020-2921 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29214 - https://www.exploit-db.com/exploits/48883
|
|
CVE-2020-29215 - https://www.exploit-db.com/exploits/48881
|
|
CVE-2020-2922 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29227 - https://loopspell.medium.com/cve-2020-29227-unauthenticated-local-file-inclusion-7d3bd2c5c6a5
|
|
CVE-2020-29228 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-29228.md
|
|
CVE-2020-2923 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29230 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-29230.md
|
|
CVE-2020-29231 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-29231.md
|
|
CVE-2020-29233 - https://www.exploit-db.com/exploits/49085
|
|
CVE-2020-29238 - http://packetstormsecurity.com/files/162152/ExpressVPN-VPN-Router-1.0-Integer-Overflow.html
|
|
CVE-2020-29239 - https://www.exploit-db.com/exploits/49159
|
|
CVE-2020-2924 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29240 - https://www.exploit-db.com/exploits/49137
|
|
CVE-2020-29247 - https://systemweakness.com/cve-2020-29247-wondercms-3-1-3-page-persistent-cross-site-scripting-3dd2bb210beb
|
|
CVE-2020-29247 - https://www.exploit-db.com/exploits/49102
|
|
CVE-2020-2925 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29254 - https://youtu.be/Uc3sRBitu50
|
|
CVE-2020-29257 - https://asfiyashaikh20.medium.com/exploit-for-cve-2020-29257-reflected-cross-site-scripting-xss-vulnerability-4a7bf9ae7d80
|
|
CVE-2020-29258 - https://asfiyashaikh20.medium.com/exploit-for-cve-2020-29258-reflected-cross-site-scripting-xss-vulnerability-957f365a1f3b
|
|
CVE-2020-29259 - https://asfiyashaikh20.medium.com/cve-2020-29259-persistent-xss-2ef63cc5cee6
|
|
CVE-2020-2926 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2927 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29279 - https://github.com/BigTiger2020/74CMS/blob/main/README.md
|
|
CVE-2020-2928 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29280 - https://github.com/BigTiger2020/Victor-CMS-/blob/main/README.md
|
|
CVE-2020-29280 - https://www.exploit-db.com/exploits/48734
|
|
CVE-2020-29282 - https://github.com/BigTiger2020/BloodX-CMS/blob/main/README.md
|
|
CVE-2020-29282 - https://www.exploit-db.com/exploits/48786
|
|
CVE-2020-29283 - https://github.com/BigTiger2020/Online-Doctor-Appointment-Booking-System-PHP/blob/main/README.md
|
|
CVE-2020-29284 - https://www.exploit-db.com/exploits/48984
|
|
CVE-2020-29285 - https://github.com/BigTiger2020/Point-of-Sales/blob/main/README.md
|
|
CVE-2020-29287 - https://www.exploit-db.com/exploits/49056
|
|
CVE-2020-29288 - https://www.exploit-db.com/exploits/48936
|
|
CVE-2020-2929 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2930 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29303 - http://packetstormsecurity.com/files/160452/WordPress-DirectoriesPro-1.3.45-Cross-Site-Scripting.html
|
|
CVE-2020-29303 - http://seclists.org/fulldisclosure/2020/Dec/14
|
|
CVE-2020-29304 - http://packetstormsecurity.com/files/160452/WordPress-DirectoriesPro-1.3.45-Cross-Site-Scripting.html
|
|
CVE-2020-29304 - http://seclists.org/fulldisclosure/2020/Dec/15
|
|
CVE-2020-2931 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29315 - https://github.com/zoujingli/ThinkAdmin/issues/255
|
|
CVE-2020-2932 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29321 - https://cybersecurityworks.com/zerodays/cve-2020-29321-telnet-hardcoded-credentials.html
|
|
CVE-2020-29322 - https://cybersecurityworks.com/zerodays/cve-2020-29322-telnet-hardcoded-credentials.html
|
|
CVE-2020-29323 - https://cybersecurityworks.com/zerodays/cve-2020-29323-telnet-hardcoded-credentials.html
|
|
CVE-2020-29324 - https://cybersecurityworks.com/zerodays/cve-2020-29324-d-link-router-dir-895l-mfc-telnet-hardcoded-credentials.html
|
|
CVE-2020-2933 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2934 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2934 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-2935 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2936 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29363 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-29364 - https://github.com/aslanemre/CVE-2020-29364/blob/main/CVE-2020-29364
|
|
CVE-2020-29368 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.5
|
|
CVE-2020-29368 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c444eb564fb16645c172d550359cb3d75fe8a040
|
|
CVE-2020-29369 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.11
|
|
CVE-2020-29369 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=246c320a8cfe0b11d81a4af38fa9985ef0cc9a4c
|
|
CVE-2020-2937 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29370 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd4d9c7d0c71866ec0c2825189ebd2ce35bd95b8
|
|
CVE-2020-29371 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.4
|
|
CVE-2020-29371 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2935e0a3cec1ffa558eea90db6279cff83aa3592
|
|
CVE-2020-29371 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bcf85fcedfdd17911982a3e3564fcfec7b01eebd
|
|
CVE-2020-29372 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
|
|
CVE-2020-29372 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.8
|
|
CVE-2020-29372 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0c4d1e176eeb614dc8734fc3ace34292771f11
|
|
CVE-2020-29373 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6
|
|
CVE-2020-29373 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ff002b30181d30cdfbca316dadd099c3ca0d739c
|
|
CVE-2020-29374 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
|
|
CVE-2020-29374 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3
|
|
CVE-2020-29374 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f
|
|
CVE-2020-2938 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29384 - https://gist.github.com/mmmdzz/03df5177afd04b32ac190eb7907f3834
|
|
CVE-2020-2939 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29392 - https://i.blackhat.com/asia-20/Friday/asia-20-Loke-Patching-Loopholes-Finding-Backdoors-In-Applications.pdf
|
|
CVE-2020-29394 - https://github.com/GENIVI/dlt-daemon/issues/274
|
|
CVE-2020-29395 - http://packetstormsecurity.com/files/160282/WordPress-EventON-Calendar-3.0.5-Cross-Site-Scripting.html
|
|
CVE-2020-29396 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-2940 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2941 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2942 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2943 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29436 - https://support.sonatype.com/hc/en-us/articles/1500000415082-CVE-2020-29436-Nexus-Repository-Manager-3-XML-External-Entities-injection-2020-12-15
|
|
CVE-2020-29437 - https://github.com/orangehrm/orangehrm/issues/695
|
|
CVE-2020-29437 - https://www.horizon3.ai/disclosures/orangehrm-sqli.html
|
|
CVE-2020-2944 - http://packetstormsecurity.com/files/157280/Common-Desktop-Environment-1.6-Local-Privilege-Escalation.html
|
|
CVE-2020-2944 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2945 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29456 - https://github.com/ciur/papermerge/issues/228
|
|
CVE-2020-29457 - https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf
|
|
CVE-2020-29458 - https://www.exploit-db.com/exploits/48907
|
|
CVE-2020-2946 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29469 - https://www.exploit-db.com/exploits/49164
|
|
CVE-2020-2947 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29470 - https://www.exploit-db.com/exploits/49099
|
|
CVE-2020-29471 - https://www.exploit-db.com/exploits/49098
|
|
CVE-2020-29472 - https://systemweakness.com/cve-2020-29472-under-construction-page-with-cpanel-1-0-sql-injection-18a6508c9683
|
|
CVE-2020-29472 - https://www.exploit-db.com/exploits/49150
|
|
CVE-2020-29474 - https://systemweakness.com/cve-2020-29474-egavilanmedia-address-book-1-0-exploit-sqli-auth-bypass-228cd4864262
|
|
CVE-2020-29474 - https://www.exploit-db.com/exploits/49182
|
|
CVE-2020-29475 - https://www.exploit-db.com/exploits/49093
|
|
CVE-2020-29477 - https://www.exploit-db.com/exploits/49188
|
|
CVE-2020-2949 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29499 - https://www.dell.com/support/kbdoc/000180775
|
|
CVE-2020-2950 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29500 - https://www.dell.com/support/kbdoc/000180775
|
|
CVE-2020-29501 - https://www.dell.com/support/kbdoc/000180775
|
|
CVE-2020-29502 - https://www.dell.com/support/kbdoc/000180775
|
|
CVE-2020-29503 - https://www.dell.com/support/kbdoc/000180775
|
|
CVE-2020-29505 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-29506 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-29507 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-29508 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-2951 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2952 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29529 - https://securitylab.github.com/advisories/GHSL-2020-262-zipslip-go-slug
|
|
CVE-2020-2953 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29534 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.3
|
|
CVE-2020-29534 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f2122045b946241a9e549c2a76cea54fa58a7ff
|
|
CVE-2020-29535 - https://www.rsa.com/en-us/company/vulnerability-response-policy
|
|
CVE-2020-29536 - https://www.rsa.com/en-us/company/vulnerability-response-policy
|
|
CVE-2020-29537 - https://www.rsa.com/en-us/company/vulnerability-response-policy
|
|
CVE-2020-29538 - https://www.rsa.com/en-us/company/vulnerability-response-policy
|
|
CVE-2020-29539 - https://grave-rose.medium.com/two-systran-vulnerabilities-and-their-exploits-8bc83ba29e14
|
|
CVE-2020-2954 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29540 - https://grave-rose.medium.com/two-systran-vulnerabilities-and-their-exploits-8bc83ba29e14
|
|
CVE-2020-29547 - http://uncensored.citadel.org/msg/4576039
|
|
CVE-2020-2955 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29550 - http://packetstormsecurity.com/files/160726/URVE-Software-Build-24.03.2020-Information-Disclosure.html
|
|
CVE-2020-29550 - http://seclists.org/fulldisclosure/2020/Dec/49
|
|
CVE-2020-29550 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-042.txt
|
|
CVE-2020-29551 - http://packetstormsecurity.com/files/160725/URVE-Software-Build-24.03.2020-Missing-Authorization.html
|
|
CVE-2020-29551 - http://seclists.org/fulldisclosure/2020/Dec/48
|
|
CVE-2020-29551 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-041.txt
|
|
CVE-2020-29552 - http://packetstormsecurity.com/files/160722/URVE-Software-Build-24.03.2020-Authentication-Bypass-Remote-Code-Execution.html
|
|
CVE-2020-29552 - http://seclists.org/fulldisclosure/2020/Dec/47
|
|
CVE-2020-29552 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-040.txt
|
|
CVE-2020-2956 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29563 - https://www.westerndigital.com/support/productsecurity/wdc-20010-my-cloud-os5-firmware-5-07-118
|
|
CVE-2020-29574 - https://www.bleepingcomputer.com/news/security/sophos-fixes-sql-injection-vulnerability-in-their-cyberoam-os/
|
|
CVE-2020-2958 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29582 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-29582 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-29582 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-29587 - https://github.com/simplcommerce/SimplCommerce/issues/969
|
|
CVE-2020-2959 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29596 - https://packetstormsecurity.com/files/160470/MiniWeb-HTTP-Server-0.8.19-Buffer-Overflow.html
|
|
CVE-2020-29596 - https://www.exploit-db.com/exploits/49247
|
|
CVE-2020-29597 - http://packetstormsecurity.com/files/160784/Incom-CMS-2.0-File-Upload.html
|
|
CVE-2020-29599 - https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html
|
|
CVE-2020-29603 - https://mantisbt.org/bugs/view.php?id=27357
|
|
CVE-2020-29604 - https://mantisbt.org/bugs/view.php?id=27357
|
|
CVE-2020-29605 - https://mantisbt.org/bugs/view.php?id=27357
|
|
CVE-2020-29607 - http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html
|
|
CVE-2020-2961 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2963 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-2964 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-29651 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-29654 - https://www.westerndigital.com/support/productsecurity/wdc-20011-western-digital-dashboard-privilege-escalation
|
|
CVE-2020-29655 - https://vuldb.com/?id.165678
|
|
CVE-2020-29656 - https://vuldb.com/?id.165677
|
|
CVE-2020-29659 - https://www.exploit-db.com/exploits/49217
|
|
CVE-2020-2966 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-29660 - http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
|
|
CVE-2020-29660 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
|
|
CVE-2020-29661 - http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html
|
|
CVE-2020-29661 - http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
|
|
CVE-2020-29661 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc
|
|
CVE-2020-29661 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-29664 - http://hacktheplanet.nu/djihax.pdf
|
|
CVE-2020-29669 - http://packetstormsecurity.com/files/160478/Macally-WIFISD2-2A82-2.000.010-Privilege-Escalation.html
|
|
CVE-2020-29669 - https://github.com/S1lkys/CVE-2020-29669
|
|
CVE-2020-2967 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2968 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2969 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2971 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2972 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2973 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2974 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2975 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2976 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2977 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2978 - http://packetstormsecurity.com/files/172183/Oracle-RMAN-Missing-Auditing.html
|
|
CVE-2020-2978 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2981 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2982 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2983 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-2984 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-3110 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html
|
|
CVE-2020-3111 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html
|
|
CVE-2020-3118 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html
|
|
CVE-2020-3119 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html
|
|
CVE-2020-3120 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html
|
|
CVE-2020-3153 - http://packetstormsecurity.com/files/157340/Cisco-AnyConnect-Secure-Mobility-Client-4.8.01090-Privilege-Escalation.html
|
|
CVE-2020-3153 - http://packetstormsecurity.com/files/158219/Cisco-AnyConnect-Path-Traversal-Privilege-Escalation.html
|
|
CVE-2020-3153 - http://packetstormsecurity.com/files/159420/Cisco-AnyConnect-Privilege-Escalation.html
|
|
CVE-2020-3161 - http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html
|
|
CVE-2020-3161 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs
|
|
CVE-2020-3187 - http://packetstormsecurity.com/files/158648/Cisco-Adaptive-Security-Appliance-Software-9.7-Arbitrary-File-Deletion.html
|
|
CVE-2020-3235 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-3239 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E
|
|
CVE-2020-3240 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E
|
|
CVE-2020-3243 - http://packetstormsecurity.com/files/157955/Cisco-UCS-Director-Cloupia-Script-Remote-Code-Execution.html
|
|
CVE-2020-3243 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E
|
|
CVE-2020-3247 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E
|
|
CVE-2020-3248 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E
|
|
CVE-2020-3249 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E
|
|
CVE-2020-3250 - http://packetstormsecurity.com/files/157955/Cisco-UCS-Director-Cloupia-Script-Remote-Code-Execution.html
|
|
CVE-2020-3250 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E
|
|
CVE-2020-3251 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E
|
|
CVE-2020-3252 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E
|
|
CVE-2020-3264 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-wwq2-pxrj-v62r
|
|
CVE-2020-3268 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-injection-tWC7krKQ
|
|
CVE-2020-3269 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-injection-tWC7krKQ
|
|
CVE-2020-3274 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8
|
|
CVE-2020-3275 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8
|
|
CVE-2020-3276 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8
|
|
CVE-2020-3277 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8
|
|
CVE-2020-3278 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8
|
|
CVE-2020-3279 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8
|
|
CVE-2020-3286 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz
|
|
CVE-2020-3287 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz
|
|
CVE-2020-3288 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz
|
|
CVE-2020-3289 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz
|
|
CVE-2020-3290 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz
|
|
CVE-2020-3291 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz
|
|
CVE-2020-3292 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz
|
|
CVE-2020-3293 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz
|
|
CVE-2020-3294 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz
|
|
CVE-2020-3295 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz
|
|
CVE-2020-3296 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz
|
|
CVE-2020-3347 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-client-NBmqM9vt
|
|
CVE-2020-3350 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-famp-ZEpdXy
|
|
CVE-2020-3387 - http://packetstormsecurity.com/files/162958/Cisco-SD-WAN-vManage-19.2.2-Remote-Root.html
|
|
CVE-2020-3433 - http://packetstormsecurity.com/files/159420/Cisco-AnyConnect-Privilege-Escalation.html
|
|
CVE-2020-3433 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-F26WwJW
|
|
CVE-2020-3437 - http://packetstormsecurity.com/files/162958/Cisco-SD-WAN-vManage-19.2.2-Remote-Root.html
|
|
CVE-2020-3452 - http://packetstormsecurity.com/files/158646/Cisco-ASA-FTD-Remote-File-Disclosure.html
|
|
CVE-2020-3452 - http://packetstormsecurity.com/files/158647/Cisco-Adaptive-Security-Appliance-Software-9.11-Local-File-Inclusion.html
|
|
CVE-2020-3452 - http://packetstormsecurity.com/files/159523/Cisco-ASA-FTD-9.6.4.42-Path-Traversal.html
|
|
CVE-2020-3452 - http://packetstormsecurity.com/files/160497/Cisco-ASA-9.14.1.10-FTD-6.6.0.1-Path-Traversal.html
|
|
CVE-2020-35012 - https://wpscan.com/vulnerability/323140b1-66c4-4e7d-85a4-1c922e40866f
|
|
CVE-2020-35037 - https://wpscan.com/vulnerability/937b9bdb-7e8e-4ea8-82ec-aa5f6bd70619
|
|
CVE-2020-35124 - https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce
|
|
CVE-2020-35125 - https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce
|
|
CVE-2020-35126 - https://www.exploit-db.com/exploits/48852
|
|
CVE-2020-35128 - https://labs.bishopfox.com/advisories/mautic-version-3.2.2
|
|
CVE-2020-35129 - https://labs.bishopfox.com/advisories/mautic-version-3.2.2
|
|
CVE-2020-35131 - https://www.exploit-db.com/exploits/49390
|
|
CVE-2020-35151 - https://www.exploit-db.com/exploits/49307
|
|
CVE-2020-35163 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-35164 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-35166 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-35167 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-35168 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-35169 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-35175 - https://github.com/frappe/frappe/pull/11237
|
|
CVE-2020-35198 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-35199 - https://www.exploit-db.com/exploits/49233
|
|
CVE-2020-35201 - https://www.exploit-db.com/exploits/49234
|
|
CVE-2020-35202 - https://www.exploit-db.com/exploits/49235
|
|
CVE-2020-35208 - https://youtu.be/63PfHVSr8iw
|
|
CVE-2020-35211 - https://docs.google.com/presentation/d/1C_IpRfSU-9FMezcHCFZ-qg-15JO-W36yvqcnzI8sQs8/edit?usp=sharing
|
|
CVE-2020-35214 - https://docs.google.com/presentation/d/1wJi4QJko5ZCdADuzmAG9ed-nQLyJVkLBJf6cylAL71A/edit?usp=sharing
|
|
CVE-2020-35221 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/
|
|
CVE-2020-35223 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/
|
|
CVE-2020-35224 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/
|
|
CVE-2020-35225 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/
|
|
CVE-2020-35226 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/
|
|
CVE-2020-35227 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/
|
|
CVE-2020-35228 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/
|
|
CVE-2020-35229 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/
|
|
CVE-2020-35230 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/
|
|
CVE-2020-35231 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/
|
|
CVE-2020-35233 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/
|
|
CVE-2020-35240 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-35240.md
|
|
CVE-2020-35240 - https://github.com/hemantsolo/CVE-Reference/issues/1
|
|
CVE-2020-35241 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-35241.md
|
|
CVE-2020-35242 - https://github.com/balloonwj/flamingo/issues/47
|
|
CVE-2020-35243 - https://github.com/balloonwj/flamingo/issues/47
|
|
CVE-2020-35244 - https://github.com/balloonwj/flamingo/issues/47
|
|
CVE-2020-35245 - https://github.com/balloonwj/flamingo/issues/47
|
|
CVE-2020-35249 - https://www.exploit-db.com/exploits/48756
|
|
CVE-2020-35252 - https://www.exploit-db.com/exploits/49153
|
|
CVE-2020-35261 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0
|
|
CVE-2020-35261 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2020-35261 - https://www.exploit-db.com/exploits/49135
|
|
CVE-2020-35262 - https://github.com/the-girl-who-lived/CVE-2020-35262
|
|
CVE-2020-35262 - https://youtu.be/E5wEzf-gkOE
|
|
CVE-2020-35263 - https://www.exploit-db.com/exploits/49058
|
|
CVE-2020-35269 - https://gist.github.com/MoSalah20/d1d40b43eafba0bd22ee4cddecad3cbc
|
|
CVE-2020-35270 - https://www.exploit-db.com/exploits/49152
|
|
CVE-2020-35271 - https://riteshgohil-25.medium.com/employee-performance-evaluation-system-1-0-first-and-last-name-persistent-cross-site-scripting-7f319775e96f
|
|
CVE-2020-35272 - https://www.exploit-db.com/exploits/49215
|
|
CVE-2020-35273 - https://www.exploit-db.com/exploits/49151
|
|
CVE-2020-35274 - https://www.exploit-db.com/exploits/49168
|
|
CVE-2020-35275 - https://www.exploit-db.com/exploits/49181
|
|
CVE-2020-35276 - https://hardik-solanki.medium.com/authentication-admin-panel-bypass-which-leads-to-full-admin-access-control-c10ec4ab4255
|
|
CVE-2020-35284 - https://github.com/balloonwj/flamingo/issues/48
|
|
CVE-2020-35296 - https://github.com/zoujingli/ThinkAdmin
|
|
CVE-2020-35309 - https://www.exploit-db.com/exploits/49161
|
|
CVE-2020-35313 - https://packetstormsecurity.com/files/160310/WonderCMS-3.1.3-Code-Execution-Server-Side-Request-Forgery.html
|
|
CVE-2020-35314 - https://packetstormsecurity.com/files/160311/WonderCMS-3.1.3-Remote-Code-Execution.html
|
|
CVE-2020-35327 - https://www.exploit-db.com/exploits/49243
|
|
CVE-2020-35328 - https://www.exploit-db.com/exploits/49241
|
|
CVE-2020-35329 - https://www.exploit-db.com/exploits/49242
|
|
CVE-2020-35337 - https://blog.unc1e.com/2020/12/thinksaas-has-post-auth-sql-injection.html
|
|
CVE-2020-35337 - https://github.com/thinksaas/ThinkSAAS/issues/24
|
|
CVE-2020-35338 - https://jeyaseelans.medium.com/cve-2020-35338-9e841f48defa
|
|
CVE-2020-35339 - https://github.com/BigTiger2020/74cms-rce/blob/main/README.md
|
|
CVE-2020-35342 - https://sourceware.org/bugzilla/show_bug.cgi?id=25319
|
|
CVE-2020-35346 - https://github.com/cbkhwx/cxuucmsv3/issues/4
|
|
CVE-2020-35347 - https://github.com/cbkhwx/cxuucmsv3/issues/5
|
|
CVE-2020-35349 - https://www.exploit-db.com/exploits/49196
|
|
CVE-2020-35359 - https://www.exploit-db.com/exploits/49105
|
|
CVE-2020-35362 - https://github.com/kbgsft/vuln-dext5upload/wiki/File-Download-Vulnerability-in-DEXT5Upload-2.7.1262310-by-xcuter
|
|
CVE-2020-35364 - https://github.com/yangfan6888/PoC
|
|
CVE-2020-35364 - https://github.com/yangfan6888/PoC/blob/main/PoC.cpp
|
|
CVE-2020-35370 - https://www.exploit-db.com/exploits/49265
|
|
CVE-2020-35376 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42066
|
|
CVE-2020-35378 - https://www.exploit-db.com/exploits/49212
|
|
CVE-2020-35388 - https://github.com/xuechengen/xinhu-oa/blob/main/README.md
|
|
CVE-2020-35391 - http://packetstormsecurity.com/files/171773/Tenda-N300-F3-12.01.01.48-Header-Processing.html
|
|
CVE-2020-35391 - https://medium.com/@signalhilltech/tenda-n300-authentication-bypass-via-malformed-http-request-header-5b8744ca685e
|
|
CVE-2020-35395 - https://nikhilkumar01.medium.com/cve-2020-35395-cd393ac8371c
|
|
CVE-2020-35395 - https://www.exploit-db.com/exploits/49146
|
|
CVE-2020-35396 - https://nikhilkumar01.medium.com/cve-2020-35396-f4b5675fb168
|
|
CVE-2020-35396 - https://www.exploit-db.com/exploits/49227
|
|
CVE-2020-35398 - https://cvewalkthrough.com/cve-2020-35398-uti-mutual-fund-android-application-username-enumeration/
|
|
CVE-2020-35416 - http://packetstormsecurity.com/files/160502/PHPJabbers-Appointment-Scheduler-2.3-Cross-Site-Scripting.html
|
|
CVE-2020-35416 - http://packetstormsecurity.com/files/160600/PHPJabbers-Appointment-Scheduler-2.3-Cross-Site-Scripting.html
|
|
CVE-2020-35416 - https://www.exploit-db.com/exploits/49281
|
|
CVE-2020-35418 - https://fatihhcelik.blogspot.com/2020/12/group-office-crm-stored-xss-via-svg-file.html
|
|
CVE-2020-35419 - https://fatihhcelik.github.io/posts/Group-Office-CRM-Stored-XSS-via-SVG-File/
|
|
CVE-2020-35427 - https://phpgurukul.com/
|
|
CVE-2020-35427 - https://www.exploit-db.com/exploits/49165
|
|
CVE-2020-35430 - https://gitee.com/inxeduopen/inxedu/issues/I294XL
|
|
CVE-2020-35437 - http://packetstormsecurity.com/files/160783/Subrion-CMS-4.2.1-Cross-Site-Scripting.html
|
|
CVE-2020-35448 - https://sourceware.org/bugzilla/show_bug.cgi?id=26574
|
|
CVE-2020-35452 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-35460 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-35470 - https://github.com/envoyproxy/envoy/issues/14087
|
|
CVE-2020-35470 - https://github.com/envoyproxy/envoy/pull/14131
|
|
CVE-2020-35471 - https://github.com/envoyproxy/envoy/pull/14122
|
|
CVE-2020-35473 - https://www.sigsac.org/ccs/CCS2022/proceedings/ccs-proceedings.html
|
|
CVE-2020-35476 - http://packetstormsecurity.com/files/170331/OpenTSDB-2.4.0-Command-Injection.html
|
|
CVE-2020-35476 - https://github.com/OpenTSDB/opentsdb/issues/2051
|
|
CVE-2020-35488 - https://github.com/GuillaumePetit84/CVE-2020-35488
|
|
CVE-2020-35489 - https://wpscan.com/vulnerability/10508
|
|
CVE-2020-35489 - https://www.jinsonvarghese.com/unrestricted-file-upload-in-contact-form-7/
|
|
CVE-2020-35490 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-35490 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-35490 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-35490 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-35490 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-35490 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-35490 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-35491 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-35491 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-35491 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-35491 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-35491 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-35491 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-35491 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-35505 - https://bugzilla.redhat.com/show_bug.cgi?id=1909769
|
|
CVE-2020-35530 - https://github.com/LibRaw/LibRaw/issues/272
|
|
CVE-2020-35531 - https://github.com/LibRaw/LibRaw/issues/270
|
|
CVE-2020-35532 - https://github.com/LibRaw/LibRaw/issues/271
|
|
CVE-2020-35533 - https://github.com/LibRaw/LibRaw/issues/273
|
|
CVE-2020-35534 - https://github.com/LibRaw/LibRaw/issues/279
|
|
CVE-2020-35535 - https://github.com/LibRaw/LibRaw/issues/283
|
|
CVE-2020-35539 - https://seclists.org/fulldisclosure/2021/Mar/24
|
|
CVE-2020-35548 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-35549 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-35550 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-35551 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-35552 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-35553 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-35556 - https://www.acronis.com
|
|
CVE-2020-3556 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK
|
|
CVE-2020-35575 - http://packetstormsecurity.com/files/163274/TP-Link-TL-WR841N-Command-Injection.html
|
|
CVE-2020-35575 - https://static.tp-link.com/2020/202012/20201214/wa901ndv5_eu_3_16_9_up_boot(201211).zip
|
|
CVE-2020-35577 - https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-35577
|
|
CVE-2020-35578 - http://packetstormsecurity.com/files/160948/Nagios-XI-5.7.x-Remote-Code-Execution.html
|
|
CVE-2020-35578 - http://packetstormsecurity.com/files/162207/Nagios-XI-Remote-Code-Execution.html
|
|
CVE-2020-35581 - http://packetstormsecurity.com/files/160924/Envira-Gallery-Lite-1.8.3.2-Cross-Site-Scripting.html
|
|
CVE-2020-35582 - http://packetstormsecurity.com/files/160924/Envira-Gallery-Lite-1.8.3.2-Cross-Site-Scripting.html
|
|
CVE-2020-35589 - https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/
|
|
CVE-2020-35590 - https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/
|
|
CVE-2020-35591 - https://n4nj0.github.io/advisories/pi-hole-multiple-vulnerabilities-i/
|
|
CVE-2020-35592 - https://n4nj0.github.io/advisories/pi-hole-multiple-vulnerabilities-i/
|
|
CVE-2020-35593 - https://www.securifera.com/advisories/
|
|
CVE-2020-35597 - https://cxsecurity.com/issue/WLB-2020120118
|
|
CVE-2020-35597 - https://www.exploit-db.com/exploits/49282
|
|
CVE-2020-35606 - http://packetstormsecurity.com/files/160676/Webmin-1.962-Remote-Command-Execution.html
|
|
CVE-2020-35606 - https://www.exploit-db.com/exploits/49318
|
|
CVE-2020-35606 - https://www.pentest.com.tr/exploits/Webmin-1962-PU-Escape-Bypass-Remote-Command-Execution.html
|
|
CVE-2020-35608 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1134
|
|
CVE-2020-35608 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1134
|
|
CVE-2020-35609 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1117
|
|
CVE-2020-35625 - https://phabricator.wikimedia.org/T269718
|
|
CVE-2020-35627 - https://gist.github.com/bc0d3/cbc458f0fcbe0f897e529c7f3d77c9d6
|
|
CVE-2020-35628 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-35629 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-35630 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-35631 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-35632 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-35633 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-35634 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-35635 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-35636 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
|
|
CVE-2020-35660 - https://www.huntr.dev/bounties/1-other-monica/
|
|
CVE-2020-35664 - https://www.acronis.com
|
|
CVE-2020-35665 - http://packetstormsecurity.com/files/172880/TerraMaster-TOS-4.2.06-Remote-Code-Execution.html
|
|
CVE-2020-35665 - https://www.exploit-db.com/exploits/49330
|
|
CVE-2020-35665 - https://www.pentest.com.tr/exploits/TerraMaster-TOS-4-2-06-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2020-35677 - https://labs.ingredous.com/2020/07/13/ois-groupedit-xss/
|
|
CVE-2020-35679 - https://poolp.org/posts/2020-12-24/december-2020-opensmtpd-6.8.0p1-released-fixed-several-bugs-proposed-several-diffs-book-is-on-github/
|
|
CVE-2020-35680 - https://poolp.org/posts/2020-12-24/december-2020-opensmtpd-6.8.0p1-released-fixed-several-bugs-proposed-several-diffs-book-is-on-github/
|
|
CVE-2020-35683 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
|
CVE-2020-35683 - https://www.kb.cert.org/vuls/id/608209
|
|
CVE-2020-35684 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
|
CVE-2020-35684 - https://www.kb.cert.org/vuls/id/608209
|
|
CVE-2020-35685 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
|
CVE-2020-35685 - https://www.kb.cert.org/vuls/id/608209
|
|
CVE-2020-35687 - https://www.exploit-db.com/exploits/49426
|
|
CVE-2020-35693 - https://github.com/alwentiu/contact-tracing-research/blob/main/samsung.pdf
|
|
CVE-2020-35700 - https://www.horizon3.ai/disclosures/librenms-second-order-sqli
|
|
CVE-2020-35702 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1011
|
|
CVE-2020-35710 - https://www.elladodelmal.com/2020/12/blue-team-red-team-como-parallels-ras.html
|
|
CVE-2020-35713 - https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions
|
|
CVE-2020-35713 - https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html
|
|
CVE-2020-35714 - https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions
|
|
CVE-2020-35714 - https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html
|
|
CVE-2020-35715 - https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions
|
|
CVE-2020-35715 - https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html
|
|
CVE-2020-35716 - https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions
|
|
CVE-2020-35716 - https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html
|
|
CVE-2020-35717 - https://medium.com/bugbountywriteup/remote-code-execution-through-cross-site-scripting-in-electron-f3b891ad637
|
|
CVE-2020-35728 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-35728 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-35728 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-35728 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-35728 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-35728 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-35728 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-35729 - http://packetstormsecurity.com/files/160798/Klog-Server-2.4.1-Command-Injection.html
|
|
CVE-2020-35729 - http://packetstormsecurity.com/files/161123/Klog-Server-2.4.1-Command-Injection.html
|
|
CVE-2020-35729 - http://packetstormsecurity.com/files/161410/Klog-Server-2.4.1-Command-Injection.html
|
|
CVE-2020-35734 - http://packetstormsecurity.com/files/161457/Batflat-CMS-1.3.6-Remote-Code-Execution.html
|
|
CVE-2020-35737 - http://packetstormsecurity.com/files/160826/Newgen-Correspondence-Management-System-eGov-12.0-Insecure-Direct-Object-Reference.html
|
|
CVE-2020-35737 - https://www.exploit-db.com/exploits/49378
|
|
CVE-2020-35738 - https://github.com/dbry/WavPack/issues/91
|
|
CVE-2020-35745 - https://medium.com/@ashketchum/privilege-escalation-unauthenticated-access-to-admin-portal-cve-2020-35745-bb5d5dca97a0
|
|
CVE-2020-35745 - https://www.youtube.com/watch?v=vnSsg6iwV9Y&feature=youtu.be&ab_channel=ashketchum
|
|
CVE-2020-35749 - http://packetstormsecurity.com/files/161050/Simple-JobBoard-Authenticated-File-Read.html
|
|
CVE-2020-35749 - http://packetstormsecurity.com/files/165892/WordPress-Simple-Job-Board-2.9.3-Local-File-Inclusion.html
|
|
CVE-2020-35752 - https://www.exploit-db.com/exploits/49358
|
|
CVE-2020-35754 - http://packetstormsecurity.com/files/161189/Quick.CMS-6.7-Remote-Code-Execution.html
|
|
CVE-2020-35759 - https://github.com/alexlang24/bloofoxCMS/issues/10
|
|
CVE-2020-35760 - https://github.com/alexlang24/bloofoxCMS/issues/9
|
|
CVE-2020-35761 - https://github.com/alexlang24/bloofoxCMS/issues/8
|
|
CVE-2020-35762 - https://github.com/alexlang24/bloofoxCMS/issues/11
|
|
CVE-2020-35765 - https://www.manageengine.com
|
|
CVE-2020-35775 - http://packetstormsecurity.com/files/162181/CITSmart-ITSM-9.1.2.22-LDAP-Injection.html
|
|
CVE-2020-35775 - https://rdstation-static.s3.amazonaws.com/cms/files/86153/1597862259Ebook-Whatsnew-CITSmart.pdf
|
|
CVE-2020-35776 - http://packetstormsecurity.com/files/161470/Asterisk-Project-Security-Advisory-AST-2021-001.html
|
|
CVE-2020-35776 - https://issues.asterisk.org/
|
|
CVE-2020-35778 - https://kb.netgear.com/000062721/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Smart-Managed-Pro-Switches-PSV-2020-0368
|
|
CVE-2020-35779 - https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0500
|
|
CVE-2020-35781 - https://kb.netgear.com/000062687/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0561
|
|
CVE-2020-35782 - https://kb.netgear.com/000062636/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Smart-Managed-Plus-Switches-PSV-2020-0378
|
|
CVE-2020-35782 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/
|
|
CVE-2020-35783 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/
|
|
CVE-2020-35786 - https://kb.netgear.com/000062718/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-R7800-PSV-2020-0218
|
|
CVE-2020-35789 - https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559
|
|
CVE-2020-35791 - https://kb.netgear.com/000062714/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0079
|
|
CVE-2020-35793 - https://kb.netgear.com/000062725/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0185
|
|
CVE-2020-35801 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/
|
|
CVE-2020-35809 - https://kb.netgear.com/000062674/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-PSV-2018-0510
|
|
CVE-2020-35810 - https://kb.netgear.com/000062645/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-System-PSV-2018-0491
|
|
CVE-2020-35817 - https://kb.netgear.com/000062668/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0493
|
|
CVE-2020-35819 - https://kb.netgear.com/000062648/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0495
|
|
CVE-2020-35825 - https://kb.netgear.com/000062642/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0502
|
|
CVE-2020-35826 - https://kb.netgear.com/000062647/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0503
|
|
CVE-2020-35830 - https://kb.netgear.com/000062672/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0507
|
|
CVE-2020-35831 - https://kb.netgear.com/000062679/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0508
|
|
CVE-2020-35837 - https://kb.netgear.com/000062650/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-PSV-2018-0499
|
|
CVE-2020-35846 - http://packetstormsecurity.com/files/162282/Cockpit-CMS-0.11.1-NoSQL-Injection-Remote-Command-Execution.html
|
|
CVE-2020-35847 - http://packetstormsecurity.com/files/162282/Cockpit-CMS-0.11.1-NoSQL-Injection-Remote-Command-Execution.html
|
|
CVE-2020-35847 - http://packetstormsecurity.com/files/163762/Cockpit-CMS-0.11.1-NoSQL-Injection.html
|
|
CVE-2020-35848 - http://packetstormsecurity.com/files/163762/Cockpit-CMS-0.11.1-NoSQL-Injection.html
|
|
CVE-2020-35849 - https://mantisbt.org/bugs/view.php?id=27370
|
|
CVE-2020-35850 - https://github.com/cockpit-project/cockpit/issues/15077
|
|
CVE-2020-35850 - https://github.com/passtheticket/vulnerability-research/blob/main/cockpitProject/README.md
|
|
CVE-2020-35852 - https://github.com/riteshgohil/My_CVE/blob/main/CVE-2020-35852.md
|
|
CVE-2020-35853 - https://www.exploit-db.com/exploits/49339
|
|
CVE-2020-35854 - https://riteshgohil-25.medium.com/textpattern-4-8-4-is-affected-by-cross-site-scripting-xss-in-the-body-parameter-b9a3d7da2a88
|
|
CVE-2020-35930 - https://github.com/seopanel/Seo-Panel/issues/201
|
|
CVE-2020-35944 - https://wpscan.com/vulnerability/10240
|
|
CVE-2020-35944 - https://www.wordfence.com/blog/2020/05/high-severity-vulnerabilities-in-pagelayer-plugin-affect-over-200000-wordpress-sites/
|
|
CVE-2020-35945 - https://wpscan.com/vulnerability/10342
|
|
CVE-2020-35945 - https://www.wordfence.com/blog/2020/08/critical-vulnerability-exposes-over-700000-sites-using-divi-extra-and-divi-builder/
|
|
CVE-2020-35946 - https://wpscan.com/vulnerability/10320
|
|
CVE-2020-35946 - https://www.wordfence.com/blog/2020/07/2-million-users-affected-by-vulnerability-in-all-in-one-seo-pack/
|
|
CVE-2020-35947 - https://wpscan.com/vulnerability/10239
|
|
CVE-2020-35947 - https://www.wordfence.com/blog/2020/05/high-severity-vulnerabilities-in-pagelayer-plugin-affect-over-200000-wordpress-sites/
|
|
CVE-2020-35948 - http://packetstormsecurity.com/files/163336/WordPress-XCloner-4.2.12-Remote-Code-Execution.html
|
|
CVE-2020-35948 - https://wpscan.com/vulnerability/10412
|
|
CVE-2020-35949 - https://wpscan.com/vulnerability/10349
|
|
CVE-2020-35949 - https://www.wordfence.com/blog/2020/08/critical-vulnerabilities-patched-in-quiz-and-survey-master-plugin/
|
|
CVE-2020-35950 - https://wpscan.com/vulnerability/10413
|
|
CVE-2020-35951 - https://wpscan.com/vulnerability/10348
|
|
CVE-2020-35951 - https://www.wordfence.com/blog/2020/08/critical-vulnerabilities-patched-in-quiz-and-survey-master-plugin/
|
|
CVE-2020-35962 - https://blocksecteam.medium.com/loopring-lrc-protocol-incident-66e9470bd51f
|
|
CVE-2020-35972 - https://github.com/yzmcms/yzmcms/issues/55
|
|
CVE-2020-35973 - https://github.com/BLL-l/vulnerability_wiki/blob/main/zzcms/user_manage_xss.md
|
|
CVE-2020-35979 - https://github.com/gpac/gpac/issues/1662
|
|
CVE-2020-35980 - https://github.com/gpac/gpac/issues/1661
|
|
CVE-2020-35981 - https://github.com/gpac/gpac/issues/1659
|
|
CVE-2020-35982 - https://github.com/gpac/gpac/issues/1660
|
|
CVE-2020-36002 - https://github.com/BigTiger2020/Seat-Reservation-System
|
|
CVE-2020-36002 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/seat-reservation-system-using-php_0.zip
|
|
CVE-2020-36009 - https://github.com/SomeBottle/OBottle/issues/6
|
|
CVE-2020-36011 - https://www.exploit-db.com/exploits/49290
|
|
CVE-2020-36012 - https://kislay00.medium.com/m-store-multi-store-inventory-management-system-add-customer-stored-xss-875a376770ec
|
|
CVE-2020-36023 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1013
|
|
CVE-2020-36024 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1016
|
|
CVE-2020-36037 - https://github.com/wuzhicms/wuzhicms/issues/192
|
|
CVE-2020-36048 - https://blog.caller.xyz/socketio-engineio-dos/
|
|
CVE-2020-36049 - https://blog.caller.xyz/socketio-engineio-dos/
|
|
CVE-2020-36056 - https://www.linkedin.com/in/vivek-panday-796768149
|
|
CVE-2020-36062 - https://github.com/VivekPanday12/CVE-/issues/3
|
|
CVE-2020-36062 - https://phpgurukul.com
|
|
CVE-2020-36064 - https://github.com/VivekPanday12/CVE-/issues/2
|
|
CVE-2020-36065 - https://github.com/sunkaifei/FlyCms/issues/8
|
|
CVE-2020-36066 - https://github.com/tidwall/gjson/issues/195
|
|
CVE-2020-36079 - http://packetstormsecurity.com/files/161569/Zenphoto-CMS-1.5.7-Shell-Upload.html
|
|
CVE-2020-3610 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin
|
|
CVE-2020-3611 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-36112 - https://www.exploit-db.com/exploits/49314
|
|
CVE-2020-36115 - https://www.exploit-db.com/exploits/49484
|
|
CVE-2020-36120 - https://github.com/saitoha/libsixel/issues/143
|
|
CVE-2020-36123 - https://github.com/saitoha/libsixel/issues/144
|
|
CVE-2020-3613 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin
|
|
CVE-2020-36139 - https://muteb.io/2020/12/29/BloofoxCMS-Multiple-Vulnerabilities.html
|
|
CVE-2020-3614 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin
|
|
CVE-2020-36140 - https://muteb.io/2020/12/29/BloofoxCMS-Multiple-Vulnerabilities.html
|
|
CVE-2020-36141 - https://muteb.io/2020/12/29/BloofoxCMS-Multiple-Vulnerabilities.html
|
|
CVE-2020-36142 - https://muteb.io/2020/12/29/BloofoxCMS-Multiple-Vulnerabilities.html
|
|
CVE-2020-3615 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin
|
|
CVE-2020-36154 - https://www.exploit-db.com/exploits/49143
|
|
CVE-2020-36155 - https://wpscan.com/vulnerability/cf13b0f8-5815-4d27-a276-5eff8985fc0b
|
|
CVE-2020-36156 - https://wpscan.com/vulnerability/dd4c4ece-7206-4788-8747-f0c0f3ab0a53
|
|
CVE-2020-36157 - https://wpscan.com/vulnerability/33f059c5-58e5-44b9-bb27-793c3cedef3b
|
|
CVE-2020-3616 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin
|
|
CVE-2020-3617 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin
|
|
CVE-2020-36179 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-36179 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-36179 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-36179 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-36179 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-36179 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-36179 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-3618 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin
|
|
CVE-2020-36180 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-36180 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-36180 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-36180 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-36180 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-36180 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-36180 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-36181 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-36181 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-36181 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-36181 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-36181 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-36181 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-36181 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-36182 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-36182 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-36182 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-36182 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-36182 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-36182 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-36182 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-36183 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-36183 - https://github.com/FasterXML/jackson-databind/issues/3003
|
|
CVE-2020-36183 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-36183 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-36183 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-36183 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-36183 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-36183 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-36184 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-36184 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-36184 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-36184 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-36184 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-36184 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-36184 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-36185 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-36185 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-36185 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-36185 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-36185 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-36185 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-36185 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-36186 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-36186 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-36186 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-36186 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-36186 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-36186 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-36186 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-36187 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-36187 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-36187 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-36187 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-36187 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-36187 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-36187 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-36188 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-36188 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-36188 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-36188 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-36188 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-36188 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-36188 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-36189 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-36189 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-36189 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-36189 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-36189 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-36189 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-36189 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-3619 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-36197 - http://packetstormsecurity.com/files/162849/QNAP-MusicStation-MalwareRemover-File-Upload-Command-Injection.html
|
|
CVE-2020-36198 - http://packetstormsecurity.com/files/162849/QNAP-MusicStation-MalwareRemover-File-Upload-Command-Injection.html
|
|
CVE-2020-3620 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-3621 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-3622 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-36221 - http://seclists.org/fulldisclosure/2021/May/64
|
|
CVE-2020-36221 - http://seclists.org/fulldisclosure/2021/May/65
|
|
CVE-2020-36222 - http://seclists.org/fulldisclosure/2021/May/64
|
|
CVE-2020-36222 - http://seclists.org/fulldisclosure/2021/May/65
|
|
CVE-2020-36223 - http://seclists.org/fulldisclosure/2021/May/64
|
|
CVE-2020-36223 - http://seclists.org/fulldisclosure/2021/May/65
|
|
CVE-2020-36224 - http://seclists.org/fulldisclosure/2021/May/64
|
|
CVE-2020-36224 - http://seclists.org/fulldisclosure/2021/May/65
|
|
CVE-2020-36225 - http://seclists.org/fulldisclosure/2021/May/64
|
|
CVE-2020-36225 - http://seclists.org/fulldisclosure/2021/May/65
|
|
CVE-2020-36226 - http://seclists.org/fulldisclosure/2021/May/64
|
|
CVE-2020-36226 - http://seclists.org/fulldisclosure/2021/May/65
|
|
CVE-2020-36227 - http://seclists.org/fulldisclosure/2021/May/64
|
|
CVE-2020-36227 - http://seclists.org/fulldisclosure/2021/May/65
|
|
CVE-2020-36228 - http://seclists.org/fulldisclosure/2021/May/64
|
|
CVE-2020-36228 - http://seclists.org/fulldisclosure/2021/May/65
|
|
CVE-2020-36229 - http://seclists.org/fulldisclosure/2021/May/64
|
|
CVE-2020-36229 - http://seclists.org/fulldisclosure/2021/May/65
|
|
CVE-2020-3623 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin
|
|
CVE-2020-36230 - http://seclists.org/fulldisclosure/2021/May/64
|
|
CVE-2020-36230 - http://seclists.org/fulldisclosure/2021/May/65
|
|
CVE-2020-36233 - https://jira.atlassian.com/browse/BSERV-12753
|
|
CVE-2020-3624 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-36241 - https://gitlab.gnome.org/GNOME/gnome-autoar/-/issues/7
|
|
CVE-2020-36242 - https://github.com/pyca/cryptography/blob/master/CHANGELOG.rst
|
|
CVE-2020-36242 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-36242 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-36244 - https://github.com/GENIVI/dlt-daemon/issues/265
|
|
CVE-2020-3625 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin
|
|
CVE-2020-3626 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin
|
|
CVE-2020-3628 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin
|
|
CVE-2020-36280 - https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c
|
|
CVE-2020-36284 - https://www.dropbox.com/s/6smwnbrp0kgsgrc/poc_code.py?dl=0
|
|
CVE-2020-36285 - https://www.dropbox.com/s/6smwnbrp0kgsgrc/poc_code.py?dl=0
|
|
CVE-2020-3629 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-3630 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin
|
|
CVE-2020-36310 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
|
|
CVE-2020-36310 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
|
|
CVE-2020-36311 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9
|
|
CVE-2020-36311 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7be74942f184fdfba34ddd19a0d995deb34d4a03
|
|
CVE-2020-36312 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.10
|
|
CVE-2020-36312 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f65886606c2d3b562716de030706dfe1bea4ed5e
|
|
CVE-2020-36313 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7
|
|
CVE-2020-36313 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0774a964ef561b7170d8d1b1bfe6f88002b6d219
|
|
CVE-2020-36314 - https://gitlab.gnome.org/GNOME/file-roller/-/issues/108
|
|
CVE-2020-36315 - https://github.com/relic-toolkit/relic/
|
|
CVE-2020-36315 - https://github.com/relic-toolkit/relic/issues/154
|
|
CVE-2020-36316 - https://github.com/relic-toolkit/relic/
|
|
CVE-2020-36316 - https://github.com/relic-toolkit/relic/issues/155
|
|
CVE-2020-3632 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-36322 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.6
|
|
CVE-2020-36322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454
|
|
CVE-2020-3633 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin
|
|
CVE-2020-36333 - https://www.openwall.com/lists/oss-security/2020/02/19/1
|
|
CVE-2020-36334 - https://www.openwall.com/lists/oss-security/2020/02/19/1
|
|
CVE-2020-3634 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin
|
|
CVE-2020-3635 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin
|
|
CVE-2020-3636 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-36367 - https://github.com/cesanta/mjs/issues/135
|
|
CVE-2020-36368 - https://github.com/cesanta/mjs/issues/135
|
|
CVE-2020-36369 - https://github.com/cesanta/mjs/issues/135
|
|
CVE-2020-36370 - https://github.com/cesanta/mjs/issues/136
|
|
CVE-2020-36371 - https://github.com/cesanta/mjs/issues/136
|
|
CVE-2020-36372 - https://github.com/cesanta/mjs/issues/136
|
|
CVE-2020-36373 - https://github.com/cesanta/mjs/issues/136
|
|
CVE-2020-36374 - https://github.com/cesanta/mjs/issues/136
|
|
CVE-2020-36375 - https://github.com/cesanta/mjs/issues/136
|
|
CVE-2020-36376 - https://github.com/shenzhim/aaptjs/issues/2
|
|
CVE-2020-36377 - https://github.com/shenzhim/aaptjs/issues/2
|
|
CVE-2020-36378 - https://github.com/shenzhim/aaptjs/issues/2
|
|
CVE-2020-36379 - https://github.com/shenzhim/aaptjs/issues/2
|
|
CVE-2020-3638 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-36380 - https://github.com/shenzhim/aaptjs/issues/2
|
|
CVE-2020-36381 - https://github.com/shenzhim/aaptjs/issues/2
|
|
CVE-2020-36385 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10
|
|
CVE-2020-36385 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1
|
|
CVE-2020-36386 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.1
|
|
CVE-2020-36386 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101
|
|
CVE-2020-36387 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.2
|
|
CVE-2020-36387 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d816e088c359866f9867057e04f244c608c42fe
|
|
CVE-2020-3639 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
|
|
CVE-2020-3640 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-3641 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin
|
|
CVE-2020-3642 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin
|
|
CVE-2020-36420 - https://www.openwall.com/lists/oss-security/2020/11/18/1
|
|
CVE-2020-3643 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-3644 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-3645 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin
|
|
CVE-2020-3646 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-36461 - https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/noise_search/RUSTSEC-2020-0141.md
|
|
CVE-2020-36461 - https://rustsec.org/advisories/RUSTSEC-2020-0141.html
|
|
CVE-2020-36462 - https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/syncpool/RUSTSEC-2020-0142.md
|
|
CVE-2020-36462 - https://rustsec.org/advisories/RUSTSEC-2020-0142.html
|
|
CVE-2020-36464 - https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/heapless/RUSTSEC-2020-0145.md
|
|
CVE-2020-36464 - https://rustsec.org/advisories/RUSTSEC-2020-0145.html
|
|
CVE-2020-3647 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-36473 - https://medium.com/@ciph3r/why-you-should-not-use-uc-browser-54558916d020
|
|
CVE-2020-3648 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-36485 - https://www.vulnerability-lab.com/get_content.php?id=2198
|
|
CVE-2020-36486 - https://www.vulnerability-lab.com/get_content.php?id=2205
|
|
CVE-2020-36488 - https://www.vulnerability-lab.com/get_content.php?id=2207
|
|
CVE-2020-36489 - https://www.vulnerability-lab.com/get_content.php?id=2204
|
|
CVE-2020-36490 - https://www.vulnerability-lab.com/get_content.php?id=2195
|
|
CVE-2020-36491 - https://www.vulnerability-lab.com/get_content.php?id=2195
|
|
CVE-2020-36492 - https://www.vulnerability-lab.com/get_content.php?id=2195
|
|
CVE-2020-36493 - https://www.vulnerability-lab.com/get_content.php?id=2195
|
|
CVE-2020-36494 - https://www.vulnerability-lab.com/get_content.php?id=2194
|
|
CVE-2020-36495 - https://www.vulnerability-lab.com/get_content.php?id=2194
|
|
CVE-2020-36496 - https://www.vulnerability-lab.com/get_content.php?id=2194
|
|
CVE-2020-36497 - https://www.vulnerability-lab.com/get_content.php?id=2194
|
|
CVE-2020-36498 - https://www.vulnerability-lab.com/get_content.php?id=2206
|
|
CVE-2020-36499 - https://www.vulnerability-lab.com/get_content.php?id=2215
|
|
CVE-2020-36501 - https://www.vulnerability-lab.com/get_content.php?id=2249
|
|
CVE-2020-36502 - https://www.vulnerability-lab.com/get_content.php?id=2205
|
|
CVE-2020-36503 - https://wpscan.com/vulnerability/dd394b55-c86f-4fa2-aae8-5903ca0b95ec
|
|
CVE-2020-36504 - https://medium.com/@hoanhp/0-days-story-1-wp-pro-quiz-2115dd77a6d4
|
|
CVE-2020-36504 - https://wpscan.com/vulnerability/83679b90-faa5-454e-924c-89f388eccbd1
|
|
CVE-2020-36505 - https://medium.com/@hoanhp/0-day-story-2-delete-all-comments-easily-a854e52a7d50
|
|
CVE-2020-36505 - https://wpscan.com/vulnerability/239f8efa-8fa4-4274-904f-708e65083821
|
|
CVE-2020-3651 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin
|
|
CVE-2020-36510 - https://wpscan.com/vulnerability/d1dbc6d7-7488-40c2-bc38-0674ea5b3c95
|
|
CVE-2020-36518 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-36518 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-36519 - https://wesleyk.me/2020/01/10/my-first-vulnerability-mimecast-sender-address-verification/
|
|
CVE-2020-3652 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin
|
|
CVE-2020-36523 - https://seclists.org/fulldisclosure/2020/Oct/15
|
|
CVE-2020-36523 - https://vuldb.com/?id.164509
|
|
CVE-2020-36524 - https://seclists.org/fulldisclosure/2020/Oct/15
|
|
CVE-2020-36524 - https://vuldb.com/?id.164510
|
|
CVE-2020-36525 - https://seclists.org/fulldisclosure/2020/Oct/15
|
|
CVE-2020-36525 - https://vuldb.com/?id.164511
|
|
CVE-2020-36526 - https://seclists.org/fulldisclosure/2020/Oct/15
|
|
CVE-2020-36526 - https://vuldb.com/?id.164512
|
|
CVE-2020-36527 - https://seclists.org/fulldisclosure/2020/Oct/15
|
|
CVE-2020-36527 - https://vuldb.com/?id.164513
|
|
CVE-2020-36528 - http://seclists.org/fulldisclosure/2020/Oct/4
|
|
CVE-2020-36528 - https://vuldb.com/?id.162264
|
|
CVE-2020-36529 - http://seclists.org/fulldisclosure/2020/Oct/5
|
|
CVE-2020-36529 - https://vuldb.com/?id.162261
|
|
CVE-2020-3653 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin
|
|
CVE-2020-36530 - http://seclists.org/fulldisclosure/2020/Oct/5
|
|
CVE-2020-36530 - https://vuldb.com/?id.162262
|
|
CVE-2020-36531 - http://seclists.org/fulldisclosure/2020/Oct/5
|
|
CVE-2020-36531 - https://vuldb.com/?id.162263
|
|
CVE-2020-36534 - https://vuldb.com/?id.160278
|
|
CVE-2020-36536 - https://vuldb.com/?id.159956
|
|
CVE-2020-3654 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-36540 - https://vuldb.com/?id.159438
|
|
CVE-2020-36541 - https://alquimistadesistemas.com/sql-injection-y-archivo-peligroso-en-demokratian
|
|
CVE-2020-36541 - https://vuldb.com/?id.159434
|
|
CVE-2020-36542 - https://alquimistadesistemas.com/sql-injection-y-archivo-peligroso-en-demokratian
|
|
CVE-2020-36542 - https://vuldb.com/?id.159435
|
|
CVE-2020-36543 - https://vuldb.com/?id.159429
|
|
CVE-2020-36544 - https://vuldb.com/?id.159430
|
|
CVE-2020-36547 - https://vuldb.com/?id.129833
|
|
CVE-2020-36550 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0
|
|
CVE-2020-36550 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2020-36550 - https://www.exploit-db.com/exploits/49135
|
|
CVE-2020-36551 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0
|
|
CVE-2020-36551 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2020-36551 - https://www.exploit-db.com/exploits/49135
|
|
CVE-2020-36552 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0
|
|
CVE-2020-36552 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2020-36552 - https://www.exploit-db.com/exploits/49135
|
|
CVE-2020-36553 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0
|
|
CVE-2020-36553 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2020-36553 - https://www.exploit-db.com/exploits/49135
|
|
CVE-2020-36557 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.2
|
|
CVE-2020-36557 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca4463bf8438b403596edd0ec961ca0d4fbe0220
|
|
CVE-2020-36558 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd1ed50efd88261298577cd92a14f2768eddeeb
|
|
CVE-2020-3656 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin
|
|
CVE-2020-36560 - https://github.com/artdarek/go-unzip/pull/2
|
|
CVE-2020-36561 - https://github.com/yi-ge/unzip/pull/1
|
|
CVE-2020-36564 - https://github.com/justinas/nosurf/pull/60
|
|
CVE-2020-36565 - https://github.com/labstack/echo/pull/1718
|
|
CVE-2020-3657 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-3658 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin
|
|
CVE-2020-3660 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin
|
|
CVE-2020-36603 - https://github.com/kkent030315/evil-mhyprot-cli
|
|
CVE-2020-36603 - https://web.archive.org/web/20211204031301/https://www.godeye.club/2021/05/20/001-disclosure-mhyprot.html
|
|
CVE-2020-36603 - https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html
|
|
CVE-2020-36603 - https://www.vice.com/en/article/y3p35w/hackers-are-using-anti-cheat-in-genshin-impact-to-ransom-victims
|
|
CVE-2020-36604 - https://github.com/hapijs/hoek/issues/352
|
|
CVE-2020-36607 - https://github.com/liufee/cms/issues/45
|
|
CVE-2020-36609 - https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG
|
|
CVE-2020-36609 - https://vuldb.com/?id.215115
|
|
CVE-2020-3661 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin
|
|
CVE-2020-36610 - https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG
|
|
CVE-2020-36610 - https://vuldb.com/?id.215116
|
|
CVE-2020-3662 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin
|
|
CVE-2020-36629 - https://github.com/SimbCo/httpster/pull/36
|
|
CVE-2020-3663 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin
|
|
CVE-2020-3664 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
|
|
CVE-2020-36642 - https://github.com/trampgeek/jobe/issues/39
|
|
CVE-2020-3665 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin
|
|
CVE-2020-36651 - https://github.com/youngerheart/nodeserver/pull/6
|
|
CVE-2020-36656 - https://wpscan.com/vulnerability/10f7e892-7a91-4292-b03e-6ad75756488b
|
|
CVE-2020-3666 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-36666 - https://wpscan.com/vulnerability/d079cb16-ead5-4bc8-b0b8-4a4dc2a54c96
|
|
CVE-2020-3667 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-3668 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-3669 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-36691 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
|
|
CVE-2020-36694 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10
|
|
CVE-2020-36694 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12
|
|
CVE-2020-36696 - https://wpscan.com/vulnerability/15f345e6-fc53-4bac-bc5a-de898181ea74
|
|
CVE-2020-3670 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-3671 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin
|
|
CVE-2020-36718 - https://wpscan.com/vulnerability/92f1d6fb-c665-419e-a13b-688b1df6c395
|
|
CVE-2020-3673 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-3674 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin
|
|
CVE-2020-3675 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-3676 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin
|
|
CVE-2020-36763 - https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG
|
|
CVE-2020-36766 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.6
|
|
CVE-2020-36771 - http://packetstormsecurity.com/files/176790/CloudLinux-CageFS-7.1.1-1-Token-Disclosure.html
|
|
CVE-2020-36771 - http://seclists.org/fulldisclosure/2024/Jan/24
|
|
CVE-2020-36771 - https://github.com/sbaresearch/advisories/tree/public/2020/SBA-ADV-20200707-01_CloudLinux_CageFS_Token_Disclosure
|
|
CVE-2020-36772 - http://packetstormsecurity.com/files/176791/CloudLinux-CageFS-7.0.8-2-Insufficiently-Restricted-Proxy-Command.html
|
|
CVE-2020-36772 - http://seclists.org/fulldisclosure/2024/Jan/25
|
|
CVE-2020-36772 - https://github.com/sbaresearch/advisories/tree/public/2020/SBA-ADV-20200707-02_CloudLinux_CageFS_Insufficiently_Restricted_Proxy_Commands
|
|
CVE-2020-3678 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-3679 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin
|
|
CVE-2020-3680 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin
|
|
CVE-2020-3681 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin
|
|
CVE-2020-3684 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-3685 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-3686 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-3687 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-3688 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin
|
|
CVE-2020-3690 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-3691 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
|
|
CVE-2020-3692 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-3693 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-3694 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-3696 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-3698 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin
|
|
CVE-2020-3699 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin
|
|
CVE-2020-3700 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin
|
|
CVE-2020-3701 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin
|
|
CVE-2020-3702 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
|
CVE-2020-3703 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-3704 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
|
|
CVE-2020-3811 - https://www.openwall.com/lists/oss-security/2020/05/19/8
|
|
CVE-2020-3812 - https://www.openwall.com/lists/oss-security/2020/05/19/8
|
|
CVE-2020-3843 - http://packetstormsecurity.com/files/162119/iOS-macOS-Radio-Proximity-Kernel-Memory-Corruption.html
|
|
CVE-2020-3909 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-3931 - https://www.acronis.com/en-us/blog/posts/backdoor-wide-open-critical-vulnerabilities-uncovered-geovision
|
|
CVE-2020-3950 - http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html
|
|
CVE-2020-3950 - http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html
|
|
CVE-2020-3952 - http://packetstormsecurity.com/files/157896/VMware-vCenter-Server-6.7-Authentication-Bypass.html
|
|
CVE-2020-3956 - http://packetstormsecurity.com/files/157909/vCloud-Director-9.7.0.15498291-Remote-Code-Execution.html
|
|
CVE-2020-3956 - https://citadelo.com/en/blog/full-infrastructure-takeover-of-vmware-cloud-director-CVE-2020-3956/
|
|
CVE-2020-3956 - https://github.com/aaronsvk/CVE-2020-3956
|
|
CVE-2020-3957 - https://www.vmware.com/security/advisories/VMSA-2020-0011.html
|
|
CVE-2020-3958 - https://www.vmware.com/security/advisories/VMSA-2020-0011.html
|
|
CVE-2020-3959 - https://www.vmware.com/security/advisories/VMSA-2020-0011.html
|
|
CVE-2020-3963 - http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html
|
|
CVE-2020-3964 - http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html
|
|
CVE-2020-3965 - http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html
|
|
CVE-2020-3976 - https://www.vmware.com/security/advisories/VMSA-2020-0018.html
|
|
CVE-2020-3984 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html
|
|
CVE-2020-3985 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html
|
|
CVE-2020-4000 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html
|
|
CVE-2020-4001 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html
|
|
CVE-2020-4002 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html
|
|
CVE-2020-4003 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html
|
|
CVE-2020-4016 - https://jira.atlassian.com/browse/FE-7285
|
|
CVE-2020-4030 - https://usn.ubuntu.com/4481-1/
|
|
CVE-2020-4031 - https://usn.ubuntu.com/4481-1/
|
|
CVE-2020-4032 - https://usn.ubuntu.com/4481-1/
|
|
CVE-2020-4033 - https://usn.ubuntu.com/4481-1/
|
|
CVE-2020-4040 - http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html
|
|
CVE-2020-4041 - http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html
|
|
CVE-2020-4044 - https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c
|
|
CVE-2020-4051 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-4206 - https://www.ibm.com/support/pages/node/6114130
|
|
CVE-2020-4208 - https://www.ibm.com/support/pages/node/6114130
|
|
CVE-2020-4214 - https://www.ibm.com/support/pages/node/6114130
|
|
CVE-2020-4241 - https://www.ibm.com/support/pages/node/6114130
|
|
CVE-2020-4242 - https://www.ibm.com/support/pages/node/6114130
|
|
CVE-2020-4269 - http://packetstormsecurity.com/files/157328/QRadar-Community-Edition-7.3.1.6-Default-Credentials.html
|
|
CVE-2020-4270 - http://packetstormsecurity.com/files/157335/QRadar-Community-Edition-7.3.1.6-Insecure-File-Permissions.html
|
|
CVE-2020-4271 - http://packetstormsecurity.com/files/157336/QRadar-Community-Edition-7.3.1.6-PHP-Object-Injection.html
|
|
CVE-2020-4272 - http://packetstormsecurity.com/files/157337/QRadar-Community-Edition-7.3.1.6-Arbitrary-Object-Instantiation.html
|
|
CVE-2020-4274 - http://packetstormsecurity.com/files/157338/QRadar-Community-Edition-7.3.1.6-Authorization-Bypass.html
|
|
CVE-2020-4280 - http://packetstormsecurity.com/files/159589/QRadar-RemoteJavaScript-Deserialization.html
|
|
CVE-2020-4280 - http://seclists.org/fulldisclosure/2020/Oct/18
|
|
CVE-2020-4294 - http://packetstormsecurity.com/files/157329/QRadar-Community-Edition-7.3.1.6-Server-Side-Request-Forgery.html
|
|
CVE-2020-4300 - https://www.ibm.com/support/pages/node/6451705
|
|
CVE-2020-4315 - https://www.ibm.com/support/pages/node/6334813
|
|
CVE-2020-4354 - https://www.ibm.com/support/pages/node/6451705
|
|
CVE-2020-4379 - https://www.ibm.com/support/pages/node/6214483
|
|
CVE-2020-4432 - https://www.ibm.com/support/pages/node/6221324
|
|
CVE-2020-4433 - https://www.ibm.com/support/pages/node/6221324
|
|
CVE-2020-4434 - https://www.ibm.com/support/pages/node/6221324
|
|
CVE-2020-4435 - https://www.ibm.com/support/pages/node/6221324
|
|
CVE-2020-4436 - https://www.ibm.com/support/pages/node/6221324
|
|
CVE-2020-4469 - https://www.tenable.com/security/research/tra-2020-37
|
|
CVE-2020-4470 - https://www.tenable.com/security/research/tra-2020-37
|
|
CVE-2020-4471 - https://www.tenable.com/security/research/tra-2020-37
|
|
CVE-2020-4510 - https://www.ibm.com/support/pages/node/6246133
|
|
CVE-2020-4516 - https://www.ibm.com/support/pages/node/6326901
|
|
CVE-2020-4520 - https://www.ibm.com/support/pages/node/6451705
|
|
CVE-2020-4559 - https://www.ibm.com/support/pages/node/6323757
|
|
CVE-2020-4561 - https://www.ibm.com/support/pages/node/6451705
|
|
CVE-2020-4567 - https://www.ibm.com/support/pages/node/6253781
|
|
CVE-2020-4569 - https://www.ibm.com/support/pages/node/6253781
|
|
CVE-2020-4572 - https://www.ibm.com/support/pages/node/6253781
|
|
CVE-2020-4573 - https://www.ibm.com/support/pages/node/6253781
|
|
CVE-2020-4574 - https://www.ibm.com/support/pages/node/6253781
|
|
CVE-2020-4576 - https://www.ibm.com/support/pages/node/6339807
|
|
CVE-2020-4757 - https://www.gosecure.net/blog/2022/06/21/xss-vulnerability-in-ibm-content-navigator-cve-2020-4757/
|
|
CVE-2020-4766 - https://www.ibm.com/support/pages/node/6406254
|
|
CVE-2020-4782 - https://www.ibm.com/support/pages/node/6356083
|
|
CVE-2020-4788 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-4845 - https://www.ibm.com/support/pages/node/6253781
|
|
CVE-2020-4846 - https://www.ibm.com/support/pages/node/6253781
|
|
CVE-2020-4854 - https://www.tenable.com/security/research/tra-2020-66
|
|
CVE-2020-4856 - https://www.ibm.com/support/pages/node/6417585
|
|
CVE-2020-4857 - https://www.ibm.com/support/pages/node/6417585
|
|
CVE-2020-4863 - https://www.ibm.com/support/pages/node/6417585
|
|
CVE-2020-4866 - https://www.ibm.com/support/pages/node/6417585
|
|
CVE-2020-4949 - https://www.ibm.com/support/pages/node/6408244
|
|
CVE-2020-4975 - https://www.ibm.com/support/pages/node/6417585
|
|
CVE-2020-5024 - https://www.ibm.com/support/pages/node/6427861
|
|
CVE-2020-5147 - http://packetstormsecurity.com/files/163857/SonicWall-NetExtender-10.2.0.300-Unquoted-Service-Path.html
|
|
CVE-2020-5183 - http://packetstormsecurity.com/files/155832/FTPGetter-Professional-5.97.0.223-Denial-Of-Service.html
|
|
CVE-2020-5183 - https://www.exploit-db.com/exploits/47871
|
|
CVE-2020-5186 - https://medium.com/@SajjadPourali/dnn-dotnetnuke-cms-not-as-secure-as-you-think-e8516f789175
|
|
CVE-2020-5186 - https://packetstormsecurity.com/files/156483/DotNetNuke-CMS-9.5.0-Cross-Site-Scripting.html
|
|
CVE-2020-5187 - http://packetstormsecurity.com/files/156489/DotNetNuke-CMS-9.4.4-Zip-Directory-Traversal.html
|
|
CVE-2020-5187 - https://medium.com/@SajjadPourali/dnn-dotnetnuke-cms-not-as-secure-as-you-think-e8516f789175
|
|
CVE-2020-5188 - http://packetstormsecurity.com/files/156484/DotNetNuke-CMS-9.5.0-File-Extension-Check-Bypass.html
|
|
CVE-2020-5188 - https://medium.com/@SajjadPourali/dnn-dotnetnuke-cms-not-as-secure-as-you-think-e8516f789175
|
|
CVE-2020-5191 - https://www.exploit-db.com/exploits/47841
|
|
CVE-2020-5192 - https://www.exploit-db.com/exploits/47840
|
|
CVE-2020-5193 - http://packetstormsecurity.com/files/155929/Hospital-Management-System-4.0-Cross-Site-Scripting.html
|
|
CVE-2020-5202 - http://www.openwall.com/lists/oss-security/2020/01/20/4
|
|
CVE-2020-5202 - https://seclists.org/oss-sec/2020/q1/21
|
|
CVE-2020-5223 - https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738
|
|
CVE-2020-5237 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt
|
|
CVE-2020-5245 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-5258 - https://github.com/dojo/dojo/security/advisories/GHSA-jxfh-8wgv-vfr2
|
|
CVE-2020-5258 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-5258 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-5258 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-5258 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-5258 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-5260 - http://packetstormsecurity.com/files/157250/Git-Credential-Helper-Protocol-Newline-Injection.html
|
|
CVE-2020-5295 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html
|
|
CVE-2020-5295 - http://seclists.org/fulldisclosure/2020/Aug/2
|
|
CVE-2020-5296 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html
|
|
CVE-2020-5296 - http://seclists.org/fulldisclosure/2020/Aug/2
|
|
CVE-2020-5297 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html
|
|
CVE-2020-5297 - http://seclists.org/fulldisclosure/2020/Aug/2
|
|
CVE-2020-5298 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html
|
|
CVE-2020-5298 - http://seclists.org/fulldisclosure/2020/Aug/2
|
|
CVE-2020-5299 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html
|
|
CVE-2020-5299 - http://seclists.org/fulldisclosure/2020/Aug/2
|
|
CVE-2020-5304 - https://medium.com/@venkatajayaram.yalla/whitesource-log-injection-vulnerability-cve-2020-5304-e543b7943c2b
|
|
CVE-2020-5305 - https://vyshnavvizz.blogspot.com/2020/01/stored-cross-site-scripting-in_2.html
|
|
CVE-2020-5306 - https://vyshnavvizz.blogspot.com/2020/01/stored-cross-site-scripting-in.html
|
|
CVE-2020-5306 - https://www.exploit-db.com/exploits/47886
|
|
CVE-2020-5307 - https://www.exploit-db.com/exploits/47846
|
|
CVE-2020-5308 - http://packetstormsecurity.com/files/155861/Dairy-Farm-Shop-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2020-5330 - http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html
|
|
CVE-2020-5359 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-5360 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-5377 - http://packetstormsecurity.com/files/162110/Dell-OpenManage-Server-Administrator-9.4.0.0-File-Read.html
|
|
CVE-2020-5393 - https://sumukh30.blogspot.com/2020/01/cross-site-scripting-vulnerability-in.html
|
|
CVE-2020-5397 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-5397 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-5397 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-5397 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-5397 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-5397 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-5398 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-5398 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-5398 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-5398 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-5398 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-5398 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-5398 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-5398 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-5407 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-5407 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-5407 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-5408 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-5408 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-5408 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-5413 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-5413 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-5413 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-5413 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-5421 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-5421 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-5421 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-5421 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-5421 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-5421 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-5497 - http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html
|
|
CVE-2020-5499 - https://github.com/wssgcsc58/CVEs/tree/master/baidurustsgxsdk_enclaveid_race
|
|
CVE-2020-5504 - https://cybersecurityworks.com/zerodays/cve-2020-5504-phpmyadmin.html
|
|
CVE-2020-5505 - http://packetstormsecurity.com/files/155922/Freelancy-1.0.0-Remote-Code-Execution.html
|
|
CVE-2020-5509 - http://packetstormsecurity.com/files/155925/Car-Rental-Project-1.0-Remote-Code-Execution.html
|
|
CVE-2020-5510 - https://www.exploit-db.com/exploits/47854
|
|
CVE-2020-5511 - https://www.exploit-db.com/exploits/47874
|
|
CVE-2020-5513 - https://infosecdb.wordpress.com/2020/01/05/gilacms-1-11-8-cm-deletet-lfi-local-file-inclusion-and-rce/
|
|
CVE-2020-5514 - https://infosecdb.wordpress.com/2020/01/05/gilacms-1-11-8-remote-code-execution/
|
|
CVE-2020-5515 - http://packetstormsecurity.com/files/158114/Gila-CMS-1.11.8-SQL-Injection.html
|
|
CVE-2020-5515 - http://packetstormsecurity.com/files/158140/Gila-CMS-1.1.18.1-SQL-Injection-Shell-Upload.html
|
|
CVE-2020-5530 - https://wpvulndb.com/vulnerabilities/10075
|
|
CVE-2020-5665 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-018_en.pdf
|
|
CVE-2020-5720 - https://www.tenable.com/security/research/tra-2020-07
|
|
CVE-2020-5722 - http://packetstormsecurity.com/files/156876/UCM6202-1.0.18.13-Remote-Command-Injection.html
|
|
CVE-2020-5722 - http://packetstormsecurity.com/files/165708/Grandstream-UCM62xx-IP-PBX-sendPasswordEmail-Remote-Code-Execution.html
|
|
CVE-2020-5722 - https://www.tenable.com/security/research/tra-2020-15
|
|
CVE-2020-5723 - https://www.tenable.com/security/research/tra-2020-17
|
|
CVE-2020-5724 - https://www.tenable.com/security/research/tra-2020-17
|
|
CVE-2020-5725 - http://packetstormsecurity.com/files/156976/Grandstream-UCM6200-Series-WebSocket-1.0.20.20-SQL-Injection.html
|
|
CVE-2020-5725 - https://www.tenable.com/security/research/tra-2020-17
|
|
CVE-2020-5726 - http://packetstormsecurity.com/files/156977/Grandstream-UCM6200-Series-CTI-Interface-SQL-Injection.html
|
|
CVE-2020-5726 - https://www.tenable.com/security/research/tra-2020-17
|
|
CVE-2020-5727 - https://www.tenable.com/security/research/tra-2020-29
|
|
CVE-2020-5734 - https://www.tenable.com/security/research/tra-2020-19
|
|
CVE-2020-5735 - http://packetstormsecurity.com/files/157164/Amcrest-Dahua-NVR-Camera-IP2M-841-Denial-Of-Service.html
|
|
CVE-2020-5735 - https://www.tenable.com/security/research/tra-2020-20
|
|
CVE-2020-5736 - https://www.tenable.com/security/research/tra-2020-20
|
|
CVE-2020-5737 - https://www.tenable.com/security/tns-2020-02
|
|
CVE-2020-5738 - https://www.tenable.com/security/research/tra-2020-22
|
|
CVE-2020-5739 - https://www.tenable.com/security/research/tra-2020-22
|
|
CVE-2020-5740 - https://www.tenable.com/security/research/tra-2020-25
|
|
CVE-2020-5741 - http://packetstormsecurity.com/files/158470/Plex-Unpickle-Dict-Windows-Remote-Code-Execution.html
|
|
CVE-2020-5741 - https://www.tenable.com/security/research/tra-2020-32
|
|
CVE-2020-5742 - https://www.tenable.com/security/research/tra-2020-35
|
|
CVE-2020-5743 - https://www.tenable.com/security/research/tra-2020-31
|
|
CVE-2020-5744 - https://www.tenable.com/security/research/tra-2020-31
|
|
CVE-2020-5745 - https://www.tenable.com/security/research/tra-2020-31
|
|
CVE-2020-5746 - https://www.tenable.com/security/research/tra-2020-31
|
|
CVE-2020-5747 - https://www.tenable.com/security/research/tra-2020-31
|
|
CVE-2020-5748 - https://www.tenable.com/security/research/tra-2020-31
|
|
CVE-2020-5749 - https://www.tenable.com/security/research/tra-2020-31
|
|
CVE-2020-5750 - https://www.tenable.com/security/research/tra-2020-31
|
|
CVE-2020-5751 - https://www.tenable.com/security/research/tra-2020-31
|
|
CVE-2020-5752 - http://packetstormsecurity.com/files/157802/Druva-inSync-Windows-Client-6.6.3-Local-Privilege-Escalation.html
|
|
CVE-2020-5752 - http://packetstormsecurity.com/files/160404/Druva-inSync-Windows-Client-6.6.3-Privilege-Escalation.html
|
|
CVE-2020-5752 - https://www.tenable.com/security/research/tra-2020-34
|
|
CVE-2020-5756 - https://www.tenable.com/security/research/tra-2020-41
|
|
CVE-2020-5757 - https://www.tenable.com/security/research/tra-2020-42
|
|
CVE-2020-5758 - https://www.tenable.com/security/research/tra-2020-42
|
|
CVE-2020-5759 - https://www.tenable.com/security/research/tra-2020-42
|
|
CVE-2020-5760 - https://www.tenable.com/security/research/tra-2020-43
|
|
CVE-2020-5760 - https://www.tenable.com/security/research/tra-2020-47
|
|
CVE-2020-5761 - https://www.tenable.com/security/research/tra-2020-43
|
|
CVE-2020-5761 - https://www.tenable.com/security/research/tra-2020-47
|
|
CVE-2020-5762 - https://www.tenable.com/security/research/tra-2020-43
|
|
CVE-2020-5762 - https://www.tenable.com/security/research/tra-2020-47
|
|
CVE-2020-5763 - https://www.tenable.com/security/research/tra-2020-43
|
|
CVE-2020-5763 - https://www.tenable.com/security/research/tra-2020-47
|
|
CVE-2020-5764 - https://www.tenable.com/security/research/tra-2020-41
|
|
CVE-2020-5765 - https://www.tenable.com/security/tns-2020-05
|
|
CVE-2020-5766 - https://www.tenable.com/security/research/tra-2020-42
|
|
CVE-2020-5767 - https://www.tenable.com/security/research/tra-2020-44-0
|
|
CVE-2020-5768 - https://www.tenable.com/security/research/tra-2020-44-0
|
|
CVE-2020-5769 - https://www.tenable.com/security/research/tra-2020-43-0
|
|
CVE-2020-5770 - https://www.tenable.com/security/research/tra-2020-48
|
|
CVE-2020-5771 - https://www.tenable.com/security/research/tra-2020-48
|
|
CVE-2020-5772 - https://www.tenable.com/security/research/tra-2020-48
|
|
CVE-2020-5773 - https://www.tenable.com/security/research/tra-2020-48
|
|
CVE-2020-5774 - https://www.tenable.com/security/tns-2020-06
|
|
CVE-2020-5775 - https://www.tenable.com/security/research/tra-2020-49
|
|
CVE-2020-5776 - https://www.tenable.com/security/research/tra-2020-51
|
|
CVE-2020-5777 - https://www.tenable.com/security/research/tra-2020-51
|
|
CVE-2020-5780 - https://www.tenable.com/security/research/tra-2020-53
|
|
CVE-2020-5781 - https://www.tenable.com/security/research/tra-2020-55
|
|
CVE-2020-5782 - https://www.tenable.com/security/research/tra-2020-55
|
|
CVE-2020-5783 - https://www.tenable.com/security/research/tra-2020-55
|
|
CVE-2020-5784 - https://www.tenable.com/security/research/tra-2020-57
|
|
CVE-2020-5785 - https://www.tenable.com/security/research/tra-2020-57
|
|
CVE-2020-5786 - https://www.tenable.com/security/research/tra-2020-57
|
|
CVE-2020-5787 - https://www.tenable.com/security/research/tra-2020-57
|
|
CVE-2020-5788 - https://www.tenable.com/security/research/tra-2020-57
|
|
CVE-2020-5789 - https://www.tenable.com/security/research/tra-2020-57
|
|
CVE-2020-5790 - https://www.tenable.com/security/research/tra-2020-58
|
|
CVE-2020-5791 - http://packetstormsecurity.com/files/159743/Nagios-XI-5.7.3-Remote-Command-Injection.html
|
|
CVE-2020-5791 - http://packetstormsecurity.com/files/162235/Nagios-XI-5.7.3-Remote-Code-Execution.html
|
|
CVE-2020-5791 - https://www.tenable.com/security/research/tra-2020-58
|
|
CVE-2020-5792 - http://packetstormsecurity.com/files/162284/Nagios-XI-5.7.3-Remote-Code-Execution.html
|
|
CVE-2020-5792 - https://www.tenable.com/security/research/tra-2020-58
|
|
CVE-2020-5793 - https://www.tenable.com/security/tns-2020-07
|
|
CVE-2020-5793 - https://www.tenable.com/security/tns-2020-08
|
|
CVE-2020-5794 - https://www.tenable.com/security/tns-2020-09
|
|
CVE-2020-5795 - https://www.tenable.com/security/research/tra-2020-60
|
|
CVE-2020-5796 - https://www.tenable.com/security/research/tra-2020-61
|
|
CVE-2020-5797 - https://www.tenable.com/security/research/tra-2020-60
|
|
CVE-2020-5798 - https://www.tenable.com/security/research/tra-2020-67
|
|
CVE-2020-5798 - https://www.tenable.com/security/research/tra-2020-67,https://docs.druva.com/001_inSync_Cloud/Cloud/010_Release_Details/010_inSync_Cloud_Updates
|
|
CVE-2020-5801 - https://www.tenable.com/security/research/tra-2020-71
|
|
CVE-2020-5802 - https://www.tenable.com/security/research/tra-2020-71
|
|
CVE-2020-5803 - https://www.tenable.com/security/research/tra-2020-56
|
|
CVE-2020-5806 - https://www.tenable.com/security/research/tra-2020-71
|
|
CVE-2020-5807 - https://www.tenable.com/security/research/tra-2020-71
|
|
CVE-2020-5808 - https://www.tenable.com/security/tns-2020-11
|
|
CVE-2020-5809 - https://www.tenable.com/security/research/tra-2020-59
|
|
CVE-2020-5810 - https://www.tenable.com/security/research/tra-2020-59
|
|
CVE-2020-5811 - http://packetstormsecurity.com/files/163965/Umbraco-CMS-8.9.1-Traversal-Arbitrary-File-Write.html
|
|
CVE-2020-5811 - https://www.tenable.com/security/research/tra-2020-59
|
|
CVE-2020-5812 - https://www.tenable.com/security/tns-2021-01
|
|
CVE-2020-5841 - https://medium.com/@ph0rensic/sql-injection-opmon-9-3-1-1-770bd7e7ad1
|
|
CVE-2020-5842 - https://www.exploit-db.com/exploits/47876
|
|
CVE-2020-5844 - http://packetstormsecurity.com/files/167503/Pandora-FMS-7.0NG.742-Remote-Code-Execution.html
|
|
CVE-2020-5844 - https://github.com/TheCyberGeek/CVE-2020-5844
|
|
CVE-2020-5847 - http://packetstormsecurity.com/files/157275/Unraid-6.8.0-Authentication-Bypass-Arbitrary-Code-Execution.html
|
|
CVE-2020-5847 - https://sysdream.com/news/lab/
|
|
CVE-2020-5849 - http://packetstormsecurity.com/files/157275/Unraid-6.8.0-Authentication-Bypass-Arbitrary-Code-Execution.html
|
|
CVE-2020-5849 - https://sysdream.com/news/lab/
|
|
CVE-2020-5902 - http://packetstormsecurity.com/files/158333/BIG-IP-TMUI-Remote-Code-Execution.html
|
|
CVE-2020-5902 - http://packetstormsecurity.com/files/158334/BIG-IP-TMUI-Remote-Code-Execution.html
|
|
CVE-2020-5902 - http://packetstormsecurity.com/files/158366/F5-BIG-IP-TMUI-Directory-Traversal-File-Upload-Code-Execution.html
|
|
CVE-2020-5902 - http://packetstormsecurity.com/files/158414/Checker-CVE-2020-5902.html
|
|
CVE-2020-5902 - http://packetstormsecurity.com/files/158581/F5-Big-IP-13.1.3-Build-0.0.6-Local-File-Inclusion.html
|
|
CVE-2020-5902 - http://packetstormsecurity.com/files/175671/F5-BIG-IP-TMUI-Directory-Traversal-File-Upload-Code-Execution.html
|
|
CVE-2020-5902 - https://badpackets.net/over-3000-f5-big-ip-endpoints-vulnerable-to-cve-2020-5902/
|
|
CVE-2020-5902 - https://github.com/Critical-Start/Team-Ares/tree/master/CVE-2020-5902
|
|
CVE-2020-5902 - https://swarm.ptsecurity.com/rce-in-f5-big-ip/
|
|
CVE-2020-5902 - https://www.criticalstart.com/f5-big-ip-remote-code-execution-exploit/
|
|
CVE-2020-5962 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031
|
|
CVE-2020-5963 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031
|
|
CVE-2020-5964 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031
|
|
CVE-2020-5965 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031
|
|
CVE-2020-5966 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031
|
|
CVE-2020-5967 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031
|
|
CVE-2020-5968 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031
|
|
CVE-2020-5969 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031
|
|
CVE-2020-5970 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031
|
|
CVE-2020-5971 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031
|
|
CVE-2020-5972 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031
|
|
CVE-2020-5973 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031
|
|
CVE-2020-5975 - https://nvidia.custhelp.com/app/answers/detail/a_id/5052
|
|
CVE-2020-5976 - https://nvidia.custhelp.com/app/answers/detail/a_id/5052
|
|
CVE-2020-5992 - https://nvidia.custhelp.com/app/answers/detail/a_id/5096
|
|
CVE-2020-6007 - https://research.checkpoint.com/2020/dont-be-silly-its-only-a-lightbulb/
|
|
CVE-2020-6010 - http://packetstormsecurity.com/files/163536/WordPress-LearnPress-SQL-Injection.html
|
|
CVE-2020-6019 - https://github.com/ValveSoftware/GameNetworkingSockets/commit/d944a10808891d202bb1d5e1998de6e0423af678
|
|
CVE-2020-6058 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0975
|
|
CVE-2020-6059 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0976
|
|
CVE-2020-6060 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0977
|
|
CVE-2020-6061 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0984
|
|
CVE-2020-6062 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0985
|
|
CVE-2020-6063 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0986
|
|
CVE-2020-6064 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0987
|
|
CVE-2020-6065 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0989
|
|
CVE-2020-6066 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0990
|
|
CVE-2020-6067 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0991
|
|
CVE-2020-6068 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0992
|
|
CVE-2020-6069 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0993
|
|
CVE-2020-6070 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0988
|
|
CVE-2020-6071 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0994
|
|
CVE-2020-6072 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0995
|
|
CVE-2020-6073 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0996
|
|
CVE-2020-6074 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0997
|
|
CVE-2020-6075 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0998
|
|
CVE-2020-6076 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0999
|
|
CVE-2020-6077 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1000
|
|
CVE-2020-6078 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1001
|
|
CVE-2020-6079 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1002
|
|
CVE-2020-6080 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1002
|
|
CVE-2020-6081 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1003
|
|
CVE-2020-6082 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1004
|
|
CVE-2020-6083 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1005
|
|
CVE-2020-6084 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1006
|
|
CVE-2020-6085 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1006
|
|
CVE-2020-6086 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1007
|
|
CVE-2020-6087 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1007
|
|
CVE-2020-6088 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1008
|
|
CVE-2020-6089 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1009
|
|
CVE-2020-6090 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1010
|
|
CVE-2020-6091 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1011
|
|
CVE-2020-6092 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1013
|
|
CVE-2020-6093 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1014
|
|
CVE-2020-6094 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1017
|
|
CVE-2020-6097 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1029
|
|
CVE-2020-6098 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1030
|
|
CVE-2020-6099 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1032
|
|
CVE-2020-6100 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1040
|
|
CVE-2020-6101 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1041
|
|
CVE-2020-6102 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1042
|
|
CVE-2020-6103 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1043
|
|
CVE-2020-6104 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1046
|
|
CVE-2020-6105 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1047
|
|
CVE-2020-6106 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1048
|
|
CVE-2020-6107 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1049
|
|
CVE-2020-6108 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1050
|
|
CVE-2020-6109 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1055
|
|
CVE-2020-6110 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056
|
|
CVE-2020-6111 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1057
|
|
CVE-2020-6112 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1062
|
|
CVE-2020-6113 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1063
|
|
CVE-2020-6114 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1067
|
|
CVE-2020-6115 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1068
|
|
CVE-2020-6116 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1070
|
|
CVE-2020-6117 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072
|
|
CVE-2020-6118 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072
|
|
CVE-2020-6119 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072
|
|
CVE-2020-6120 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072
|
|
CVE-2020-6121 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072
|
|
CVE-2020-6122 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072
|
|
CVE-2020-6123 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073
|
|
CVE-2020-6124 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073
|
|
CVE-2020-6125 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1074
|
|
CVE-2020-6126 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1075
|
|
CVE-2020-6127 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1075
|
|
CVE-2020-6128 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1075
|
|
CVE-2020-6129 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1076
|
|
CVE-2020-6130 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1076
|
|
CVE-2020-6131 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1076
|
|
CVE-2020-6132 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1077
|
|
CVE-2020-6133 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1077
|
|
CVE-2020-6134 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1077
|
|
CVE-2020-6135 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1078
|
|
CVE-2020-6136 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1079
|
|
CVE-2020-6137 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1080
|
|
CVE-2020-6138 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1080
|
|
CVE-2020-6139 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1080
|
|
CVE-2020-6140 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1080
|
|
CVE-2020-6141 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1081
|
|
CVE-2020-6142 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1082
|
|
CVE-2020-6143 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1083
|
|
CVE-2020-6144 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1083
|
|
CVE-2020-6145 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1091
|
|
CVE-2020-6146 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1084
|
|
CVE-2020-6147 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094
|
|
CVE-2020-6148 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094
|
|
CVE-2020-6149 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094
|
|
CVE-2020-6150 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094
|
|
CVE-2020-6151 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1095
|
|
CVE-2020-6152 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1096
|
|
CVE-2020-6155 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1101
|
|
CVE-2020-6156 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094
|
|
CVE-2020-6166 - https://wpvulndb.com/vulnerabilities/10009
|
|
CVE-2020-6166 - https://www.wordfence.com/blog/2020/01/multiple-vulnerabilities-patched-in-minimal-coming-soon-maintenance-mode-coming-soon-page-plugin/
|
|
CVE-2020-6167 - https://wpvulndb.com/vulnerabilities/10007
|
|
CVE-2020-6167 - https://www.wordfence.com/blog/2020/01/multiple-vulnerabilities-patched-in-minimal-coming-soon-maintenance-mode-coming-soon-page-plugin/
|
|
CVE-2020-6168 - https://wpvulndb.com/vulnerabilities/10008
|
|
CVE-2020-6168 - https://www.wordfence.com/blog/2020/01/multiple-vulnerabilities-patched-in-minimal-coming-soon-maintenance-mode-coming-soon-page-plugin/
|
|
CVE-2020-6170 - http://packetstormsecurity.com/files/156075/Genexis-Platinum-4410-2.1-Authentication-Bypass.html
|
|
CVE-2020-6171 - https://www.deepcode.ca/index.php/2020/04/07/cve-2020-xss-in-clink-office-v2/
|
|
CVE-2020-6173 - https://github.com/theupdateframework/tuf/commits/develop
|
|
CVE-2020-6178 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6184 - https://launchpad.support.sap.com/#/notes/2863397
|
|
CVE-2020-6196 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6197 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6198 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6199 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6200 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6201 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6202 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6203 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6204 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6205 - https://launchpad.support.sap.com/#/notes/2884910
|
|
CVE-2020-6205 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6206 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6207 - http://packetstormsecurity.com/files/161993/SAP-Solution-Manager-7.2-Remote-Command-Execution.html
|
|
CVE-2020-6207 - http://packetstormsecurity.com/files/162083/SAP-SMD-Agent-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2020-6207 - http://packetstormsecurity.com/files/163168/SAP-Solution-Manager-7.20-Missing-Authorization.html
|
|
CVE-2020-6207 - http://seclists.org/fulldisclosure/2021/Apr/4
|
|
CVE-2020-6207 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6208 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6209 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6210 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
|
|
CVE-2020-6215 - http://packetstormsecurity.com/files/174985/SAP-Application-Server-ABAP-Open-Redirection.html
|
|
CVE-2020-6215 - http://seclists.org/fulldisclosure/2023/Oct/13
|
|
CVE-2020-6234 - http://packetstormsecurity.com/files/162084/SAP-Host-Control-Local-Privilege-Escalation.html
|
|
CVE-2020-6287 - http://packetstormsecurity.com/files/162085/SAP-JAVA-Configuration-Task-Execution.html
|
|
CVE-2020-6287 - http://seclists.org/fulldisclosure/2021/Apr/6
|
|
CVE-2020-6307 - https://launchpad.support.sap.com/#/notes/2863397
|
|
CVE-2020-6318 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html
|
|
CVE-2020-6318 - http://seclists.org/fulldisclosure/2022/May/42
|
|
CVE-2020-6364 - http://packetstormsecurity.com/files/163153/SAP-Wily-Introscope-Enterprise-OS-Command-Injection.html
|
|
CVE-2020-6367 - https://launchpad.support.sap.com/#/notes/2972661
|
|
CVE-2020-6369 - http://packetstormsecurity.com/files/163159/SAP-Wily-Introscope-Enterprise-Default-Hard-Coded-Credentials.html
|
|
CVE-2020-6388 - http://packetstormsecurity.com/files/157376/Chrome-AudioArray-Allocate-Data-Race-Out-Of-Bounds-Access.html
|
|
CVE-2020-6390 - http://packetstormsecurity.com/files/157419/Chrome-ReadableStream-Close-Out-Of-Bounds-Access.html
|
|
CVE-2020-6418 - http://packetstormsecurity.com/files/156632/Google-Chrome-80-JSCreate-Side-Effect-Type-Confusion.html
|
|
CVE-2020-6449 - http://packetstormsecurity.com/files/172843/Chrome-WebAudio-Use-After-Free.html
|
|
CVE-2020-6458 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1044
|
|
CVE-2020-6507 - http://packetstormsecurity.com/files/162088/Google-Chrome-81.0.4044-V8-Remote-Code-Execution.html
|
|
CVE-2020-6507 - http://packetstormsecurity.com/files/162105/Google-Chrome-81.0.4044-V8-Remote-Code-Execution.html
|
|
CVE-2020-6513 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1092
|
|
CVE-2020-6514 - http://packetstormsecurity.com/files/158697/WebRTC-usrsctp-Incorrect-Call.html
|
|
CVE-2020-6519 - http://packetstormsecurity.com/files/160353/Chromium-83-CSP-Bypass.html
|
|
CVE-2020-6541 - http://packetstormsecurity.com/files/159610/Chrome-USB-OnServiceConnectionError-Use-After-Free.html
|
|
CVE-2020-6542 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1127
|
|
CVE-2020-6549 - http://packetstormsecurity.com/files/159558/Chrome-MediaElementEventListener-UpdateSources-Use-After-Free.html
|
|
CVE-2020-6550 - http://packetstormsecurity.com/files/159609/Chrome-WebIDBGetDBNamesCallbacksImpl-SuccessNamesAndVersionsList-Use-After-Free.html
|
|
CVE-2020-6551 - http://packetstormsecurity.com/files/159611/Chrome-XRSystem-FocusedFrameChanged-and-FocusController-NotifyFocusChangedObservers-Use-After-Free.html
|
|
CVE-2020-6555 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1123
|
|
CVE-2020-6577 - https://herolab.usd.de/security-advisories/
|
|
CVE-2020-6577 - https://herolab.usd.de/security-advisories/usd-2019-0072/
|
|
CVE-2020-6578 - https://herolab.usd.de/security-advisories/
|
|
CVE-2020-6578 - https://herolab.usd.de/security-advisories/usd-2019-0069/
|
|
CVE-2020-6579 - https://herolab.usd.de/security-advisories/usd-2019-0070/
|
|
CVE-2020-6581 - https://herolab.usd.de/security-advisories/
|
|
CVE-2020-6581 - https://herolab.usd.de/security-advisories/usd-2020-0002/
|
|
CVE-2020-6582 - https://herolab.usd.de/security-advisories/
|
|
CVE-2020-6582 - https://herolab.usd.de/security-advisories/usd-2020-0001/
|
|
CVE-2020-6584 - https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60
|
|
CVE-2020-6585 - https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60
|
|
CVE-2020-6586 - https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60
|
|
CVE-2020-6609 - https://github.com/LibreDWG/libredwg/issues/179#issue-544834443
|
|
CVE-2020-6610 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447120
|
|
CVE-2020-6611 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447190
|
|
CVE-2020-6612 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169
|
|
CVE-2020-6613 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447025
|
|
CVE-2020-6614 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068
|
|
CVE-2020-6615 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223
|
|
CVE-2020-6616 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-6617 - https://github.com/nothings/stb/issues/864
|
|
CVE-2020-6618 - https://github.com/nothings/stb/issues/866
|
|
CVE-2020-6619 - https://github.com/nothings/stb/issues/863
|
|
CVE-2020-6620 - https://github.com/nothings/stb/issues/868
|
|
CVE-2020-6621 - https://github.com/nothings/stb/issues/867
|
|
CVE-2020-6622 - https://github.com/nothings/stb/issues/869
|
|
CVE-2020-6623 - https://github.com/nothings/stb/issues/865
|
|
CVE-2020-6624 - https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1858744
|
|
CVE-2020-6625 - https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1858746
|
|
CVE-2020-6627 - http://packetstormsecurity.com/files/172590/Seagate-Central-Storage-2015.0916-User-Creation-Command-Execution.html
|
|
CVE-2020-6627 - https://pentest.blog/advisory-seagate-central-storage-remote-code-execution/
|
|
CVE-2020-6628 - https://github.com/libming/libming/issues/191
|
|
CVE-2020-6629 - https://github.com/libming/libming/issues/190
|
|
CVE-2020-6630 - https://github.com/gpac/gpac/issues/1377
|
|
CVE-2020-6631 - https://github.com/gpac/gpac/issues/1378
|
|
CVE-2020-6637 - https://cinzinga.com/CVE-2020-6637/
|
|
CVE-2020-6640 - https://fortiguard.com/advisory/FG-IR-20-003
|
|
CVE-2020-6643 - https://fortiguard.com/advisory/FG-IR-19-270
|
|
CVE-2020-6649 - https://fortiguard.com/advisory/FG-IR-20-011
|
|
CVE-2020-6756 - http://packetstormsecurity.com/files/155898/PixelStor-5000-K-4.0.1580-20150629-Remote-Code-Execution.html
|
|
CVE-2020-6792 - https://usn.ubuntu.com/4328-1/
|
|
CVE-2020-6793 - https://usn.ubuntu.com/4328-1/
|
|
CVE-2020-6794 - https://usn.ubuntu.com/4328-1/
|
|
CVE-2020-6795 - https://usn.ubuntu.com/4328-1/
|
|
CVE-2020-6796 - https://bugzilla.mozilla.org/show_bug.cgi?id=1610426
|
|
CVE-2020-6797 - https://bugzilla.mozilla.org/show_bug.cgi?id=1596668
|
|
CVE-2020-6798 - https://usn.ubuntu.com/4328-1/
|
|
CVE-2020-6799 - https://bugzilla.mozilla.org/show_bug.cgi?id=1606596
|
|
CVE-2020-6800 - https://usn.ubuntu.com/4328-1/
|
|
CVE-2020-6802 - https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach
|
|
CVE-2020-6805 - https://usn.ubuntu.com/4328-1/
|
|
CVE-2020-6806 - http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html
|
|
CVE-2020-6806 - https://usn.ubuntu.com/4328-1/
|
|
CVE-2020-6807 - https://usn.ubuntu.com/4328-1/
|
|
CVE-2020-6808 - https://bugzilla.mozilla.org/show_bug.cgi?id=1247968
|
|
CVE-2020-6811 - https://usn.ubuntu.com/4328-1/
|
|
CVE-2020-6812 - https://usn.ubuntu.com/4328-1/
|
|
CVE-2020-6813 - https://bugzilla.mozilla.org/show_bug.cgi?id=1605814
|
|
CVE-2020-6814 - https://usn.ubuntu.com/4328-1/
|
|
CVE-2020-6816 - https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach
|
|
CVE-2020-6817 - https://bugzilla.mozilla.org/show_bug.cgi?id=1623633
|
|
CVE-2020-6828 - https://bugzilla.mozilla.org/show_bug.cgi?id=1617928
|
|
CVE-2020-6830 - https://bugzilla.mozilla.org/show_bug.cgi?id=1632387
|
|
CVE-2020-6831 - http://packetstormsecurity.com/files/158480/usrsctp-Stack-Buffer-Overflow.html
|
|
CVE-2020-6836 - https://blog.truesec.com/2020/01/17/reverse-shell-through-a-node-js-math-parser/
|
|
CVE-2020-6838 - https://github.com/mruby/mruby/issues/4926
|
|
CVE-2020-6839 - https://github.com/mruby/mruby/issues/4929
|
|
CVE-2020-6840 - https://github.com/mruby/mruby/issues/4927
|
|
CVE-2020-6843 - http://packetstormsecurity.com/files/156050/ZOHO-ManageEngine-ServiceDeskPlus-11.0-Build-11007-Cross-Site-Scripting.html
|
|
CVE-2020-6843 - http://seclists.org/fulldisclosure/2020/Jan/32
|
|
CVE-2020-6843 - https://seclists.org/bugtraq/2020/Jan/34
|
|
CVE-2020-6844 - https://websec.nl/news.php
|
|
CVE-2020-6844 - https://www.exploit-db.com/exploits/47960
|
|
CVE-2020-6845 - https://websec.nl/news.php
|
|
CVE-2020-6845 - https://www.exploit-db.com/exploits/47960
|
|
CVE-2020-6847 - https://gist.github.com/Marshall-Hallenbeck/bf6a4a4f408bb7a5e0a47cb39dc1dbbe
|
|
CVE-2020-6849 - https://wpvulndb.com/vulnerabilities/10031
|
|
CVE-2020-6849 - https://zeroauth.ltd/blog/
|
|
CVE-2020-6850 - https://zeroauth.ltd/blog/
|
|
CVE-2020-6850 - https://zeroauth.ltd/blog/2020/01/28/cve-2020-6850-miniorange-saml-wp-plugin-before-4-8-84-is-vulnerable-to-xss-via-a-specially-crafted-saml-xml-response/
|
|
CVE-2020-6851 - https://github.com/uclouvain/openjpeg/issues/1228
|
|
CVE-2020-6851 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-6857 - http://hyp3rlinx.altervista.org
|
|
CVE-2020-6857 - http://packetstormsecurity.com/files/156015/Neowise-CarbonFTP-1.4-Insecure-Proprietary-Password-Encryption.html
|
|
CVE-2020-6857 - http://packetstormsecurity.com/files/157321/Neowise-CarbonFTP-1.4-Insecure-Proprietary-Password-Encryption.html
|
|
CVE-2020-6857 - http://seclists.org/fulldisclosure/2020/Jan/29
|
|
CVE-2020-6857 - http://seclists.org/fulldisclosure/2020/Jan/35
|
|
CVE-2020-6857 - https://seclists.org/bugtraq/2020/Jan/30
|
|
CVE-2020-6858 - https://github.com/HotelsDotCom/styx/security/advisories/GHSA-6v7p-v754-j89v
|
|
CVE-2020-6859 - https://wpvulndb.com/vulnerabilities/10041
|
|
CVE-2020-6860 - https://github.com/hoene/libmysofa/issues/96
|
|
CVE-2020-6861 - https://deadcode.me/blog/2020/04/25/Ledger-Monero-app-spend-key-extraction.html
|
|
CVE-2020-6862 - http://packetstormsecurity.com/files/159135/ZTE-F602W-CAPTCHA-Bypass.html
|
|
CVE-2020-6950 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-6950 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-6950 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-6954 - https://nileshsapariya.blogspot.com/2020/01/cayin-smp-pro4-signage-media-player.html
|
|
CVE-2020-6955 - https://nileshsapariya.blogspot.com/2020/01/cayin-smp-pro4-signage-media-player.html
|
|
CVE-2020-6956 - https://www.kpmg.de/noindex/advisories/KPMG-2019-001.txt
|
|
CVE-2020-6958 - https://github.com/NationalSecurityAgency/ghidra/issues/943
|
|
CVE-2020-6958 - https://github.com/purpleracc00n/Exploits-and-PoC/blob/master/XXE%20in%20YAJSW%E2%80%99s%20JnlpSupport%20affects%20Ghidra%20Server.md
|
|
CVE-2020-6958 - https://sourceforge.net/p/yajsw/bugs/166/
|
|
CVE-2020-7009 - https://www.elastic.co/community/security/
|
|
CVE-2020-7010 - https://www.elastic.co/community/security/
|
|
CVE-2020-7011 - https://www.elastic.co/community/security/
|
|
CVE-2020-7012 - https://www.elastic.co/community/security/
|
|
CVE-2020-7013 - https://www.elastic.co/community/security/
|
|
CVE-2020-7014 - https://www.elastic.co/community/security/
|
|
CVE-2020-7015 - https://www.elastic.co/community/security/
|
|
CVE-2020-7016 - https://www.elastic.co/community/security/
|
|
CVE-2020-7016 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-7017 - https://www.elastic.co/community/security/
|
|
CVE-2020-7017 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-7020 - https://staging-website.elastic.co/community/security/
|
|
CVE-2020-7030 - http://packetstormsecurity.com/files/157957/Avaya-IP-Office-11-Insecure-Transit-Password-Disclosure.html
|
|
CVE-2020-7032 - http://packetstormsecurity.com/files/160123/Avaya-Web-License-Manager-XML-Injection.html
|
|
CVE-2020-7032 - http://seclists.org/fulldisclosure/2020/Nov/31
|
|
CVE-2020-7032 - https://sec-consult.com/vulnerability-lab/advisory/blind-out-of-band-xml-external-entity-injection-in-avaya-web-license-manager/
|
|
CVE-2020-7044 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-7047 - https://wpvulndb.com/vulnerabilities/10028
|
|
CVE-2020-7048 - https://wpvulndb.com/vulnerabilities/10027
|
|
CVE-2020-7050 - https://www.linkedin.com/posts/polina-voronina-896819b5_discovered-by-polina-voronina-jan-15-activity-6634436086540054528-dDgg/
|
|
CVE-2020-7051 - https://www.linkedin.com/posts/polina-voronina-896819b5_discovered-by-polina-voronina-jan-15-activity-6634436086540054528-dDgg/
|
|
CVE-2020-7052 - https://www.tenable.com/security/research/tra-2020-04
|
|
CVE-2020-7053 - http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html
|
|
CVE-2020-7053 - https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859522
|
|
CVE-2020-7053 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2
|
|
CVE-2020-7053 - https://lore.kernel.org/stable/20200114183937.12224-1-tyhicks@canonical.com
|
|
CVE-2020-7053 - https://usn.ubuntu.com/4287-2/
|
|
CVE-2020-7054 - https://github.com/mz-automation/libiec61850/issues/200
|
|
CVE-2020-7059 - https://hackerone.com/reports/778834
|
|
CVE-2020-7059 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-7059 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-7060 - https://bugs.php.net/bug.php?id=79037
|
|
CVE-2020-7060 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-7060 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-7062 - https://bugs.php.net/bug.php?id=79221
|
|
CVE-2020-7064 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-7065 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-7067 - https://bugs.php.net/bug.php?id=79465
|
|
CVE-2020-7067 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-7067 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-7068 - https://bugs.php.net/bug.php?id=79797
|
|
CVE-2020-7069 - https://usn.ubuntu.com/4583-1/
|
|
CVE-2020-7069 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-7069 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-7070 - https://usn.ubuntu.com/4583-1/
|
|
CVE-2020-7070 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-7071 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-7104 - https://wpvulndb.com/vulnerabilities/10029
|
|
CVE-2020-7107 - https://wpvulndb.com/vulnerabilities/10006
|
|
CVE-2020-7108 - http://packetstormsecurity.com/files/156275/LearnDash-WordPress-LMS-3.1.2-Cross-Site-Scripting.html
|
|
CVE-2020-7108 - https://wpvulndb.com/vulnerabilities/10026
|
|
CVE-2020-7115 - http://packetstormsecurity.com/files/158368/ClearPass-Policy-Manager-Unauthenticated-Remote-Command-Execution.html
|
|
CVE-2020-7200 - http://packetstormsecurity.com/files/161721/HPE-Systems-Insight-Manager-AMF-Deserialization-Remote-Code-Execution.html
|
|
CVE-2020-7209 - http://packetstormsecurity.com/files/157739/HP-LinuxKI-6.01-Remote-Command-Injection.html
|
|
CVE-2020-7209 - http://packetstormsecurity.com/files/158025/LinuxKI-Toolset-6.01-Remote-Command-Execution.html
|
|
CVE-2020-7210 - http://packetstormsecurity.com/files/156062/Umbraco-CMS-8.2.2-Cross-Site-Request-Forgery.html
|
|
CVE-2020-7210 - http://seclists.org/fulldisclosure/2020/Jan/33
|
|
CVE-2020-7210 - https://sec-consult.com/en/blog/advisories/cross-site-request-forgery-csrf-in-umbraco-cms/
|
|
CVE-2020-7210 - https://seclists.org/bugtraq/2020/Jan/35
|
|
CVE-2020-7213 - http://almorabea.net/en/2020/01/19/write-up-for-the-parallel-vulnerability-cve-2020-7213/
|
|
CVE-2020-7222 - https://sku11army.blogspot.com/2020/01/amcrest-2520ac0018r-login-bypass.html
|
|
CVE-2020-7224 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html
|
|
CVE-2020-7224 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#article-avxsb-00001
|
|
CVE-2020-7226 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-7226 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-7228 - https://wpvulndb.com/vulnerabilities/10043
|
|
CVE-2020-7229 - https://github.com/niteosoft/simplejobscript/issues/7
|
|
CVE-2020-7231 - https://sku11army.blogspot.com/2020/01/evoko-otra-sala-por-favor.html
|
|
CVE-2020-7232 - https://sku11army.blogspot.com/2020/01/evoko-otra-sala-por-favor.html
|
|
CVE-2020-7233 - https://sku11army.blogspot.com/2020/01/kms-controls-backdoor-in-bacnet.html
|
|
CVE-2020-7234 - https://sku11army.blogspot.com/2020/01/ruckus-wireless-authenticated-stored.html
|
|
CVE-2020-7239 - https://wpvulndb.com/vulnerabilities/10035
|
|
CVE-2020-7240 - https://sku11army.blogspot.com/2020/01/heinberg-lantime-m1000-rce.html
|
|
CVE-2020-7241 - https://github.com/V1n1v131r4/Exploiting-WP-Database-Backup-WordPress-Plugin/blob/master/README.md
|
|
CVE-2020-7241 - https://zeroauth.ltd/blog/2020/01/21/analysis-on-cve-2020-7241-misrepresenting-a-security-vulnerability/
|
|
CVE-2020-7242 - https://sku11army.blogspot.com/2020/01/comtech-authenticated-rce-on-comtech.html
|
|
CVE-2020-7246 - http://packetstormsecurity.com/files/156063/qdPM-9.1-Remote-Code-Execution.html
|
|
CVE-2020-7246 - http://packetstormsecurity.com/files/156571/qdPM-Remote-Code-Execution.html
|
|
CVE-2020-7246 - http://packetstormsecurity.com/files/167264/qdPM-9.1-Remote-Code-Execution.html
|
|
CVE-2020-7246 - http://packetstormsecurity.com/files/168559/qdPM-9.1-Authenticated-Shell-Upload.html
|
|
CVE-2020-7246 - https://docs.google.com/document/d/13ZZSm0DL1Ie6r_fU5ZdDKGZ4defFqiFXMG--zDo8S10/edit?usp=sharing
|
|
CVE-2020-7247 - http://packetstormsecurity.com/files/156137/OpenBSD-OpenSMTPD-Privilege-Escalation-Code-Execution.html
|
|
CVE-2020-7247 - http://packetstormsecurity.com/files/156145/OpenSMTPD-6.6.2-Remote-Code-Execution.html
|
|
CVE-2020-7247 - http://packetstormsecurity.com/files/156249/OpenSMTPD-MAIL-FROM-Remote-Code-Execution.html
|
|
CVE-2020-7247 - http://packetstormsecurity.com/files/156295/OpenSMTPD-6.6.1-Local-Privilege-Escalation.html
|
|
CVE-2020-7247 - http://packetstormsecurity.com/files/162093/OpenBSD-OpenSMTPD-6.6-Remote-Code-Execution.html
|
|
CVE-2020-7247 - http://seclists.org/fulldisclosure/2020/Jan/49
|
|
CVE-2020-7247 - http://www.openwall.com/lists/oss-security/2020/01/28/3
|
|
CVE-2020-7248 - https://github.com/openwrt/openwrt/commits/master
|
|
CVE-2020-7250 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309
|
|
CVE-2020-7251 - https://kc.mcafee.com/corporate/index?page=content&id=SB10299
|
|
CVE-2020-7252 - https://kc.mcafee.com/corporate/index?page=content&id=SB10307
|
|
CVE-2020-7253 - https://kc.mcafee.com/corporate/index?page=content&id=SB10312
|
|
CVE-2020-7254 - https://kc.mcafee.com/corporate/index?page=content&id=SB10311
|
|
CVE-2020-7255 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309
|
|
CVE-2020-7257 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309
|
|
CVE-2020-7259 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309
|
|
CVE-2020-7260 - https://kc.mcafee.com/corporate/index?page=content&id=SB10313
|
|
CVE-2020-7261 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309
|
|
CVE-2020-7262 - https://kc.mcafee.com/corporate/index?page=content&id=SB10319
|
|
CVE-2020-7263 - https://kc.mcafee.com/corporate/index?page=content&id=SB10314
|
|
CVE-2020-7268 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323
|
|
CVE-2020-7269 - https://kc.mcafee.com/corporate/index?page=content&id=SB10336
|
|
CVE-2020-7270 - https://kc.mcafee.com/corporate/index?page=content&id=SB10336
|
|
CVE-2020-7273 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309
|
|
CVE-2020-7274 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309
|
|
CVE-2020-7275 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309
|
|
CVE-2020-7276 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309
|
|
CVE-2020-7277 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309
|
|
CVE-2020-7278 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309
|
|
CVE-2020-7279 - https://kc.mcafee.com/corporate/index?page=content&id=SB10320
|
|
CVE-2020-7280 - https://kc.mcafee.com/corporate/index?page=content&id=SB10302
|
|
CVE-2020-7292 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323
|
|
CVE-2020-7293 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323
|
|
CVE-2020-7294 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323
|
|
CVE-2020-7295 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323
|
|
CVE-2020-7296 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323
|
|
CVE-2020-7297 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323
|
|
CVE-2020-7300 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326
|
|
CVE-2020-7301 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326
|
|
CVE-2020-7302 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326
|
|
CVE-2020-7303 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326
|
|
CVE-2020-7304 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326
|
|
CVE-2020-7305 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326
|
|
CVE-2020-7306 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326
|
|
CVE-2020-7307 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326
|
|
CVE-2020-7308 - https://kc.mcafee.com/corporate/index?page=content&id=SB10354
|
|
CVE-2020-7309 - https://kc.mcafee.com/corporate/index?page=content&id=SB10324
|
|
CVE-2020-7311 - https://kc.mcafee.com/corporate/index?page=content&id=SB10325
|
|
CVE-2020-7312 - https://kc.mcafee.com/corporate/index?page=content&id=SB10325
|
|
CVE-2020-7314 - https://kc.mcafee.com/corporate/index?page=content&id=SB10325
|
|
CVE-2020-7315 - https://kc.mcafee.com/corporate/index?page=content&id=SB10325
|
|
CVE-2020-7316 - https://kc.mcafee.com/corporate/index?page=content&id=SB10330
|
|
CVE-2020-7317 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-7318 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-7319 - https://kc.mcafee.com/corporate/index?page=content&id=SB10327
|
|
CVE-2020-7320 - https://kc.mcafee.com/corporate/index?page=content&id=SB10327
|
|
CVE-2020-7322 - https://kc.mcafee.com/corporate/index?page=content&id=SB10327
|
|
CVE-2020-7323 - https://kc.mcafee.com/corporate/index?page=content&id=SB10327
|
|
CVE-2020-7324 - https://kc.mcafee.com/corporate/index?page=content&id=SB10328
|
|
CVE-2020-7325 - https://kc.mcafee.com/corporate/index?page=content&id=SB10328
|
|
CVE-2020-7326 - https://kc.mcafee.com/corporate/index?page=content&id=SB10331
|
|
CVE-2020-7327 - https://kc.mcafee.com/corporate/index?page=content&id=SB10331
|
|
CVE-2020-7328 - https://kc.mcafee.com/corporate/index?page=content&id=SB10334
|
|
CVE-2020-7329 - https://kc.mcafee.com/corporate/index?page=content&id=SB10334
|
|
CVE-2020-7331 - https://kc.mcafee.com/corporate/index?page=content&id=SB10335
|
|
CVE-2020-7332 - https://kc.mcafee.com/corporate/index?page=content&id=SB10335
|
|
CVE-2020-7333 - https://kc.mcafee.com/corporate/index?page=content&id=SB10335
|
|
CVE-2020-7336 - https://kc.mcafee.com/corporate/index?page=content&id=SB10341
|
|
CVE-2020-7337 - https://kc.mcafee.com/corporate/index?page=content&id=SB10338
|
|
CVE-2020-7339 - https://kc.mcafee.com/corporate/index?page=content&id=SB10340
|
|
CVE-2020-7343 - https://kc.mcafee.com/corporate/index?page=content&id=SB10343
|
|
CVE-2020-7346 - https://kc.mcafee.com/corporate/index?page=content&id=SB10344
|
|
CVE-2020-7350 - https://github.com/rapid7/metasploit-framework/issues/13026
|
|
CVE-2020-7351 - http://packetstormsecurity.com/files/157565/TrixBox-CE-2.8.0.4-Command-Execution.html
|
|
CVE-2020-7352 - https://www.positronsecurity.com/blog/2020-04-28-gog-galaxy-client-local-privilege-escalation/
|
|
CVE-2020-7354 - https://avalz.it/research/metasploit-pro-xss-to-rce/
|
|
CVE-2020-7355 - https://avalz.it/research/metasploit-pro-xss-to-rce/
|
|
CVE-2020-7356 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5571.php
|
|
CVE-2020-7357 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5570.php
|
|
CVE-2020-7361 - https://github.com/rapid7/metasploit-framework/pull/13828
|
|
CVE-2020-7363 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/
|
|
CVE-2020-7363 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html
|
|
CVE-2020-7364 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/
|
|
CVE-2020-7364 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html
|
|
CVE-2020-7369 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/
|
|
CVE-2020-7369 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html
|
|
CVE-2020-7370 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/
|
|
CVE-2020-7370 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html
|
|
CVE-2020-7371 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/
|
|
CVE-2020-7371 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html
|
|
CVE-2020-7373 - https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/
|
|
CVE-2020-7377 - https://github.com/rapid7/metasploit-framework/issues/14015
|
|
CVE-2020-7384 - http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenom-APK-Template-Command-Injection.html
|
|
CVE-2020-7384 - http://packetstormsecurity.com/files/161200/Metasploit-Framework-6.0.11-Command-Injection.html
|
|
CVE-2020-7457 - http://packetstormsecurity.com/files/158695/FreeBSD-ip6_setpktopt-Use-After-Free-Privilege-Escalation.html
|
|
CVE-2020-7470 - https://sku11army.blogspot.com/2020/01/sonoff-sonoff-th-module-vuln-xss.html
|
|
CVE-2020-7483 - https://www.se.com/ww/en/download/document/SESB-2020-105-01
|
|
CVE-2020-7484 - https://www.se.com/ww/en/download/document/SESB-2020-105-01
|
|
CVE-2020-7485 - https://www.se.com/ww/en/download/document/SESB-2020-105-01
|
|
CVE-2020-7486 - https://www.se.com/ww/en/download/document/SESB-2020-105-01
|
|
CVE-2020-7491 - https://www.se.com/ww/en/download/document/SESB-2020-105-01/
|
|
CVE-2020-7499 - https://www.se.com/ww/en/download/document/SEVD-2020-133-03/
|
|
CVE-2020-7500 - https://www.se.com/ww/en/download/document/SEVD-2020-133-03/
|
|
CVE-2020-7590 - https://www.siemens-healthineers.com/support-documentation/security-advisory
|
|
CVE-2020-7593 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1069
|
|
CVE-2020-7594 - https://sku11army.blogspot.com/2020/01/multitech-authenticated-remote-code.html
|
|
CVE-2020-7595 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-7595 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-7595 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-7595 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-7596 - https://snyk.io/vuln/SNYK-JS-CODECOV-543183
|
|
CVE-2020-7597 - https://snyk.io/vuln/SNYK-JS-CODECOV-548879
|
|
CVE-2020-7598 - https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
|
|
CVE-2020-7600 - https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867
|
|
CVE-2020-7601 - https://snyk.io/vuln/SNYK-JS-GULPSCSSLINT-560114
|
|
CVE-2020-7602 - https://snyk.io/vuln/SNYK-JS-NODEPROMPTHERE-560115
|
|
CVE-2020-7603 - https://snyk.io/vuln/SNYK-JS-CLOSURECOMPILERSTREAM-560123
|
|
CVE-2020-7604 - https://snyk.io/vuln/SNYK-JS-PULVERIZR-560122
|
|
CVE-2020-7605 - https://snyk.io/vuln/SNYK-JS-GULPTAPE-560124
|
|
CVE-2020-7606 - https://snyk.io/vuln/SNYK-JS-DOCKERCOMPOSEREMOTEAPI-560125
|
|
CVE-2020-7607 - https://snyk.io/vuln/SNYK-JS-GULPSTYLEDOCCO-560126
|
|
CVE-2020-7608 - https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381
|
|
CVE-2020-7609 - https://snyk.io/vuln/SNYK-JS-NODERULES-560426
|
|
CVE-2020-7611 - https://snyk.io/vuln/SNYK-JAVA-IOMICRONAUT-561342
|
|
CVE-2020-7613 - https://snyk.io/vuln/SNYK-JS-CLAMSCAN-564113
|
|
CVE-2020-7614 - https://snyk.io/vuln/SNYK-JS-NPMPROGRAMMATIC-564115
|
|
CVE-2020-7615 - https://snyk.io/vuln/SNYK-JS-FSA-564118
|
|
CVE-2020-7616 - https://snyk.io/vuln/SNYK-JS-EXPRESSMOCKMIDDLEWARE-564120
|
|
CVE-2020-7617 - https://snyk.io/vuln/SNYK-JS-INIPARSER-564122
|
|
CVE-2020-7618 - https://snyk.io/vuln/SNYK-JS-SDS-564123
|
|
CVE-2020-7619 - https://snyk.io/vuln/SNYK-JS-GETGITDATA-564222
|
|
CVE-2020-7620 - https://snyk.io/vuln/SNYK-JS-POMELOMONITOR-173695
|
|
CVE-2020-7621 - https://snyk.io/vuln/SNYK-JS-STRONGNGINXCONTROLLER-564248
|
|
CVE-2020-7623 - https://snyk.io/vuln/SNYK-JS-JSCOVER-564250
|
|
CVE-2020-7624 - https://snyk.io/vuln/SNYK-JS-EFFECT-564256
|
|
CVE-2020-7625 - https://snyk.io/vuln/SNYK-JS-OPBROWSER-564259
|
|
CVE-2020-7626 - https://snyk.io/vuln/SNYK-JS-KARMAMOJO-564260
|
|
CVE-2020-7627 - https://snyk.io/vuln/SNYK-JS-NODEKEYSENDER-564261
|
|
CVE-2020-7628 - https://snyk.io/vuln/SNYK-JS-UMOUNT-564265
|
|
CVE-2020-7629 - https://snyk.io/vuln/SNYK-JS-INSTALLPACKAGE-564267
|
|
CVE-2020-7630 - https://snyk.io/vuln/SNYK-JS-GITADDREMOTE-564269
|
|
CVE-2020-7631 - https://snyk.io/vuln/SNYK-JS-DISKUSAGENG-564425
|
|
CVE-2020-7632 - https://snyk.io/vuln/SNYK-JS-NODEMPV-564426
|
|
CVE-2020-7633 - https://snyk.io/vuln/SNYK-JS-APICONNECTCLIPLUGINS-564427
|
|
CVE-2020-7634 - https://snyk.io/vuln/SNYK-JS-HEROKUADDONPOOL-564428
|
|
CVE-2020-7635 - https://snyk.io/vuln/SNYK-JS-COMPASSCOMPILE-564429
|
|
CVE-2020-7636 - https://snyk.io/vuln/SNYK-JS-ADBDRIVER-564430
|
|
CVE-2020-7637 - https://snyk.io/vuln/SNYK-JS-CLASSTRANSFORMER-564431
|
|
CVE-2020-7638 - https://snyk.io/vuln/SNYK-JS-CONFINIT-564433
|
|
CVE-2020-7639 - https://snyk.io/vuln/SNYK-JS-EIVIFJDOT-564435
|
|
CVE-2020-7640 - https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968
|
|
CVE-2020-7641 - https://security.snyk.io/vuln/SNYK-JS-GRUNTUTILPROPERTY-565088
|
|
CVE-2020-7642 - https://snyk.io/vuln/SNYK-JS-LAZYSIZES-567144
|
|
CVE-2020-7643 - https://snyk.io/vuln/SNYK-JS-PAYPALADAPTIVE-565089
|
|
CVE-2020-7644 - https://snyk.io/vuln/SNYK-JS-FUNMAP-564436
|
|
CVE-2020-7645 - http://snyk.io/vuln/SNYK-JS-CHROMELAUNCHER-537575
|
|
CVE-2020-7646 - https://snyk.io/vuln/SNYK-JS-CURLREQUEST-568274
|
|
CVE-2020-7648 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570607
|
|
CVE-2020-7649 - https://security.snyk.io/vuln/SNYK-JS-SNYKBROKER-570608
|
|
CVE-2020-7650 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570609
|
|
CVE-2020-7651 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570610
|
|
CVE-2020-7652 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570611
|
|
CVE-2020-7653 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570612
|
|
CVE-2020-7655 - https://snyk.io/vuln/SNYK-PYTHON-NETIUS-569141
|
|
CVE-2020-7656 - https://snyk.io/vuln/SNYK-JS-JQUERY-569619
|
|
CVE-2020-7656 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-7658 - https://snyk.io/vuln/SNYK-PYTHON-MEINHELD-569140
|
|
CVE-2020-7659 - https://snyk.io/vuln/SNYK-RUBY-REEL-569135
|
|
CVE-2020-7661 - https://snyk.io/vuln/SNYK-JS-URLREGEX-569472
|
|
CVE-2020-7662 - https://snyk.io/vuln/SNYK-JS-WEBSOCKETEXTENSIONS-570623
|
|
CVE-2020-7663 - https://snyk.io/vuln/SNYK-RUBY-WEBSOCKETEXTENSIONS-570830
|
|
CVE-2020-7664 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383
|
|
CVE-2020-7665 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGUZIP-570441
|
|
CVE-2020-7666 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGCPIO-570440
|
|
CVE-2020-7667 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427
|
|
CVE-2020-7668 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAETZ-570384
|
|
CVE-2020-7669 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGTARUTIL-570428
|
|
CVE-2020-7670 - https://github.com/ohler55/agoo/issues/88
|
|
CVE-2020-7670 - https://snyk.io/vuln/SNYK-RUBY-AGOO-569137
|
|
CVE-2020-7671 - https://snyk.io/vuln/SNYK-RUBY-GOLIATH-569136
|
|
CVE-2020-7672 - https://snyk.io/vuln/SNYK-JS-MOSC-571492
|
|
CVE-2020-7673 - https://snyk.io/vuln/SNYK-JS-NODEEXTEND-571491
|
|
CVE-2020-7674 - https://snyk.io/vuln/SNYK-JS-ACCESSPOLICY-571490
|
|
CVE-2020-7675 - https://snyk.io/vuln/SNYK-JS-CDMESSENGER-571493
|
|
CVE-2020-7677 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-572317
|
|
CVE-2020-7677 - https://security.snyk.io/vuln/SNYK-JS-THENIFY-571690
|
|
CVE-2020-7678 - https://security.snyk.io/vuln/SNYK-JS-NODEIMPORT-571691
|
|
CVE-2020-7679 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-572804
|
|
CVE-2020-7679 - https://snyk.io/vuln/SNYK-JS-CASPERJS-572803
|
|
CVE-2020-7680 - http://packetstormsecurity.com/files/158515/Docsify.js-4.11.4-Cross-Site-Scripting.html
|
|
CVE-2020-7680 - http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html
|
|
CVE-2020-7680 - https://github.com/docsifyjs/docsify/issues/1126
|
|
CVE-2020-7680 - https://snyk.io/vuln/SNYK-JS-DOCSIFY-567099
|
|
CVE-2020-7681 - https://snyk.io/vuln/SNYK-JS-MARSCODE-590122
|
|
CVE-2020-7682 - https://snyk.io/vuln/SNYK-JS-MARKEDTREE-590121
|
|
CVE-2020-7683 - https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINSERVER-590123
|
|
CVE-2020-7685 - https://snyk.io/vuln/SNYK-DOTNET-UMBRACOFORMS-595765
|
|
CVE-2020-7686 - https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINDEVSERVER-590124
|
|
CVE-2020-7687 - https://snyk.io/vuln/SNYK-JS-FASTHTTP-572892
|
|
CVE-2020-7688 - https://github.com/418sec/huntr/pull/102
|
|
CVE-2020-7688 - https://snyk.io/vuln/SNYK-JS-MVERSION-573174
|
|
CVE-2020-7690 - https://snyk.io/vuln/SNYK-JS-JSPDF-575256
|
|
CVE-2020-7691 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575255
|
|
CVE-2020-7691 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575253
|
|
CVE-2020-7691 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575254
|
|
CVE-2020-7691 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575252
|
|
CVE-2020-7691 - https://snyk.io/vuln/SNYK-JS-JSPDF-568273
|
|
CVE-2020-7693 - https://github.com/andsnw/sockjs-dos-py
|
|
CVE-2020-7693 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448
|
|
CVE-2020-7693 - https://snyk.io/vuln/SNYK-JS-SOCKJS-575261
|
|
CVE-2020-7694 - https://snyk.io/vuln/SNYK-PYTHON-UVICORN-575560
|
|
CVE-2020-7695 - https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471
|
|
CVE-2020-7699 - https://github.com/richardgirges/express-fileupload/issues/236
|
|
CVE-2020-7699 - https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969
|
|
CVE-2020-7700 - https://snyk.io/vuln/SNYK-JS-PHPJS-598681
|
|
CVE-2020-7701 - https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676
|
|
CVE-2020-7702 - https://snyk.io/vuln/SNYK-JS-TEMPL8-598770
|
|
CVE-2020-7703 - https://snyk.io/vuln/SNYK-JS-NISUTILS-598799
|
|
CVE-2020-7704 - https://snyk.io/vuln/SNYK-JS-LINUXCMDLINE-598674
|
|
CVE-2020-7705 - https://snyk.io/research/sour-mint-malicious-sdk/
|
|
CVE-2020-7706 - https://snyk.io/vuln/SNYK-JS-CONNIELANG-598853
|
|
CVE-2020-7707 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598857
|
|
CVE-2020-7707 - https://snyk.io/vuln/SNYK-JS-PROPERTYEXPR-598800
|
|
CVE-2020-7708 - https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598672
|
|
CVE-2020-7708 - https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598673
|
|
CVE-2020-7709 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598862
|
|
CVE-2020-7709 - https://snyk.io/vuln/SNYK-JS-JSONPOINTER-596925
|
|
CVE-2020-7710 - https://github.com/hacksparrow/safe-eval/issues/19
|
|
CVE-2020-7710 - https://snyk.io/vuln/SNYK-JS-SAFEEVAL-608076
|
|
CVE-2020-7711 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOXMLDSIG-608301
|
|
CVE-2020-7712 - https://github.com/trentm/json/issues/144
|
|
CVE-2020-7712 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931
|
|
CVE-2020-7712 - https://snyk.io/vuln/SNYK-JS-JSON-597481
|
|
CVE-2020-7712 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-7712 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-7712 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-7713 - https://snyk.io/vuln/SNYK-JS-ARRFLATTENUNFLATTEN-598396
|
|
CVE-2020-7714 - https://snyk.io/vuln/SNYK-JS-CONFUCIOUS-598665
|
|
CVE-2020-7715 - https://snyk.io/vuln/SNYK-JS-DEEPGETSET-598666
|
|
CVE-2020-7716 - https://snyk.io/vuln/SNYK-JS-DEEPS-598667
|
|
CVE-2020-7717 - https://snyk.io/vuln/SNYK-JS-DOTNOTES-598668
|
|
CVE-2020-7718 - https://snyk.io/vuln/SNYK-JS-GAMMAUTILS-598670
|
|
CVE-2020-7719 - https://github.com/kvz/locutus/pull/418/
|
|
CVE-2020-7719 - https://snyk.io/vuln/SNYK-JS-LOCUTUS-598675
|
|
CVE-2020-7720 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293
|
|
CVE-2020-7720 - https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677
|
|
CVE-2020-7721 - https://snyk.io/vuln/SNYK-JS-NODEOOJS-598678
|
|
CVE-2020-7722 - https://snyk.io/vuln/SNYK-JS-NODEEUTILS-598679
|
|
CVE-2020-7723 - https://snyk.io/vuln/SNYK-JS-PROMISEHELPERS-598686
|
|
CVE-2020-7724 - https://snyk.io/vuln/SNYK-JS-TINYCONF-598792
|
|
CVE-2020-7725 - https://snyk.io/vuln/SNYK-JS-WORKSMITH-598798
|
|
CVE-2020-7726 - https://snyk.io/vuln/SNYK-JS-SAFEOBJECT2-598801
|
|
CVE-2020-7727 - https://snyk.io/vuln/SNYK-JS-GEDI-598803
|
|
CVE-2020-7729 - https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7
|
|
CVE-2020-7731 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOSAML2-608302
|
|
CVE-2020-7733 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-674666
|
|
CVE-2020-7733 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-674665
|
|
CVE-2020-7733 - https://snyk.io/vuln/SNYK-JS-UAPARSERJS-610226
|
|
CVE-2020-7733 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-7734 - https://github.com/arachnys/cabot/pull/694
|
|
CVE-2020-7734 - https://snyk.io/vuln/SNYK-PYTHON-CABOT-609862
|
|
CVE-2020-7734 - https://www.exploit-db.com/exploits/48791
|
|
CVE-2020-7736 - https://snyk.io/vuln/SNYK-JS-BMOOR-598664
|
|
CVE-2020-7737 - https://snyk.io/vuln/SNYK-JS-SAFETYDANCE-598687
|
|
CVE-2020-7739 - https://snyk.io/vuln/SNYK-JS-PHANTOMJSSEO-609638
|
|
CVE-2020-7740 - https://snyk.io/vuln/SNYK-JS-NODEPDFGENERATOR-609636
|
|
CVE-2020-7742 - https://snyk.io/vuln/SNYK-JS-SIMPLSCHEMA-1016157
|
|
CVE-2020-7744 - https://snyk.io/blog/remote-code-execution-rce-sourmint/
|
|
CVE-2020-7744 - https://snyk.io/research/sour-mint-malicious-sdk/
|
|
CVE-2020-7745 - https://snyk.io/blog/remote-code-execution-rce-sourmint/
|
|
CVE-2020-7745 - https://snyk.io/research/sour-mint-malicious-sdk/%23rce
|
|
CVE-2020-7745 - https://www.youtube.com/watch?v=n-mEMkeoUqs
|
|
CVE-2020-7746 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1019375
|
|
CVE-2020-7746 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCHARTJS-1019376
|
|
CVE-2020-7746 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019374
|
|
CVE-2020-7746 - https://snyk.io/vuln/SNYK-JS-CHARTJS-1018716
|
|
CVE-2020-7747 - https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381
|
|
CVE-2020-7748 - https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382
|
|
CVE-2020-7749 - https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637
|
|
CVE-2020-7750 - https://snyk.io/vuln/SNYK-JS-SCRATCHSVGRENDERER-1020497
|
|
CVE-2020-7751 - https://snyk.io/vuln/SNYK-JS-PATHVAL-596926
|
|
CVE-2020-7752 - https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909
|
|
CVE-2020-7753 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1022132
|
|
CVE-2020-7753 - https://snyk.io/vuln/SNYK-JS-TRIM-1017038
|
|
CVE-2020-7755 - https://snyk.io/vuln/SNYK-JS-DATGUI-1016275
|
|
CVE-2020-7757 - https://snyk.io/vuln/SNYK-JS-DROPPY-1023656
|
|
CVE-2020-7758 - https://snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657
|
|
CVE-2020-7759 - https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1017405
|
|
CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEMARMOTTAWEBJARS-1024450
|
|
CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1024449
|
|
CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1024445
|
|
CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCODEMIRROR-1024448
|
|
CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCOMPONENTS-1024446
|
|
CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1024447
|
|
CVE-2020-7760 - https://snyk.io/vuln/SNYK-JS-CODEMIRROR-1016937
|
|
CVE-2020-7760 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-7760 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-7760 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-7762 - https://snyk.io/vuln/SNYK-JS-JSREPORTCHROMEPDF-1037310
|
|
CVE-2020-7763 - https://snyk.io/vuln/SNYK-JS-PHANTOMHTMLTOPDF-1023598
|
|
CVE-2020-7764 - https://hackerone.com/reports/1025575
|
|
CVE-2020-7764 - https://snyk.io/vuln/SNYK-JS-FINDMYWAY-1038269
|
|
CVE-2020-7765 - https://snyk.io/vuln/SNYK-JS-FIREBASEUTIL-1038324
|
|
CVE-2020-7766 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038396
|
|
CVE-2020-7766 - https://snyk.io/vuln/SNYK-JS-JSONPTR-1016939
|
|
CVE-2020-7767 - https://snyk.io/vuln/SNYK-JS-EXPRESSVALIDATORS-1017404
|
|
CVE-2020-7768 - https://github.com/grpc/grpc-node/pull/1606
|
|
CVE-2020-7768 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038819
|
|
CVE-2020-7768 - https://snyk.io/vuln/SNYK-JS-GRPC-598671
|
|
CVE-2020-7768 - https://snyk.io/vuln/SNYK-JS-GRPCGRPCJS-1038818
|
|
CVE-2020-7769 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1039742
|
|
CVE-2020-7769 - https://snyk.io/vuln/SNYK-JS-NODEMAILER-1038834
|
|
CVE-2020-7771 - https://snyk.io/vuln/SNYK-JS-ASCIITABLEJS-1039799
|
|
CVE-2020-7772 - https://snyk.io/vuln/SNYK-JS-DOCPATH-1011952
|
|
CVE-2020-7773 - https://snyk.io/vuln/SNYK-JS-MARKDOWNITHIGHLIGHTJS-1040461
|
|
CVE-2020-7774 - https://github.com/yargs/y18n/issues/96
|
|
CVE-2020-7774 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306
|
|
CVE-2020-7774 - https://snyk.io/vuln/SNYK-JS-Y18N-1021887
|
|
CVE-2020-7774 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-7775 - https://snyk.io/vuln/SNYK-JS-FREEDISKSPACE-1040716
|
|
CVE-2020-7776 - https://snyk.io/vuln/SNYK-PHP-PHPOFFICEPHPSPREADSHEET-1048856
|
|
CVE-2020-7777 - https://snyk.io/vuln/SNYK-JS-JSEN-1014670
|
|
CVE-2020-7778 - https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1043753
|
|
CVE-2020-7781 - https://snyk.io/vuln/SNYK-JS-CONNECTIONTESTER-1048337
|
|
CVE-2020-7782 - https://snyk.io/vuln/SNYK-JS-SPRITESHEETJS-1048333
|
|
CVE-2020-7784 - https://snyk.io/vuln/SNYK-JS-TSPROCESSPROMISES-1048334
|
|
CVE-2020-7785 - https://snyk.io/vuln/SNYK-JS-NODEPS-1048335
|
|
CVE-2020-7786 - https://snyk.io/vuln/SNYK-JS-MACFROMIP-1048336
|
|
CVE-2020-7787 - https://snyk.io/vuln/SNYK-JS-REACTADAL-1018907
|
|
CVE-2020-7788 - https://snyk.io/vuln/SNYK-JS-INI-1048974
|
|
CVE-2020-7793 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-1050388
|
|
CVE-2020-7793 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050387
|
|
CVE-2020-7793 - https://snyk.io/vuln/SNYK-JS-UAPARSERJS-1023599
|
|
CVE-2020-7794 - https://snyk.io/vuln/SNYK-JS-BUNS-1050389
|
|
CVE-2020-7795 - https://security.snyk.io/vuln/SNYK-JS-GETNPMPACKAGEVERSION-1050390
|
|
CVE-2020-7799 - http://packetstormsecurity.com/files/156102/FusionAuth-1.10-Remote-Command-Execution.html
|
|
CVE-2020-7799 - https://lab.mediaservice.net/advisory/2020-03-fusionauth.txt
|
|
CVE-2020-7919 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-7920 - https://jira.percona.com/browse/PMM-5232
|
|
CVE-2020-7920 - https://jira.percona.com/browse/PMM-5233
|
|
CVE-2020-7920 - https://www.percona.com/blog/2020/02/03/improvements-in-pmm-bug-fixes-in-percona-server-percona-backup-for-mongodb-alert-release-roundup-2-3-2020/
|
|
CVE-2020-7934 - http://packetstormsecurity.com/files/160168/LifeRay-7.2.1-GA2-Cross-Site-Scripting.html
|
|
CVE-2020-7934 - https://github.com/3ndG4me/liferay-xss-7.2.1GA2-poc-report-CVE-2020-7934
|
|
CVE-2020-7934 - https://semanticbits.com/liferay-portal-authenticated-xss-disclosure/
|
|
CVE-2020-7953 - https://medium.com/@ph0rensic/three-cves-on-opmon-3ca775a262f5
|
|
CVE-2020-7954 - https://medium.com/@ph0rensic/three-cves-on-opmon-3ca775a262f5
|
|
CVE-2020-7959 - https://www.exploit-db.com/exploits/48090
|
|
CVE-2020-7961 - http://packetstormsecurity.com/files/157254/Liferay-Portal-Java-Unmarshalling-Remote-Code-Execution.html
|
|
CVE-2020-7961 - http://packetstormsecurity.com/files/158392/Liferay-Portal-Remote-Code-Execution.html
|
|
CVE-2020-7980 - http://packetstormsecurity.com/files/156143/Satellian-1.12-Remote-Code-Execution.html
|
|
CVE-2020-7980 - https://github.com/Xh4H/Satellian-CVE-2020-7980
|
|
CVE-2020-7981 - https://github.com/alexreisner/geocoder/commit/dcdc3d8675411edce3965941a2ca7c441ca48613
|
|
CVE-2020-7982 - https://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982
|
|
CVE-2020-7982 - https://github.com/openwrt/openwrt/commits/master
|
|
CVE-2020-7984 - https://blog.huntresslabs.com/validating-the-solarwinds-n-central-dumpster-diver-vulnerability-5e3a045982e5
|
|
CVE-2020-7984 - https://packetstormsecurity.com/files/156033
|
|
CVE-2020-7984 - https://www.crn.com/news/managed-services/solarwinds-rmm-tool-has-open-zero-day-exploit-huntress-labs
|
|
CVE-2020-7988 - https://pastebin.com/ZPECbgZb
|
|
CVE-2020-7989 - https://www.exploit-db.com/exploits/47946
|
|
CVE-2020-7990 - https://www.exploit-db.com/exploits/47946
|
|
CVE-2020-7991 - http://packetstormsecurity.com/files/156106/Adive-Framework-2.0.8-Cross-Site-Request-Forgery.html
|
|
CVE-2020-7991 - https://www.exploit-db.com/exploits/47946
|
|
CVE-2020-7995 - http://packetstormsecurity.com/files/163541/Dolibarr-ERP-CRM-10.0.6-Login-Brute-Forcer.html
|
|
CVE-2020-7997 - https://gist.github.com/adeshkolte/983bcadd82cc1fd60333098eb646ef68
|
|
CVE-2020-7998 - https://gist.github.com/adeshkolte/9e60b2483d2f20d1951beac0fc917c6f
|
|
CVE-2020-7999 - https://sku11army.blogspot.com/2020/01/intellian-multiple-vulnerabilities-in.html
|
|
CVE-2020-8000 - https://sku11army.blogspot.com/2020/01/intellian-multiple-vulnerabilities-in.html
|
|
CVE-2020-8001 - https://sku11army.blogspot.com/2020/01/intellian-multiple-vulnerabilities-in.html
|
|
CVE-2020-8010 - http://packetstormsecurity.com/files/158693/CA-Unified-Infrastructure-Management-Nimsoft-7.80-Buffer-Overflow.html
|
|
CVE-2020-8012 - http://packetstormsecurity.com/files/156577/Nimsoft-nimcontroller-7.80-Remote-Code-Execution.html
|
|
CVE-2020-8012 - http://packetstormsecurity.com/files/158693/CA-Unified-Infrastructure-Management-Nimsoft-7.80-Buffer-Overflow.html
|
|
CVE-2020-8014 - https://bugzilla.suse.com/show_bug.cgi?id=1164131
|
|
CVE-2020-8015 - https://bugzilla.suse.com/show_bug.cgi?id=1154183
|
|
CVE-2020-8016 - https://bugzilla.suse.com/show_bug.cgi?id=1159740
|
|
CVE-2020-8019 - https://bugzilla.suse.com/show_bug.cgi?id=1169385
|
|
CVE-2020-8023 - https://bugzilla.suse.com/show_bug.cgi?id=1172698
|
|
CVE-2020-8029 - https://bugzilla.suse.com/show_bug.cgi?id=1177362
|
|
CVE-2020-8091 - https://www.purplemet.com/blog/typo3-xss-vulnerability
|
|
CVE-2020-8101 - https://labs.bitdefender.com/2021/01/cracking-the-lifeshield-unauthorized-live-streaming-in-your-home/
|
|
CVE-2020-8105 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-theabode-iota-security-system-fake-image-injectioninto-timeline
|
|
CVE-2020-8112 - https://github.com/uclouvain/openjpeg/issues/1231
|
|
CVE-2020-8112 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-8115 - https://hackerone.com/reports/775693
|
|
CVE-2020-8116 - https://hackerone.com/reports/719856
|
|
CVE-2020-8117 - https://hackerone.com/reports/439828
|
|
CVE-2020-8118 - https://hackerone.com/reports/427835
|
|
CVE-2020-8119 - https://hackerone.com/reports/719426
|
|
CVE-2020-8120 - https://hackerone.com/reports/605915
|
|
CVE-2020-8121 - https://hackerone.com/reports/452854
|
|
CVE-2020-8122 - https://hackerone.com/reports/447494
|
|
CVE-2020-8123 - https://hackerone.com/reports/768574
|
|
CVE-2020-8124 - https://hackerone.com/reports/496293
|
|
CVE-2020-8125 - https://hackerone.com/reports/778414
|
|
CVE-2020-8126 - https://hackerone.com/reports/197958
|
|
CVE-2020-8127 - https://hackerone.com/reports/691977
|
|
CVE-2020-8128 - https://hackerone.com/reports/660565
|
|
CVE-2020-8129 - https://hackerone.com/reports/660563
|
|
CVE-2020-8130 - https://hackerone.com/reports/651518
|
|
CVE-2020-8131 - https://hackerone.com/reports/730239
|
|
CVE-2020-8132 - https://hackerone.com/reports/781664
|
|
CVE-2020-8133 - https://hackerone.com/reports/661051
|
|
CVE-2020-8134 - https://hackerone.com/reports/793704
|
|
CVE-2020-8134 - https://hackerone.com/reports/815084
|
|
CVE-2020-8135 - https://hackerone.com/reports/786956
|
|
CVE-2020-8136 - https://hackerone.com/reports/804772
|
|
CVE-2020-8137 - https://hackerone.com/reports/772448
|
|
CVE-2020-8138 - https://hackerone.com/reports/736867
|
|
CVE-2020-8139 - https://hackerone.com/reports/788257
|
|
CVE-2020-8140 - https://hackerone.com/reports/633266
|
|
CVE-2020-8141 - https://hackerone.com/reports/390929
|
|
CVE-2020-8142 - https://hackerone.com/reports/792895
|
|
CVE-2020-8143 - https://hackerone.com/reports/794144
|
|
CVE-2020-8144 - https://hackerone.com/reports/330051
|
|
CVE-2020-8145 - https://hackerone.com/reports/329659
|
|
CVE-2020-8146 - https://hackerone.com/reports/530967
|
|
CVE-2020-8147 - https://hackerone.com/reports/801522
|
|
CVE-2020-8148 - https://hackerone.com/reports/802079
|
|
CVE-2020-8149 - https://hackerone.com/reports/825729
|
|
CVE-2020-8150 - https://hackerone.com/reports/742588
|
|
CVE-2020-8151 - https://hackerone.com/reports/800231
|
|
CVE-2020-8151 - https://hackerone.com/reports/803922
|
|
CVE-2020-8152 - http://seclists.org/fulldisclosure/2020/Dec/54
|
|
CVE-2020-8152 - https://hackerone.com/reports/743505
|
|
CVE-2020-8153 - https://hackerone.com/reports/642515
|
|
CVE-2020-8154 - https://hackerone.com/reports/819807
|
|
CVE-2020-8155 - https://hackerone.com/reports/819863
|
|
CVE-2020-8156 - https://hackerone.com/reports/803734
|
|
CVE-2020-8158 - https://hackerone.com/reports/869574
|
|
CVE-2020-8159 - https://hackerone.com/reports/519220
|
|
CVE-2020-8160 - https://hackerone.com/reports/838178
|
|
CVE-2020-8162 - https://hackerone.com/reports/789579
|
|
CVE-2020-8163 - http://packetstormsecurity.com/files/158604/Ruby-On-Rails-5.0.1-Remote-Code-Execution.html
|
|
CVE-2020-8164 - https://hackerone.com/reports/292797
|
|
CVE-2020-8165 - https://hackerone.com/reports/413388
|
|
CVE-2020-8166 - https://hackerone.com/reports/732415
|
|
CVE-2020-8167 - https://hackerone.com/reports/189878
|
|
CVE-2020-8168 - https://hackerone.com/reports/323852
|
|
CVE-2020-8168 - https://hackerone.com/reports/661647
|
|
CVE-2020-8168 - https://hackerone.com/reports/703659
|
|
CVE-2020-8169 - https://hackerone.com/reports/874778
|
|
CVE-2020-8170 - https://hackerone.com/reports/386570
|
|
CVE-2020-8170 - https://hackerone.com/reports/661647
|
|
CVE-2020-8170 - https://hackerone.com/reports/703659
|
|
CVE-2020-8172 - https://hackerone.com/reports/811502
|
|
CVE-2020-8172 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-8172 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-8172 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-8172 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-8172 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-8173 - https://hackerone.com/reports/852841
|
|
CVE-2020-8174 - https://hackerone.com/reports/784186
|
|
CVE-2020-8174 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-8174 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-8174 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-8174 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-8175 - https://hackerone.com/reports/842462
|
|
CVE-2020-8177 - https://hackerone.com/reports/887462
|
|
CVE-2020-8177 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-8178 - https://hackerone.com/reports/690010
|
|
CVE-2020-8179 - https://hackerone.com/reports/867052
|
|
CVE-2020-8180 - https://hackerone.com/reports/851807
|
|
CVE-2020-8181 - https://hackerone.com/reports/808287
|
|
CVE-2020-8182 - https://hackerone.com/reports/827816
|
|
CVE-2020-8183 - https://hackerone.com/reports/885041
|
|
CVE-2020-8184 - https://hackerone.com/reports/895727
|
|
CVE-2020-8185 - https://hackerone.com/reports/899069
|
|
CVE-2020-8186 - https://hackerone.com/reports/863544
|
|
CVE-2020-8189 - https://hackerone.com/reports/685552
|
|
CVE-2020-8192 - https://hackerone.com/reports/903521
|
|
CVE-2020-8193 - http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html
|
|
CVE-2020-8195 - http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html
|
|
CVE-2020-8196 - http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html
|
|
CVE-2020-8201 - https://hackerone.com/reports/922597
|
|
CVE-2020-8202 - https://hackerone.com/reports/840598
|
|
CVE-2020-8203 - https://hackerone.com/reports/712065
|
|
CVE-2020-8203 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-8203 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-8203 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-8203 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-8203 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-8204 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516
|
|
CVE-2020-8205 - https://hackerone.com/reports/891270
|
|
CVE-2020-8206 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516
|
|
CVE-2020-8214 - https://hackerone.com/reports/355501
|
|
CVE-2020-8215 - https://hackerone.com/reports/315037
|
|
CVE-2020-8216 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516
|
|
CVE-2020-8217 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516
|
|
CVE-2020-8218 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516
|
|
CVE-2020-8218 - https://www.gosecure.net/blog/2020/11/13/forget-your-perimeter-part-2-four-vulnerabilities-in-pulse-connect-secure/
|
|
CVE-2020-8219 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516
|
|
CVE-2020-8220 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516
|
|
CVE-2020-8221 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516
|
|
CVE-2020-8222 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516
|
|
CVE-2020-8223 - https://hackerone.com/reports/889243
|
|
CVE-2020-8224 - https://hackerone.com/reports/622170
|
|
CVE-2020-8225 - https://hackerone.com/reports/685990
|
|
CVE-2020-8227 - https://hackerone.com/reports/590319
|
|
CVE-2020-8228 - https://hackerone.com/reports/922470
|
|
CVE-2020-8229 - https://hackerone.com/reports/588562
|
|
CVE-2020-8230 - https://hackerone.com/reports/380102
|
|
CVE-2020-8231 - https://hackerone.com/reports/948876
|
|
CVE-2020-8231 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-8235 - https://hackerone.com/reports/916704
|
|
CVE-2020-8236 - https://hackerone.com/reports/924393
|
|
CVE-2020-8237 - https://hackerone.com/reports/916430
|
|
CVE-2020-8238 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44588
|
|
CVE-2020-8238 - https://www.gosecure.net/blog/2020/11/13/forget-your-perimeter-part-2-four-vulnerabilities-in-pulse-connect-secure/
|
|
CVE-2020-8239 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
|
|
CVE-2020-8240 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
|
|
CVE-2020-8241 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
|
|
CVE-2020-8244 - https://hackerone.com/reports/966347
|
|
CVE-2020-8248 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
|
|
CVE-2020-8249 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
|
|
CVE-2020-8250 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
|
|
CVE-2020-8251 - https://hackerone.com/reports/868834
|
|
CVE-2020-8252 - https://hackerone.com/reports/965914
|
|
CVE-2020-8254 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
|
|
CVE-2020-8255 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
|
|
CVE-2020-8256 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44588
|
|
CVE-2020-8256 - https://www.gosecure.net/blog/2020/11/13/forget-your-perimeter-part-2-four-vulnerabilities-in-pulse-connect-secure/
|
|
CVE-2020-8259 - https://hackerone.com/reports/732431
|
|
CVE-2020-8260 - http://packetstormsecurity.com/files/160619/Pulse-Secure-VPN-Remote-Code-Execution.html
|
|
CVE-2020-8260 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
|
|
CVE-2020-8261 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
|
|
CVE-2020-8262 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
|
|
CVE-2020-8263 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
|
|
CVE-2020-8265 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-8268 - https://hackerone.com/reports/980649
|
|
CVE-2020-8276 - https://hackerone.com/reports/1024668
|
|
CVE-2020-8277 - https://hackerone.com/reports/1033107
|
|
CVE-2020-8277 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-8277 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-8277 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-8277 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-8277 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-8278 - https://hackerone.com/reports/921717
|
|
CVE-2020-8279 - https://hackerone.com/reports/915585
|
|
CVE-2020-8284 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-8284 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-8284 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-8284 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-8285 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-8285 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-8285 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-8285 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-8286 - https://hackerone.com/reports/1048457
|
|
CVE-2020-8286 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-8286 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-8286 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-8287 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-8289 - https://github.com/geffner/CVE-2020-8289/blob/master/README.md
|
|
CVE-2020-8289 - https://youtu.be/W0THXbcX5V8
|
|
CVE-2020-8290 - https://github.com/geffner/CVE-2020-8290/blob/master/README.md
|
|
CVE-2020-8290 - https://youtu.be/OpC6neWd2aM
|
|
CVE-2020-8298 - https://github.com/pillys/fs-path/pull/6
|
|
CVE-2020-8416 - http://packetstormsecurity.com/files/156170/BearFTP-0.1.0-Denial-Of-Service.html
|
|
CVE-2020-8416 - https://pastebin.com/wqNWnCuN
|
|
CVE-2020-8417 - https://wpvulndb.com/vulnerabilities/10050
|
|
CVE-2020-8423 - https://ktln2.org/2020/03/29/exploiting-mips-router/
|
|
CVE-2020-8424 - http://packetstormsecurity.com/files/156140/Cups-Easy-1.0-Cross-Site-Request-Forgery.html
|
|
CVE-2020-8424 - https://github.com/J3rryBl4nks/CUPSEasyExploits
|
|
CVE-2020-8425 - http://packetstormsecurity.com/files/156140/Cups-Easy-1.0-Cross-Site-Request-Forgery.html
|
|
CVE-2020-8425 - https://github.com/J3rryBl4nks/CUPSEasyExploits
|
|
CVE-2020-8426 - https://wpvulndb.com/vulnerabilities/10051
|
|
CVE-2020-8428 - http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html
|
|
CVE-2020-8434 - https://medium.com/@mdavis332/higher-ed-erp-portal-vulnerability-auth-bypass-to-login-any-account-f1aeef438f80
|
|
CVE-2020-8439 - http://uploadboy.me/cn40ne6p89t6/POC.mp4.html
|
|
CVE-2020-8440 - https://github.com/niteosoft/simplejobscript/issues/10
|
|
CVE-2020-8461 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/
|
|
CVE-2020-8462 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/
|
|
CVE-2020-8463 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/
|
|
CVE-2020-8464 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/
|
|
CVE-2020-8465 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/
|
|
CVE-2020-8466 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/
|
|
CVE-2020-8492 - https://github.com/python/cpython/pull/18284
|
|
CVE-2020-8493 - http://packetstormsecurity.com/files/156215/Kronos-WebTA-4.0-Privilege-Escalation-Cross-Site-Scripting.html
|
|
CVE-2020-8495 - http://packetstormsecurity.com/files/156215/Kronos-WebTA-4.0-Privilege-Escalation-Cross-Site-Scripting.html
|
|
CVE-2020-8498 - https://wpvulndb.com/vulnerabilities/10053
|
|
CVE-2020-8504 - https://github.com/J3rryBl4nks/SchoolERPCSRF
|
|
CVE-2020-8505 - https://github.com/J3rryBl4nks/SchoolERPCSRF
|
|
CVE-2020-8506 - http://packetstormsecurity.com/files/156425/Global-TV-Unencrypted-Analytics.html
|
|
CVE-2020-8507 - http://packetstormsecurity.com/files/156426/Citytv-Video-Unencrypted-Analytics.html
|
|
CVE-2020-8512 - http://packetstormsecurity.com/files/156103/IceWarp-WebMail-11.4.4.1-Cross-Site-Scripting.html
|
|
CVE-2020-8512 - https://cxsecurity.com/issue/WLB-2020010205
|
|
CVE-2020-8512 - https://packetstormsecurity.com/files/156103/IceWarp-WebMail-11.4.4.1-Cross-Site-Scripting.html
|
|
CVE-2020-8515 - http://packetstormsecurity.com/files/156979/DrayTek-Vigor2960-Vigor3900-Vigor300B-Remote-Command-Execution.html
|
|
CVE-2020-8515 - https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html
|
|
CVE-2020-8518 - http://packetstormsecurity.com/files/156872/Horde-5.2.22-CSV-Import-Code-Execution.html
|
|
CVE-2020-8541 - https://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html
|
|
CVE-2020-8542 - http://packetstormsecurity.com/files/158932/OX-App-Suite-OX-Documents-XSS-SSRF-Bypass.html
|
|
CVE-2020-8542 - http://seclists.org/fulldisclosure/2020/Aug/14
|
|
CVE-2020-8542 - https://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html
|
|
CVE-2020-8543 - https://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html
|
|
CVE-2020-8544 - https://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html
|
|
CVE-2020-8547 - https://www.exploit-db.com/exploits/47989
|
|
CVE-2020-8549 - http://packetstormsecurity.com/files/156369/WordPress-Strong-Testimonials-2.40.1-Cross-Site-Scripting.html
|
|
CVE-2020-8549 - https://wpvulndb.com/vulnerabilities/10056
|
|
CVE-2020-8551 - https://hackerone.com/reports/774896
|
|
CVE-2020-8553 - https://hackerone.com/reports/778803
|
|
CVE-2020-8554 - https://github.com/kubernetes/kubernetes/issues/97076
|
|
CVE-2020-8554 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-8554 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-8554 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-8555 - https://hackerone.com/reports/776017
|
|
CVE-2020-8557 - https://hackerone.com/reports/867699
|
|
CVE-2020-8559 - https://github.com/kubernetes/kubernetes/issues/92914
|
|
CVE-2020-8559 - https://hackerone.com/reports/863979
|
|
CVE-2020-8563 - https://hackerone.com/reports/966383
|
|
CVE-2020-8565 - https://hackerone.com/reports/952771
|
|
CVE-2020-8568 - https://github.com/kubernetes-sigs/secrets-store-csi-driver/issues/378
|
|
CVE-2020-8569 - https://hackerone.com/reports/1032086
|
|
CVE-2020-8594 - https://wpvulndb.com/vulnerabilities/10070
|
|
CVE-2020-8595 - https://github.com/istio/istio/commits/master
|
|
CVE-2020-8596 - https://blog.impenetrable.tech/cve-2020-8596
|
|
CVE-2020-8596 - https://wpvulndb.com/vulnerabilities/10068
|
|
CVE-2020-8597 - http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html
|
|
CVE-2020-8597 - http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html
|
|
CVE-2020-8597 - https://www.kb.cert.org/vuls/id/782301
|
|
CVE-2020-8604 - http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html
|
|
CVE-2020-8604 - http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html
|
|
CVE-2020-8605 - http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html
|
|
CVE-2020-8605 - http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html
|
|
CVE-2020-8606 - http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html
|
|
CVE-2020-8606 - http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html
|
|
CVE-2020-8615 - http://packetstormsecurity.com/files/156585/WordPress-Tutor-LMS-1.5.3-Cross-Site-Request-Forgery.html
|
|
CVE-2020-8615 - https://wpvulndb.com/vulnerabilities/10058
|
|
CVE-2020-8617 - http://packetstormsecurity.com/files/157836/BIND-TSIG-Denial-Of-Service.html
|
|
CVE-2020-8622 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-8631 - https://github.com/canonical/cloud-init/pull/204
|
|
CVE-2020-8636 - https://medium.com/@ph0rensic/three-cves-on-opmon-3ca775a262f5
|
|
CVE-2020-8639 - http://packetstormsecurity.com/files/161401/TestLink-1.9.20-Shell-Upload.html
|
|
CVE-2020-8641 - https://www.exploit-db.com/exploits/47985
|
|
CVE-2020-8644 - http://packetstormsecurity.com/files/157106/PlaySMS-index.php-Unauthenticated-Template-Injection-Code-Execution.html
|
|
CVE-2020-8644 - https://research.nccgroup.com/2020/02/11/technical-advisory-playsms-pre-authentication-remote-code-execution-cve-2020-8644/
|
|
CVE-2020-8645 - https://github.com/niteosoft/simplejobscript/issues/9
|
|
CVE-2020-8648 - https://usn.ubuntu.com/4342-1/
|
|
CVE-2020-8654 - http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html
|
|
CVE-2020-8654 - http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html
|
|
CVE-2020-8655 - http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html
|
|
CVE-2020-8655 - http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html
|
|
CVE-2020-8656 - http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html
|
|
CVE-2020-8656 - http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html
|
|
CVE-2020-8657 - http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html
|
|
CVE-2020-8658 - https://github.com/V1n1v131r4/Exploiting-WP-Htaccess-by-BestWebSoft-Plugin/blob/master/README.md
|
|
CVE-2020-8658 - https://wpvulndb.com/vulnerabilities/10060
|
|
CVE-2020-8674 - https://support.lenovo.com/de/en/product_security/len-30041
|
|
CVE-2020-8674 - https://www.kb.cert.org/vuls/id/257161
|
|
CVE-2020-8679 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html
|
|
CVE-2020-8680 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html
|
|
CVE-2020-8681 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html
|
|
CVE-2020-8682 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html
|
|
CVE-2020-8683 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html
|
|
CVE-2020-8771 - https://wpvulndb.com/vulnerabilities/10010
|
|
CVE-2020-8772 - https://wpvulndb.com/vulnerabilities/10011
|
|
CVE-2020-8776 - http://packetstormsecurity.com/files/156599/Alfresco-5.2.4-Cross-Site-Scripting.html
|
|
CVE-2020-8777 - http://packetstormsecurity.com/files/156599/Alfresco-5.2.4-Cross-Site-Scripting.html
|
|
CVE-2020-8778 - http://packetstormsecurity.com/files/156599/Alfresco-5.2.4-Cross-Site-Scripting.html
|
|
CVE-2020-8789 - http://packetstormsecurity.com/files/157787/Composr-CMS-10.0.30-Cross-Site-Scripting.html
|
|
CVE-2020-8789 - http://seclists.org/fulldisclosure/2020/May/39
|
|
CVE-2020-8793 - http://seclists.org/fulldisclosure/2020/Feb/28
|
|
CVE-2020-8793 - http://www.openwall.com/lists/oss-security/2020/02/24/4
|
|
CVE-2020-8794 - http://packetstormsecurity.com/files/156633/OpenSMTPD-Out-Of-Bounds-Read-Local-Privilege-Escalation.html
|
|
CVE-2020-8794 - http://www.openwall.com/lists/oss-security/2021/05/04/7
|
|
CVE-2020-8799 - https://wpvulndb.com/vulnerabilities/10210
|
|
CVE-2020-8800 - http://packetstormsecurity.com/files/156321/SuiteCRM-7.11.11-Second-Order-PHP-Object-Injection.html
|
|
CVE-2020-8801 - http://packetstormsecurity.com/files/156324/SuiteCRM-7.11.11-Phar-Deserialization.html
|
|
CVE-2020-8802 - http://packetstormsecurity.com/files/156327/SuiteCRM-7.11.11-Bean-Manipulation.html
|
|
CVE-2020-8803 - http://packetstormsecurity.com/files/156329/SuiteCRM-7.11.11-Broken-Access-Control-Local-File-Inclusion.html
|
|
CVE-2020-8804 - http://packetstormsecurity.com/files/156331/SuiteCRM-7.11.10-SQL-Injection.html
|
|
CVE-2020-8808 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-001.md
|
|
CVE-2020-8812 - https://github.com/bludit/bludit/issues/1132
|
|
CVE-2020-8813 - http://packetstormsecurity.com/files/156537/Cacti-1.2.8-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2020-8813 - http://packetstormsecurity.com/files/156538/Cacti-1.2.8-Authenticated-Remote-Code-Execution.html
|
|
CVE-2020-8813 - http://packetstormsecurity.com/files/156593/Cacti-1.2.8-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2020-8813 - http://packetstormsecurity.com/files/157477/Open-AudIT-Professional-3.3.1-Remote-Code-Execution.html
|
|
CVE-2020-8813 - https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/
|
|
CVE-2020-8816 - http://packetstormsecurity.com/files/157861/Pi-Hole-4.3.2-DHCP-MAC-OS-Command-Execution.html
|
|
CVE-2020-8816 - http://packetstormsecurity.com/files/158737/Pi-hole-4.3.2-Remote-Code-Execution.html
|
|
CVE-2020-8818 - http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html
|
|
CVE-2020-8818 - https://github.com/cardgate/magento2/issues/54
|
|
CVE-2020-8819 - http://packetstormsecurity.com/files/156504/WordPress-WooCommerce-CardGate-Payment-Gateway-3.1.15-Bypass.html
|
|
CVE-2020-8819 - https://github.com/cardgate/woocommerce/blob/f2111af7b1a3fd701c1c5916137f3ac09482feeb/cardgate/cardgate.php#L426-L442
|
|
CVE-2020-8819 - https://github.com/cardgate/woocommerce/issues/18
|
|
CVE-2020-8819 - https://wpvulndb.com/vulnerabilities/10097
|
|
CVE-2020-8819 - https://www.exploit-db.com/exploits/48134
|
|
CVE-2020-8822 - https://sku11army.blogspot.com/2020/02/digi-transport-stored-xss-on-wr-family.html
|
|
CVE-2020-8823 - https://snyk.io/vuln/SNYK-JS-SOCKJS-548397
|
|
CVE-2020-8824 - https://gist.github.com/9thplayer/df042fe48c314dbc1afad80ffed8387d
|
|
CVE-2020-8825 - http://packetstormsecurity.com/files/156281/Vanilla-Forum-2.6.3-Cross-Site-Scripting.html
|
|
CVE-2020-8825 - https://github.com/hacky1997/CVE-2020-8825
|
|
CVE-2020-8826 - https://www.soluble.ai/blog/argo-cves-2020
|
|
CVE-2020-8827 - https://www.soluble.ai/blog/argo-cves-2020
|
|
CVE-2020-8828 - https://www.soluble.ai/blog/argo-cves-2020
|
|
CVE-2020-8832 - https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1862840
|
|
CVE-2020-8833 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1862933
|
|
CVE-2020-8835 - http://www.openwall.com/lists/oss-security/2021/07/20/1
|
|
CVE-2020-8835 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2d67fec0b43edce8c416101cdc52e71145b5fef
|
|
CVE-2020-8838 - http://packetstormsecurity.com/files/157612/ManageEngine-Asset-Explorer-Windows-Agent-Remote-Code-Execution.html
|
|
CVE-2020-8838 - http://seclists.org/fulldisclosure/2020/May/29
|
|
CVE-2020-8839 - http://packetstormsecurity.com/files/156289/CHIYU-BF430-TCP-IP-Converter-Cross-Site-Scripting.html
|
|
CVE-2020-8839 - https://drive.google.com/open?id=1eDN0rsGPs4-yxeMxl7MGh__yjdbl-wON
|
|
CVE-2020-8840 - https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
CVE-2020-8840 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-8843 - https://github.com/istio/istio/commits/master
|
|
CVE-2020-8860 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-8867 - https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-8867.pdf
|
|
CVE-2020-8887 - https://github.com/google/security-research/security/advisories/GHSA-g69r-8jwh-2462
|
|
CVE-2020-8893 - https://zigrin.com/advisories/misp-bruteforce-protection-not-working-in-very-specific-environments/
|
|
CVE-2020-8893 - https://zigrin.com/advisories/misp-reflected-xss-in-galaxy-view/
|
|
CVE-2020-8899 - http://packetstormsecurity.com/files/157620/Samsung-Android-Remote-Code-Execution.html
|
|
CVE-2020-8899 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2020-8899 - https://www.kb.cert.org/vuls/id/366027
|
|
CVE-2020-8903 - https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020
|
|
CVE-2020-8907 - https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020
|
|
CVE-2020-8908 - https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415
|
|
CVE-2020-8908 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-8908 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-8908 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-8908 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-8908 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-8911 - https://github.com/google/security-research/security/advisories/GHSA-f5pg-7wfw-84q9
|
|
CVE-2020-8912 - https://github.com/google/security-research/security/advisories/GHSA-7f33-f4f5-xwgw
|
|
CVE-2020-8913 - https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/
|
|
CVE-2020-8916 - https://github.com/openthread/wpantund/pull/468/commits/0e5d1601febb869f583e944785e5685c6c747be7
|
|
CVE-2020-8933 - https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020
|
|
CVE-2020-8946 - https://sku11army.blogspot.com/2020/02/netis-authenticated-rce-on-wf2471.html
|
|
CVE-2020-8947 - http://packetstormsecurity.com/files/156326/Pandora-FMS-7.0-Authenticated-Remote-Code-Execution.html
|
|
CVE-2020-8948 - https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---swi-psa-2020-002-cve-2020-8948/#sthash.ByZB8ifG.dpbs
|
|
CVE-2020-8950 - https://heynowyouseeme.blogspot.com/2020/02/another-privilege-escalation-filewrite.html
|
|
CVE-2020-8950 - https://heynowyouseeme.blogspot.com/2020/02/privilege-escalation-filewrite-eop-in.html
|
|
CVE-2020-8956 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
|
|
CVE-2020-8958 - https://github.com/qurbat/gpon
|
|
CVE-2020-8958 - https://www.karansaini.com/os-command-injection-v-sol/
|
|
CVE-2020-8959 - https://www.westerndigital.com/support/productsecurity/wdc-20001-ssd-dashboard-setup-privilege-escalation
|
|
CVE-2020-8960 - https://www.westerndigital.com/support/productsecurity/wdc-20003-mycloud-site-version-2-2-0-134
|
|
CVE-2020-8960 - https://www.westerndigital.com/support/productsecurity/wdc-20003-mycloud-xss-vulnerability
|
|
CVE-2020-8963 - https://sku11army.blogspot.com/2020/02/timetools-sr-sc-series-network-time.html
|
|
CVE-2020-8964 - https://sku11army.blogspot.com/2020/02/timetools-sr-sc-series-network-time.html
|
|
CVE-2020-8990 - https://www.westerndigital.com/support/productsecurity/wdc-19013-my-cloud-home-and-ibi-session-invalidation-vulnerability
|
|
CVE-2020-8992 - https://usn.ubuntu.com/4342-1/
|
|
CVE-2020-8992 - https://usn.ubuntu.com/4419-1/
|
|
CVE-2020-8994 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-8994.md
|
|
CVE-2020-8994 - https://youtu.be/yCadG38yZW8
|
|
CVE-2020-8995 - http://seclists.org/fulldisclosure/2020/Dec/38
|
|
CVE-2020-8995 - https://packetstormsecurity.com/files/160626/Programi-Bilanc-Build-007-Release-014-31.01.2020-Hardcoded-Credentials.html
|
|
CVE-2020-9000 - https://websec.nl/blog/
|
|
CVE-2020-9000 - https://websec.nl/blog/6127847280e759c7d31286d0/cve%20report%20august%202021/
|
|
CVE-2020-9002 - https://websec.nl/blog/
|
|
CVE-2020-9002 - https://websec.nl/blog/6127847280e759c7d31286d0/cve%20report%20august%202021/
|
|
CVE-2020-9003 - https://wpvulndb.com/vulnerabilities/10077
|
|
CVE-2020-9006 - https://wpvulndb.com/vulnerabilities/10073
|
|
CVE-2020-9006 - https://zeroauth.ltd/blog/2020/02/16/cve-2020-9006-popup-builder-wp-plugin-sql-injection-via-php-deserialization/
|
|
CVE-2020-9013 - https://www.exploit-db.com/docs/48175
|
|
CVE-2020-9014 - https://github.com/FULLSHADE/Kernel-exploits
|
|
CVE-2020-9014 - https://github.com/FULLSHADE/Kernel-exploits/tree/master/EMP_NSAU.sys
|
|
CVE-2020-9015 - http://packetstormsecurity.com/files/158119/Arista-Restricted-Shell-Escape-Privilege-Escalation.html
|
|
CVE-2020-9015 - https://securitybytes.me
|
|
CVE-2020-9015 - https://securitybytes.me/posts/cve-2020-9015/
|
|
CVE-2020-9016 - https://code610.blogspot.com/2020/02/this-time-i-tried-to-check-one-of.html
|
|
CVE-2020-9019 - https://wpvulndb.com/vulnerabilities/10113
|
|
CVE-2020-9021 - https://sku11army.blogspot.com/2020/01/post-oak-traffic-systems-awam-bluetooth.html
|
|
CVE-2020-9023 - https://sku11army.blogspot.com/2020/01/iteris-vantage-velocity-field-unit-no.html
|
|
CVE-2020-9026 - https://sku11army.blogspot.com/2020/01/eltex-devices-ntp-rg-1402g-ntp-2-os.html
|
|
CVE-2020-9027 - https://sku11army.blogspot.com/2020/01/eltex-devices-ntp-rg-1402g-ntp-2-os.html
|
|
CVE-2020-9029 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html
|
|
CVE-2020-9030 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html
|
|
CVE-2020-9031 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html
|
|
CVE-2020-9032 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html
|
|
CVE-2020-9033 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html
|
|
CVE-2020-9036 - https://sysdream.com/news/lab/2020-08-05-cve-2020-9036-jeedom-xss-leading-to-remote-code-execution/
|
|
CVE-2020-9038 - http://packetstormsecurity.com/files/156582/Joplin-Desktop-1.0.184-Cross-Site-Scripting.html
|
|
CVE-2020-9038 - https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc
|
|
CVE-2020-9038 - https://github.com/laurent22/joplin/compare/clipper-1.0.19...clipper-1.0.20
|
|
CVE-2020-9043 - https://wpvulndb.com/vulnerabilities/10074
|
|
CVE-2020-9054 - https://kb.cert.org/artifacts/cve-2020-9054.html
|
|
CVE-2020-9054 - https://kb.cert.org/vuls/id/498544/
|
|
CVE-2020-9054 - https://krebsonsecurity.com/2020/02/zyxel-fixes-0day-in-network-storage-devices/
|
|
CVE-2020-9055 - https://kb.cert.org/vuls/id/962085/
|
|
CVE-2020-9056 - https://kb.cert.org/vuls/id/660597/
|
|
CVE-2020-9057 - https://github.com/CNK2100/VFuzz-public
|
|
CVE-2020-9058 - https://github.com/CNK2100/VFuzz-public
|
|
CVE-2020-9059 - https://github.com/CNK2100/VFuzz-public
|
|
CVE-2020-9060 - https://github.com/CNK2100/VFuzz-public
|
|
CVE-2020-9061 - https://github.com/CNK2100/VFuzz-public
|
|
CVE-2020-9264 - https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html
|
|
CVE-2020-9265 - https://github.com/J3rryBl4nks/PHPMyChatPlus/blob/master/SQLi.md
|
|
CVE-2020-9266 - https://github.com/J3rryBl4nks/SOPlanning/blob/master/AdminPasswordChangeCSRF.md
|
|
CVE-2020-9267 - https://github.com/J3rryBl4nks/SOPlanning/blob/master/AddUserCSRF.md
|
|
CVE-2020-9269 - https://github.com/J3rryBl4nks/SOPlanning/blob/master/InjectionIcalShell.md
|
|
CVE-2020-9270 - https://github.com/J3rryBl4nks/IceHRM/blob/master/ChangeUserPasswordCSRF.md
|
|
CVE-2020-9271 - https://github.com/J3rryBl4nks/IceHRM/blob/master/AddNewUserCSRF.md
|
|
CVE-2020-9273 - https://github.com/proftpd/proftpd/issues/903
|
|
CVE-2020-9275 - https://raelize.com/advisories/CVE-2020-9275_D-Link-DSL-2640B_Remote-Credentials-Exfiltration_v1.0.txt
|
|
CVE-2020-9277 - https://raelize.com/advisories/CVE-2020-9277_D-Link-DSL-2640B_CGI-Authentication-bypass_v1.0.txt
|
|
CVE-2020-9281 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-9281 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-9281 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-9281 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-9281 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-9283 - http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html
|
|
CVE-2020-9287 - https://fortiguard.com/psirt/FG-IR-19-060
|
|
CVE-2020-9288 - https://fortiguard.com/advisory/FG-IR-20-016
|
|
CVE-2020-9290 - https://fortiguard.com/psirt/FG-IR-19-060
|
|
CVE-2020-9291 - https://fortiguard.com/psirt/FG-IR-20-040
|
|
CVE-2020-9292 - https://fortiguard.com/advisory/FG-IR-20-021
|
|
CVE-2020-9306 - https://www.fireeye.com/blog/threat-research/2021/02/solarcity-exploitation-of-x2e-iot-device-part-two.html
|
|
CVE-2020-9314 - https://www.oracle.com/us/assets/lifetime-support-middleware-069163.pdf
|
|
CVE-2020-9315 - https://www.oracle.com/us/assets/lifetime-support-middleware-069163.pdf
|
|
CVE-2020-9320 - http://packetstormsecurity.com/files/156472/AVIRA-Generic-Malformed-Container-Bypass.html
|
|
CVE-2020-9320 - http://seclists.org/fulldisclosure/2020/Feb/31
|
|
CVE-2020-9320 - https://blog.zoller.lu/p/from-low-hanging-fruit-department-avira.html
|
|
CVE-2020-9327 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-9327 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-9327 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-9327 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-9327 - https://www.sqlite.org/cgi/src/info/4374860b29383380
|
|
CVE-2020-9329 - https://github.com/gogs/gogs/issues/5926
|
|
CVE-2020-9331 - https://www.youtube.com/watch?v=b5vPDmMtzwQ
|
|
CVE-2020-9332 - https://labs.sentinelone.com/click-from-the-backyard-cve-2020-9332/
|
|
CVE-2020-9334 - https://wpvulndb.com/vulnerabilities/10089
|
|
CVE-2020-9335 - https://wpvulndb.com/vulnerabilities/10088
|
|
CVE-2020-9339 - https://github.com/0xEmma/CVEs/blob/master/CVEs/2020-02-14-SoPlanning-Status-XSS.md
|
|
CVE-2020-9341 - https://github.com/J3rryBl4nks/CandidATS/blob/master/AddAdminUserCSRF.md
|
|
CVE-2020-9342 - http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html
|
|
CVE-2020-9342 - https://blog.zoller.lu/p/tzo-16-2020-f-secure-generic-malformed.html
|
|
CVE-2020-9343 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-053.txt
|
|
CVE-2020-9344 - https://kintosoft.atlassian.net/wiki/spaces/SVNALM/pages/753565697/Security+Bulletin
|
|
CVE-2020-9344 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-007.txt
|
|
CVE-2020-9345 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-052.txt
|
|
CVE-2020-9361 - https://www.youtube.com/watch?v=b5vPDmMtzwQ
|
|
CVE-2020-9362 - http://packetstormsecurity.com/files/156580/QuickHeal-Generic-Malformed-Archive-Bypass.html
|
|
CVE-2020-9362 - https://blog.zoller.lu/p/from-low-hanging-fruit-department_24.html
|
|
CVE-2020-9362 - https://blog.zoller.lu/p/tzo-20-2020-quickheal-malformed-archive.html
|
|
CVE-2020-9363 - https://blog.zoller.lu/p/release-mode-coordinated-disclosure-ref.html
|
|
CVE-2020-9363 - https://community.sophos.com/b/security-blog/posts/sophos-comments-to-cve-2020-9363
|
|
CVE-2020-9364 - http://packetstormsecurity.com/files/156655/Creative-Contact-Form-4.6.2-Directory-Traversal.html
|
|
CVE-2020-9368 - https://www.intrinsec.com/publications/
|
|
CVE-2020-9370 - https://medium.com/@rsantos_14778/hijacked-session-cve-2020-9370-255bbd02975a
|
|
CVE-2020-9371 - http://packetstormsecurity.com/files/156694/WordPress-Appointment-Booking-Calendar-1.3.34-CSV-Injection.html
|
|
CVE-2020-9371 - https://drive.google.com/open?id=1NNcYPaJir9SleyVr4cSPqpI2LNM7rtx9
|
|
CVE-2020-9371 - https://wpvulndb.com/vulnerabilities/10110
|
|
CVE-2020-9372 - http://packetstormsecurity.com/files/156694/WordPress-Appointment-Booking-Calendar-1.3.34-CSV-Injection.html
|
|
CVE-2020-9372 - https://drive.google.com/open?id=1NNcYPaJir9SleyVr4cSPqpI2LNM7rtx9
|
|
CVE-2020-9374 - http://packetstormsecurity.com/files/156584/TP-Link-TL-WR849N-Remote-Code-Execution.html
|
|
CVE-2020-9374 - https://fireshellsecurity.team/hack-n-routers/
|
|
CVE-2020-9374 - https://github.com/ElberTavares/routers-exploit/tree/master/tp-link
|
|
CVE-2020-9375 - http://packetstormsecurity.com/files/156928/TP-Link-Archer-C50-V3-Denial-of-Service.html
|
|
CVE-2020-9375 - https://thewhiteh4t.github.io/2020/02/27/CVE-2020-9375-TP-Link-Archer-C50-v3-Denial-of-Service.html
|
|
CVE-2020-9376 - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10182
|
|
CVE-2020-9377 - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10182
|
|
CVE-2020-9380 - https://github.com/migueltarga/CVE-2020-9380
|
|
CVE-2020-9383 - https://usn.ubuntu.com/4342-1/
|
|
CVE-2020-9384 - http://packetstormsecurity.com/files/157197/Subex-ROC-Partner-Settlement-10.5-Insecure-Direct-Object-Reference.html
|
|
CVE-2020-9385 - https://sourceforge.net/p/zint/tickets/181/
|
|
CVE-2020-9388 - https://support.squaredup.com/hc/en-us/articles/360017568238
|
|
CVE-2020-9388 - https://support.squaredup.com/hc/en-us/articles/360019427218-CVE-2020-9388-API-Endpoints-are-not-protected-against-CSRF
|
|
CVE-2020-9389 - https://support.squaredup.com/hc/en-us/articles/360017255858
|
|
CVE-2020-9389 - https://support.squaredup.com/hc/en-us/articles/360019427238-CVE-2020-9389-Username-enumeration-possible-via-a-timing-attack
|
|
CVE-2020-9390 - https://support.squaredup.com/hc/en-us/articles/360017568258
|
|
CVE-2020-9390 - https://support.squaredup.com/hc/en-us/articles/360019427258-CVE-2020-9390-Stored-cross-site-scripting
|
|
CVE-2020-9391 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dcde237319e626d1ec3c9d8b7613032f0fd4663a
|
|
CVE-2020-9392 - https://www.wordfence.com/blog/2020/02/multiple-vulnerabilities-patched-in-pricing-table-by-supsystic-plugin/
|
|
CVE-2020-9399 - https://blog.zoller.lu/p/tzo-23-2020-avast-generic-archive.html
|
|
CVE-2020-9409 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-9410 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-9423 - https://www.coresecurity.com/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities
|
|
CVE-2020-9426 - http://packetstormsecurity.com/files/158069/OX-Guard-2.10.3-Cross-Site-Scripting-Server-Side-Request-Forgery.html
|
|
CVE-2020-9427 - http://packetstormsecurity.com/files/158069/OX-Guard-2.10.3-Cross-Site-Scripting-Server-Side-Request-Forgery.html
|
|
CVE-2020-9435 - http://packetstormsecurity.com/files/156729/Phoenix-Contact-TC-Router-TC-Cloud-Client-Command-Injection.html
|
|
CVE-2020-9435 - http://seclists.org/fulldisclosure/2020/Mar/15
|
|
CVE-2020-9435 - https://cert.vde.com/en-us/advisories/
|
|
CVE-2020-9435 - https://cert.vde.com/en-us/advisories/vde-2020-003
|
|
CVE-2020-9436 - http://packetstormsecurity.com/files/156729/Phoenix-Contact-TC-Router-TC-Cloud-Client-Command-Injection.html
|
|
CVE-2020-9436 - http://seclists.org/fulldisclosure/2020/Mar/15
|
|
CVE-2020-9436 - https://cert.vde.com/en-us/advisories/
|
|
CVE-2020-9436 - https://cert.vde.com/en-us/advisories/vde-2020-003
|
|
CVE-2020-9437 - https://know.bishopfox.com/advisories
|
|
CVE-2020-9437 - https://labs.bishopfox.com/advisories/secureauth-version-9.3
|
|
CVE-2020-9438 - https://medium.com/@avishek_75733/smart-products-are-always-not-that-smart-tinxy-smart-door-lock-vulnerability-97f91e435e06
|
|
CVE-2020-9447 - https://www.coresecurity.com/advisories/gwtupload-xss-file-upload-functionality
|
|
CVE-2020-9450 - https://www.acronis.com
|
|
CVE-2020-9451 - https://www.acronis.com
|
|
CVE-2020-9452 - https://www.acronis.com
|
|
CVE-2020-9453 - https://github.com/FULLSHADE/Kernel-exploits
|
|
CVE-2020-9453 - https://github.com/FULLSHADE/Kernel-exploits/tree/master/EMP_MPAU.sys
|
|
CVE-2020-9454 - https://wpvulndb.com/vulnerabilities/10116
|
|
CVE-2020-9455 - https://wpvulndb.com/vulnerabilities/10116
|
|
CVE-2020-9456 - https://wpvulndb.com/vulnerabilities/10116
|
|
CVE-2020-9457 - https://wpvulndb.com/vulnerabilities/10116
|
|
CVE-2020-9458 - https://wpvulndb.com/vulnerabilities/10116
|
|
CVE-2020-9459 - https://wpvulndb.com/vulnerabilities/10100
|
|
CVE-2020-9461 - https://guilhermerubert.com/blog/cve-2020-9460/
|
|
CVE-2020-9463 - https://code610.blogspot.com/2020/02/postauth-rce-in-centreon-1910.html
|
|
CVE-2020-9464 - https://cert.vde.com/en-us/advisories/vde-2020-005
|
|
CVE-2020-9466 - https://wpvulndb.com/vulnerabilities/10094
|
|
CVE-2020-9467 - http://packetstormsecurity.com/files/159191/Piwigo-2.10.1-Cross-Site-Scripting.html
|
|
CVE-2020-9476 - https://medium.com/@rsantos_14778/info-disclosure-cve-2020-9476-494a08298c6b
|
|
CVE-2020-9477 - https://medium.com/@rsantos_14778/info-disclosure-cve-2020-9477-29d0ca48d4fa
|
|
CVE-2020-9480 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-9484 - http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html
|
|
CVE-2020-9484 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332
|
|
CVE-2020-9484 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-9484 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-9484 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-9484 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2020-9484 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-9484 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-9484 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-9484 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-9488 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-9488 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2020-9488 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-9488 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-9488 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-9488 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-9489 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2020-9489 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2020-9489 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-9490 - http://packetstormsecurity.com/files/160392/Apache-2.4.43-mod_http2-Memory-Corruption.html
|
|
CVE-2020-9490 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-9490 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-9492 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2020-9496 - http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html
|
|
CVE-2020-9496 - http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html
|
|
CVE-2020-9496 - http://packetstormsecurity.com/files/163730/Apache-OfBiz-17.12.01-Remote-Command-Execution.html
|
|
CVE-2020-9497 - https://research.checkpoint.com/2020/apache-guacamole-rce/
|
|
CVE-2020-9498 - https://research.checkpoint.com/2020/apache-guacamole-rce/
|
|
CVE-2020-9520 - http://seclists.org/fulldisclosure/2020/Mar/50
|
|
CVE-2020-9546 - https://github.com/FasterXML/jackson-databind/issues/2631
|
|
CVE-2020-9546 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-9546 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-9546 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-9546 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-9546 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-9547 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-9547 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-9547 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-9547 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-9547 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-9548 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
|
CVE-2020-9548 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2020-9548 - https://www.oracle.com/security-alerts/cpujul2020.html
|
|
CVE-2020-9548 - https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
CVE-2020-9548 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2020-9549 - https://github.com/enferex/pdfresurrect/issues/8
|
|
CVE-2020-9756 - https://www.coresecurity.com/advisories/viper-rgb-driver-multiple-vulnerabilities
|
|
CVE-2020-9876 - http://seclists.org/fulldisclosure/2020/Nov/19
|
|
CVE-2020-9906 - http://packetstormsecurity.com/files/162119/iOS-macOS-Radio-Proximity-Kernel-Memory-Corruption.html
|
|
CVE-2020-9948 - http://seclists.org/fulldisclosure/2020/Nov/18
|
|
CVE-2020-9951 - http://seclists.org/fulldisclosure/2020/Nov/18
|
|
CVE-2020-9951 - http://seclists.org/fulldisclosure/2020/Nov/19
|
|
CVE-2020-9952 - http://seclists.org/fulldisclosure/2020/Nov/18
|
|
CVE-2020-9952 - http://seclists.org/fulldisclosure/2020/Nov/19
|
|
CVE-2020-9961 - http://seclists.org/fulldisclosure/2020/Nov/19
|
|
CVE-2020-9967 - http://packetstormsecurity.com/files/163501/XNU-Network-Stack-Kernel-Heap-Overflow.html
|
|
CVE-2020-9968 - http://seclists.org/fulldisclosure/2020/Nov/19
|
|
CVE-2020-9973 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1104
|
|
CVE-2020-9976 - http://seclists.org/fulldisclosure/2020/Nov/19
|
|
CVE-2020-9979 - http://seclists.org/fulldisclosure/2020/Nov/19
|
|
CVE-2020-9983 - http://seclists.org/fulldisclosure/2020/Nov/18
|
|
CVE-2020-9983 - http://seclists.org/fulldisclosure/2020/Nov/19
|
|
CVE-2021-0146 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html
|
|
CVE-2021-0252 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-gr7j-26pv-5v57
|
|
CVE-2021-0253 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-vrf9-cjcp-rwcr
|
|
CVE-2021-0278 - https://kb.juniper.net/JSA11182
|
|
CVE-2021-0430 - http://packetstormsecurity.com/files/162380/Android-NFC-Stack-Out-Of-Bounds-Write.html
|
|
CVE-2021-0870 - http://packetstormsecurity.com/files/164704/Android-NFC-Type-Confusion.html
|
|
CVE-2021-1050 - http://packetstormsecurity.com/files/175260/PowerVR-Out-Of-Bounds-Access-Information-Leak.html
|
|
CVE-2021-1051 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1052 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1053 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1054 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1055 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1056 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1057 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1058 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1059 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1060 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1061 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1062 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1063 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1064 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1065 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1066 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142
|
|
CVE-2021-1067 - https://nvidia.custhelp.com/app/answers/detail/a_id/5148
|
|
CVE-2021-1068 - https://nvidia.custhelp.com/app/answers/detail/a_id/5148
|
|
CVE-2021-1069 - https://nvidia.custhelp.com/app/answers/detail/a_id/5148
|
|
CVE-2021-1089 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1090 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1091 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1092 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1093 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1094 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1095 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1096 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1097 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1098 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1099 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1100 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1101 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1102 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1103 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211
|
|
CVE-2021-1167 - http://packetstormsecurity.com/files/160953/Cisco-RV110W-1.2.1.7-Denial-Of-Service.html
|
|
CVE-2021-1256 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382
|
|
CVE-2021-1257 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382
|
|
CVE-2021-1258 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382
|
|
CVE-2021-1258 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-fileread-PbHbgHMj
|
|
CVE-2021-1382 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-7xfm-92p7-qc57
|
|
CVE-2021-1383 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-vw54-f9mw-g46r
|
|
CVE-2021-1384 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-h332-fj6p-2232
|
|
CVE-2021-1385 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-hhfw-6cm2-v3w5
|
|
CVE-2021-1450 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dos-55AYyxYr
|
|
CVE-2021-1472 - http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html
|
|
CVE-2021-1473 - http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html
|
|
CVE-2021-1497 - http://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html
|
|
CVE-2021-1498 - http://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html
|
|
CVE-2021-1499 - http://packetstormsecurity.com/files/163203/Cisco-HyperFlex-HX-Data-Platform-File-Upload-Remote-Code-Execution.html
|
|
CVE-2021-1519 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-profile-AggMUCDg
|
|
CVE-2021-1531 - http://packetstormsecurity.com/files/163265/Cisco-Modeling-Labs-2.1.1-b19-Remote-Command-Execution.html
|
|
CVE-2021-1585 - https://github.com/jbaines-r7/staystaystay
|
|
CVE-2021-1616 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-h323alg-bypass-4vy2MP2Q
|
|
CVE-2021-1629 - http://packetstormsecurity.com/files/162138/Tableau-Server-Open-Redirection.html
|
|
CVE-2021-1629 - http://seclists.org/fulldisclosure/2021/Apr/22
|
|
CVE-2021-1645 - http://packetstormsecurity.com/files/161816/Microsoft-Windows-Containers-DP-API-Cryptography-Flaw.html
|
|
CVE-2021-1645 - http://seclists.org/fulldisclosure/2021/Mar/33
|
|
CVE-2021-1675 - http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of-Concept.html
|
|
CVE-2021-1675 - http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Service-Remote-Code-Execution.html
|
|
CVE-2021-1675 - http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html
|
|
CVE-2021-1732 - http://packetstormsecurity.com/files/161880/Win32k-ConsoleControl-Offset-Confusion.html
|
|
CVE-2021-1732 - http://packetstormsecurity.com/files/166169/Win32k-ConsoleControl-Offset-Confusion-Privilege-Escalation.html
|
|
CVE-2021-1810 - http://packetstormsecurity.com/files/164375/Gatekeeper-Bypass-Proof-Of-Concept.html
|
|
CVE-2021-1886 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1887 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1888 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1889 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1890 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1891 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2021-1892 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
|
|
CVE-2021-1894 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-1895 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2021-1896 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1897 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1898 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1899 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1900 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin
|
|
CVE-2021-1901 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1903 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-1904 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-1905 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2021-1906 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2021-1907 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1909 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1910 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2021-1912 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-1913 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1914 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-1915 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2021-1916 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-1917 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1918 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-1919 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-1920 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-1921 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-1923 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-1924 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-1925 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2021-1927 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
|
|
CVE-2021-1928 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-1929 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-1930 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-1931 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1932 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1933 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1934 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1935 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1936 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1937 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin
|
|
CVE-2021-1938 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1939 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-1940 - http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html
|
|
CVE-2021-1940 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1941 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1942 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-1943 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1945 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1946 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1947 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-1948 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1949 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1950 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-1952 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1953 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1954 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1955 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1956 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1957 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1958 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1959 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1960 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1961 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1962 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1963 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1964 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1965 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1966 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1967 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1968 - http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html
|
|
CVE-2021-1968 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1969 - http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html
|
|
CVE-2021-1969 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1970 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
|
|
CVE-2021-1971 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1972 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-1973 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-1974 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-1975 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-1976 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-1977 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1979 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-1980 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1981 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-1982 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-1983 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1984 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1985 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-1993 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-1994 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-1995 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-1996 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-1997 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-1998 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-1999 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2000 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2001 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2002 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2003 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20031 - http://packetstormsecurity.com/files/164502/Sonicwall-SonicOS-7.0-Host-Header-Injection.html
|
|
CVE-2021-20034 - http://packetstormsecurity.com/files/164564/SonicWall-SMA-10.2.1.0-17sv-Password-Reset.html
|
|
CVE-2021-20039 - http://packetstormsecurity.com/files/165563/SonicWall-SMA-100-Series-Authenticated-Command-Injection.html
|
|
CVE-2021-2004 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2005 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2006 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20067 - https://www.tenable.com/security/research/tra-2021-04
|
|
CVE-2021-20068 - https://www.tenable.com/security/research/tra-2021-04
|
|
CVE-2021-20069 - https://www.tenable.com/security/research/tra-2021-04
|
|
CVE-2021-2007 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20070 - https://www.tenable.com/security/research/tra-2021-04
|
|
CVE-2021-20071 - https://www.tenable.com/security/research/tra-2021-04
|
|
CVE-2021-20072 - https://www.tenable.com/security/research/tra-2021-04
|
|
CVE-2021-20073 - https://www.tenable.com/security/research/tra-2021-04
|
|
CVE-2021-20074 - https://www.tenable.com/security/research/tra-2021-04
|
|
CVE-2021-20075 - https://www.tenable.com/security/research/tra-2021-04
|
|
CVE-2021-20076 - https://www.tenable.com/security/tns-2021-03
|
|
CVE-2021-20077 - https://www.tenable.com/security/tns-2021-07
|
|
CVE-2021-20078 - https://www.tenable.com/security/research/tra-2021-10
|
|
CVE-2021-20079 - https://www.tenable.com/security/tns-2021-07
|
|
CVE-2021-2008 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-20080 - https://www.tenable.com/security/research/tra-2021-11
|
|
CVE-2021-20081 - https://www.tenable.com/security/research/tra-2021-22
|
|
CVE-2021-20083 - http://packetstormsecurity.com/files/166299/WordPress-Core-5.9.0-5.9.1-Cross-Site-Scripting.html
|
|
CVE-2021-20083 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-query-object.md
|
|
CVE-2021-20084 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-sparkle.md
|
|
CVE-2021-20085 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/backbone-qp.md
|
|
CVE-2021-20086 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-bbq.md
|
|
CVE-2021-20087 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-deparam.md
|
|
CVE-2021-20088 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/mootools-more.md
|
|
CVE-2021-20089 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/purl.md
|
|
CVE-2021-2009 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20090 - https://www.tenable.com/security/research/tra-2021-13
|
|
CVE-2021-20091 - https://www.tenable.com/security/research/tra-2021-13
|
|
CVE-2021-20092 - https://www.tenable.com/security/research/tra-2021-13
|
|
CVE-2021-20093 - https://www.tenable.com/security/research/tra-2021-24
|
|
CVE-2021-20094 - https://www.tenable.com/security/research/tra-2021-24
|
|
CVE-2021-20096 - https://www.tenable.com/security/research/tra-2021-18
|
|
CVE-2021-2010 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20106 - https://www.tenable.com/security/tns-2021-13
|
|
CVE-2021-20107 - https://www.tenable.com/security/research/tra-2021-26-0
|
|
CVE-2021-2011 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2012 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20120 - https://www.tenable.com/security/research/tra-2021-45
|
|
CVE-2021-20121 - https://www.tenable.com/security/research/tra-2021-41
|
|
CVE-2021-20122 - https://www.tenable.com/security/research/tra-2021-41
|
|
CVE-2021-20123 - https://www.tenable.com/security/research/tra-2021-42
|
|
CVE-2021-20124 - https://www.tenable.com/security/research/tra-2021-42
|
|
CVE-2021-20125 - https://www.tenable.com/security/research/tra-2021-42
|
|
CVE-2021-20126 - https://www.tenable.com/security/research/tra-2021-42
|
|
CVE-2021-20127 - https://www.tenable.com/security/research/tra-2021-42
|
|
CVE-2021-20128 - https://www.tenable.com/security/research/tra-2021-42
|
|
CVE-2021-20129 - https://www.tenable.com/security/research/tra-2021-42
|
|
CVE-2021-2013 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20132 - https://www.tenable.com/security/research/tra-2021-44
|
|
CVE-2021-20133 - https://www.tenable.com/security/research/tra-2021-44
|
|
CVE-2021-20134 - https://www.tenable.com/security/research/tra-2021-44
|
|
CVE-2021-20136 - https://www.tenable.com/security/research/tra-2021-48
|
|
CVE-2021-20137 - https://www.tenable.com/security/research/tra-2021-51
|
|
CVE-2021-20138 - https://www.tenable.com/security/research/tra-2021-51
|
|
CVE-2021-20139 - https://www.tenable.com/security/research/tra-2021-51
|
|
CVE-2021-2014 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20140 - https://www.tenable.com/security/research/tra-2021-51
|
|
CVE-2021-20141 - https://www.tenable.com/security/research/tra-2021-51
|
|
CVE-2021-20142 - https://www.tenable.com/security/research/tra-2021-51
|
|
CVE-2021-20143 - https://www.tenable.com/security/research/tra-2021-51
|
|
CVE-2021-20144 - https://www.tenable.com/security/research/tra-2021-51
|
|
CVE-2021-20145 - https://www.tenable.com/security/research/tra-2021-51
|
|
CVE-2021-20146 - https://www.tenable.com/security/research/tra-2021-51
|
|
CVE-2021-20149 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-2015 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20150 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20151 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20152 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20153 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20154 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20155 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20156 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20157 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20158 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20159 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-2016 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20160 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20161 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20162 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20163 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20164 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20165 - https://www.tenable.com/security/research/tra-2021-54
|
|
CVE-2021-20166 - https://www.tenable.com/security/research/tra-2021-55
|
|
CVE-2021-20167 - https://www.tenable.com/security/research/tra-2021-55
|
|
CVE-2021-20168 - https://www.tenable.com/security/research/tra-2021-55
|
|
CVE-2021-20169 - https://www.tenable.com/security/research/tra-2021-55
|
|
CVE-2021-2017 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20170 - https://www.tenable.com/security/research/tra-2021-55
|
|
CVE-2021-20171 - https://www.tenable.com/security/research/tra-2021-55
|
|
CVE-2021-2018 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2019 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20190 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-20193 - https://bugzilla.redhat.com/show_bug.cgi?id=1917565
|
|
CVE-2021-20193 - https://savannah.gnu.org/bugs/?59897
|
|
CVE-2021-2020 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2021 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2022 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20227 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-20227 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-20227 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-2023 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2024 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2025 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2026 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20261 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a0c80efe5956ccce9fe7ae5c78542578c07bc20a
|
|
CVE-2021-20265 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa0dc04df259ba2df3ce1920e9690c7842f8fa4b
|
|
CVE-2021-20265 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-2027 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20270 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-2028 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20280 - http://packetstormsecurity.com/files/164817/Moodle-Cross-Site-Scripting-Server-Side-Request-Forgery.html
|
|
CVE-2021-20285 - https://github.com/upx/upx/issues/421
|
|
CVE-2021-20289 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-2029 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2030 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20304 - https://github.com/AcademySoftwareFoundation/openexr/pull/849
|
|
CVE-2021-20308 - https://github.com/michaelrsweet/htmldoc/issues/423
|
|
CVE-2021-2031 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20316 - https://www.samba.org/samba/security/CVE-2021-20316.html
|
|
CVE-2021-2032 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
|
|
CVE-2021-20322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
|
|
CVE-2021-20322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
|
|
CVE-2021-20322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
|
|
CVE-2021-20322 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-2033 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2034 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20340 - https://www.ibm.com/support/pages/node/6417585
|
|
CVE-2021-2035 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20350 - https://www.ibm.com/support/pages/node/6417585
|
|
CVE-2021-20351 - https://www.ibm.com/support/pages/node/6417585
|
|
CVE-2021-2036 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20365 - https://www.ibm.com/support/pages/node/6471345
|
|
CVE-2021-2038 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2039 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2040 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2041 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2042 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2043 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2044 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2045 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2046 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2047 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2048 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2049 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2050 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2051 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2052 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2053 - https://blog.stmcyber.com/vulns/cve-2021-2053/
|
|
CVE-2021-2053 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2054 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2055 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2056 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20562 - http://packetstormsecurity.com/files/164782/IBM-Sterling-B2B-Integrator-Cross-Site-Scripting.html
|
|
CVE-2021-20562 - http://seclists.org/fulldisclosure/2021/Nov/16
|
|
CVE-2021-2057 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2058 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2059 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2060 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2061 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2062 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2063 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2064 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2065 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20654 - https://jvn.jp/en/jp/JVN80785288/
|
|
CVE-2021-20654 - https://wekan.github.io/hall-of-fame/fieldbleed/
|
|
CVE-2021-20656 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf
|
|
CVE-2021-20657 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf
|
|
CVE-2021-20658 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf
|
|
CVE-2021-20659 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf
|
|
CVE-2021-2066 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20660 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf
|
|
CVE-2021-20661 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf
|
|
CVE-2021-20662 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf
|
|
CVE-2021-2067 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2068 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2069 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2070 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20700 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html
|
|
CVE-2021-20701 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html
|
|
CVE-2021-20702 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html
|
|
CVE-2021-20703 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html
|
|
CVE-2021-20704 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html
|
|
CVE-2021-20705 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html
|
|
CVE-2021-20706 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html
|
|
CVE-2021-20707 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html
|
|
CVE-2021-2071 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20718 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-2072 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2073 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2074 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2075 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2076 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2077 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2078 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2079 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2080 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2081 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2082 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2083 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20834 - https://play.google.com/store/apps/details?id=com.nike.omega
|
|
CVE-2021-20837 - http://packetstormsecurity.com/files/164705/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html
|
|
CVE-2021-20837 - http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html
|
|
CVE-2021-20837 - https://jvn.jp/en/jp/JVN41119755/index.html
|
|
CVE-2021-2084 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2085 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2086 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2087 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20873 - https://support.yappli.co.jp/hc/ja/articles/4410249902745
|
|
CVE-2021-2088 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2089 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2090 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2091 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2092 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2093 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2094 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2096 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2097 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2098 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20986 - https://cert.vde.com/en-us/advisories/vde-2021-006
|
|
CVE-2021-20987 - https://cert.vde.com/en-us/advisories/vde-2021-007
|
|
CVE-2021-20989 - http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html
|
|
CVE-2021-20989 - http://seclists.org/fulldisclosure/2021/Apr/27
|
|
CVE-2021-20989 - https://www.iot-inspector.com/blog/advisory-fibaro-home-center/
|
|
CVE-2021-2099 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-20990 - http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html
|
|
CVE-2021-20990 - http://seclists.org/fulldisclosure/2021/Apr/27
|
|
CVE-2021-20990 - https://www.iot-inspector.com/blog/advisory-fibaro-home-center/
|
|
CVE-2021-20991 - http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html
|
|
CVE-2021-20991 - http://seclists.org/fulldisclosure/2021/Apr/27
|
|
CVE-2021-20991 - https://www.iot-inspector.com/blog/advisory-fibaro-home-center/
|
|
CVE-2021-20992 - http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html
|
|
CVE-2021-20992 - http://seclists.org/fulldisclosure/2021/Apr/27
|
|
CVE-2021-20992 - https://www.iot-inspector.com/blog/advisory-fibaro-home-center/
|
|
CVE-2021-20993 - https://cert.vde.com/en-us/advisories/vde-2021-013
|
|
CVE-2021-20994 - https://cert.vde.com/en-us/advisories/vde-2021-013
|
|
CVE-2021-20995 - https://cert.vde.com/en-us/advisories/vde-2021-013
|
|
CVE-2021-20996 - https://cert.vde.com/en-us/advisories/vde-2021-013
|
|
CVE-2021-20997 - https://cert.vde.com/en-us/advisories/vde-2021-013
|
|
CVE-2021-20998 - https://cert.vde.com/en-us/advisories/vde-2021-013
|
|
CVE-2021-20999 - https://cert.vde.com/en-us/advisories/vde-2021-016
|
|
CVE-2021-2100 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-21000 - https://cert.vde.com/en-us/advisories/vde-2021-014
|
|
CVE-2021-21001 - https://cert.vde.com/en-us/advisories/vde-2021-014
|
|
CVE-2021-21002 - https://cert.vde.com/en-us/advisories/vde-2021-022
|
|
CVE-2021-21003 - https://cert.vde.com/en-us/advisories/vde-2021-023
|
|
CVE-2021-21004 - https://cert.vde.com/en-us/advisories/vde-2021-023
|
|
CVE-2021-21005 - https://cert.vde.com/en-us/advisories/vde-2021-023
|
|
CVE-2021-2101 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2102 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2103 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2104 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2105 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2106 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2107 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2108 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2109 - http://packetstormsecurity.com/files/161053/Oracle-WebLogic-Server-14.1.1.0-Remote-Code-Execution.html
|
|
CVE-2021-2109 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2110 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2111 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2112 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2113 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2114 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-21148 - http://packetstormsecurity.com/files/162579/Chrome-Array-Transfer-Bypass.html
|
|
CVE-2021-2115 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-21156 - http://packetstormsecurity.com/files/162579/Chrome-Array-Transfer-Bypass.html
|
|
CVE-2021-2116 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-21160 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1235
|
|
CVE-2021-2117 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2118 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2119 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-21198 - http://packetstormsecurity.com/files/162973/Chrome-Legacy-ipc-Message-Passed-Via-Shared-Memory.html
|
|
CVE-2021-2120 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2121 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2122 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-21220 - http://packetstormsecurity.com/files/162437/Google-Chrome-XOR-Typer-Out-Of-Bounds-Access-Remote-Code-Execution.html
|
|
CVE-2021-21220 - http://packetstormsecurity.com/files/176210/Chrome-V8-JIT-XOR-Arbitrary-Code-Execution.html
|
|
CVE-2021-2123 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2124 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-21242 - https://github.com/theonedev/onedev/security/advisories/GHSA-5q3q-f373-2jv8
|
|
CVE-2021-21243 - https://github.com/theonedev/onedev/security/advisories/GHSA-9mmq-fm8c-q4fv
|
|
CVE-2021-2125 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-21259 - https://github.com/hackmdio/codimd/issues/1648
|
|
CVE-2021-2126 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-21267 - https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f
|
|
CVE-2021-21267 - https://github.com/schema-inspector/schema-inspector/security/advisories/GHSA-f38p-c2gq-4pmr
|
|
CVE-2021-2127 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-21275 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-21275 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-21276 - http://packetstormsecurity.com/files/171743/POLR-URL-2.3.0-Shortener-Admin-Takeover.html
|
|
CVE-2021-2128 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-2129 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-21290 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-21290 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-21290 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-21290 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-21293 - https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc
|
|
CVE-2021-21294 - https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc
|
|
CVE-2021-21295 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-2130 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-21300 - http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html
|
|
CVE-2021-21305 - https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-cf3w-g86h-35x4
|
|
CVE-2021-21307 - http://packetstormsecurity.com/files/163864/Lucee-Administrator-imgProcess.cfm-Arbitrary-File-Write.html
|
|
CVE-2021-21307 - https://github.com/httpvoid/writeups/blob/main/Apple-RCE.md
|
|
CVE-2021-2131 - https://www.oracle.com/security-alerts/cpujan2021.html
|
|
CVE-2021-21310 - https://github.com/nextauthjs/next-auth/security/advisories/GHSA-pg53-56cg-4m8q
|
|
CVE-2021-21322 - https://www.npmjs.com/package/fastify-http-proxy
|
|
CVE-2021-21327 - http://packetstormsecurity.com/files/161680/GLPI-9.5.3-Unsafe-Reflection.html
|
|
CVE-2021-21337 - http://packetstormsecurity.com/files/162911/Products.PluggableAuthService-2.6.0-Open-Redirect.html
|
|
CVE-2021-2134 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21341 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-21341 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21341 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-21342 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-21342 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21342 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-21343 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-21343 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21343 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-21344 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-21344 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21344 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-21345 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-21345 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-21345 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21345 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-21346 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-21346 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21346 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-21347 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-21347 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21347 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-21348 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-21348 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21348 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-21349 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-21349 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21349 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-2135 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21350 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-21350 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21350 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-21351 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-21351 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21351 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-21353 - https://github.com/pugjs/pug/issues/3312
|
|
CVE-2021-21354 - https://bugzilla.mozilla.org/show_bug.cgi?id=1694684
|
|
CVE-2021-21354 - https://github.com/mozilla/PollBot/pull/333
|
|
CVE-2021-2136 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2137 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-21372 - https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/
|
|
CVE-2021-21373 - https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/
|
|
CVE-2021-21374 - https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/
|
|
CVE-2021-21382 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0732
|
|
CVE-2021-21391 - https://www.npmjs.com/package/@ckeditor/ckeditor5-engine
|
|
CVE-2021-21391 - https://www.npmjs.com/package/@ckeditor/ckeditor5-font
|
|
CVE-2021-2140 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21405 - https://gist.github.com/wadeAlexC/2490d522e81a796af9efcad1686e6754
|
|
CVE-2021-21405 - https://github.com/filecoin-project/lotus/security/advisories/GHSA-4g52-pqcj-phvh
|
|
CVE-2021-21409 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-21409 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-21409 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21409 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-2141 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21411 - https://docs.gitlab.com/ee/user/group/
|
|
CVE-2021-2142 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21425 - http://packetstormsecurity.com/files/162283/GravCMS-1.10.7-Remote-Command-Execution.html
|
|
CVE-2021-21425 - http://packetstormsecurity.com/files/162457/GravCMS-1.10.7-Remote-Command-Execution.html
|
|
CVE-2021-21425 - https://pentest.blog/unexpected-journey-7-gravcms-unauthenticated-arbitrary-yaml-write-update-leads-to-code-execution/
|
|
CVE-2021-21430 - https://github.com/OpenAPITools/openapi-generator/pull/8791
|
|
CVE-2021-21431 - https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m
|
|
CVE-2021-2144 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2145 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2146 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21465 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html
|
|
CVE-2021-21465 - http://seclists.org/fulldisclosure/2022/May/42
|
|
CVE-2021-21466 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html
|
|
CVE-2021-21466 - http://seclists.org/fulldisclosure/2022/May/42
|
|
CVE-2021-21468 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html
|
|
CVE-2021-21468 - http://seclists.org/fulldisclosure/2022/May/42
|
|
CVE-2021-2147 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21473 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html
|
|
CVE-2021-21473 - http://seclists.org/fulldisclosure/2022/May/42
|
|
CVE-2021-21480 - http://packetstormsecurity.com/files/163164/SAP-XMII-Remote-Code-Execution.html
|
|
CVE-2021-21480 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2021-2149 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21495 - https://gist.github.com/alacerda/98853283be6009e75b7d94968d50b88e
|
|
CVE-2021-2150 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21503 - https://www.dell.com/support/kbdoc/000183717
|
|
CVE-2021-21506 - https://www.dell.com/support/kbdoc/000183717
|
|
CVE-2021-2151 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21513 - https://www.tenable.com/security/research/tra-2021-07
|
|
CVE-2021-2152 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2153 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2154 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2155 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21551 - http://packetstormsecurity.com/files/162604/Dell-DBUtil_2_3.sys-IOCTL-Memory-Read-Write.html
|
|
CVE-2021-21551 - http://packetstormsecurity.com/files/162739/DELL-dbutil_2_3.sys-2.3-Arbitrary-Write-Privilege-Escalation.html
|
|
CVE-2021-2156 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21568 - https://www.dell.com/support/kbdoc/000190408
|
|
CVE-2021-2157 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2158 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2159 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21592 - https://www.dell.com/support/kbdoc/000190408
|
|
CVE-2021-21594 - https://www.dell.com/support/kbdoc/000190408
|
|
CVE-2021-21595 - https://www.dell.com/support/kbdoc/000190408
|
|
CVE-2021-21599 - https://www.dell.com/support/kbdoc/000190408
|
|
CVE-2021-2160 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2161 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366
|
|
CVE-2021-2161 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2162 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2163 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2164 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2166 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21660 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-21660
|
|
CVE-2021-2167 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2169 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2170 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21702 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-21703 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-21703 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21704 - https://bugs.php.net/bug.php?id=76449
|
|
CVE-2021-21704 - https://bugs.php.net/bug.php?id=76450
|
|
CVE-2021-21705 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21707 - https://bugs.php.net/bug.php?id=79971
|
|
CVE-2021-21708 - https://bugs.php.net/bug.php?id=81708
|
|
CVE-2021-2171 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2172 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2173 - http://packetstormsecurity.com/files/171344/Oracle-DB-Broken-PDB-Isolation-Metadata-Exposure.html
|
|
CVE-2021-2173 - https://github.com/emad-almousa/CVE-2021-2173
|
|
CVE-2021-2173 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2174 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2175 - http://packetstormsecurity.com/files/170373/Oracle-Database-Vault-Metadata-Exposure.html
|
|
CVE-2021-2175 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2177 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21772 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1226
|
|
CVE-2021-21773 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1227
|
|
CVE-2021-21775 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1229
|
|
CVE-2021-21776 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1232
|
|
CVE-2021-21777 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1234
|
|
CVE-2021-21778 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1236
|
|
CVE-2021-21779 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1238
|
|
CVE-2021-2178 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21781 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243
|
|
CVE-2021-21781 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-21782 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1244
|
|
CVE-2021-21783 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245
|
|
CVE-2021-21783 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-21783 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-21784 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1248
|
|
CVE-2021-21786 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1253
|
|
CVE-2021-21787 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254
|
|
CVE-2021-21788 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254
|
|
CVE-2021-21789 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254
|
|
CVE-2021-2179 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21790 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1255
|
|
CVE-2021-21791 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1255
|
|
CVE-2021-21792 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1255
|
|
CVE-2021-21793 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1257
|
|
CVE-2021-21794 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1261
|
|
CVE-2021-21795 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1264
|
|
CVE-2021-21796 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1265
|
|
CVE-2021-21797 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266
|
|
CVE-2021-21798 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1267
|
|
CVE-2021-21799 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1270
|
|
CVE-2021-2180 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21800 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1271
|
|
CVE-2021-21801 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272
|
|
CVE-2021-21802 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272
|
|
CVE-2021-21803 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272
|
|
CVE-2021-21804 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1273
|
|
CVE-2021-21805 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1274
|
|
CVE-2021-21806 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214
|
|
CVE-2021-21807 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1275
|
|
CVE-2021-21808 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1276
|
|
CVE-2021-21809 - http://packetstormsecurity.com/files/164481/Moodle-SpellChecker-Path-Authenticated-Remote-Command-Execution.html
|
|
CVE-2021-21809 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1277
|
|
CVE-2021-2181 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21810 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1278
|
|
CVE-2021-21811 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1279
|
|
CVE-2021-21812 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280
|
|
CVE-2021-21813 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280
|
|
CVE-2021-21814 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280
|
|
CVE-2021-21815 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280
|
|
CVE-2021-21816 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1281
|
|
CVE-2021-21817 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1282
|
|
CVE-2021-21818 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1283
|
|
CVE-2021-21819 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1284
|
|
CVE-2021-2182 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21820 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1285
|
|
CVE-2021-21821 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1286
|
|
CVE-2021-21822 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1287
|
|
CVE-2021-21823 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1288
|
|
CVE-2021-21824 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1289
|
|
CVE-2021-21825 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1290
|
|
CVE-2021-21826 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1291
|
|
CVE-2021-21827 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1291
|
|
CVE-2021-21828 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1291
|
|
CVE-2021-21829 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1292
|
|
CVE-2021-2183 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21830 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1293
|
|
CVE-2021-21831 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1294
|
|
CVE-2021-21832 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1295
|
|
CVE-2021-21833 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1296
|
|
CVE-2021-21834 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21835 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21836 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21837 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21837 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21838 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21838 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21839 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21839 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-2184 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21840 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21841 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21842 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21843 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21843 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21844 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21844 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21845 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21845 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21846 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21846 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21847 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21847 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21848 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21849 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-2185 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21850 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21851 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21851 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21852 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21852 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297
|
|
CVE-2021-21853 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299
|
|
CVE-2021-21854 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299
|
|
CVE-2021-21855 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299
|
|
CVE-2021-21856 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299
|
|
CVE-2021-21857 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299
|
|
CVE-2021-21858 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299
|
|
CVE-2021-21859 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298
|
|
CVE-2021-2186 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21860 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298
|
|
CVE-2021-21861 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298
|
|
CVE-2021-21862 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298
|
|
CVE-2021-21864 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1301
|
|
CVE-2021-21865 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1301
|
|
CVE-2021-21866 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1301
|
|
CVE-2021-21867 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1304
|
|
CVE-2021-21868 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1305
|
|
CVE-2021-21869 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1306
|
|
CVE-2021-2187 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21870 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1307
|
|
CVE-2021-21871 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1308
|
|
CVE-2021-21872 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1312
|
|
CVE-2021-21873 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1314
|
|
CVE-2021-21874 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1314
|
|
CVE-2021-21875 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1314
|
|
CVE-2021-21876 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1315
|
|
CVE-2021-21877 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1315
|
|
CVE-2021-21878 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1322
|
|
CVE-2021-21879 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1323
|
|
CVE-2021-2188 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21880 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1324
|
|
CVE-2021-21881 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1325
|
|
CVE-2021-21882 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1326
|
|
CVE-2021-21883 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1327
|
|
CVE-2021-21884 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1328
|
|
CVE-2021-21885 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1329
|
|
CVE-2021-21886 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1330
|
|
CVE-2021-21887 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1331
|
|
CVE-2021-21888 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1332
|
|
CVE-2021-21889 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1333
|
|
CVE-2021-2189 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21890 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1334
|
|
CVE-2021-21891 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1334
|
|
CVE-2021-21892 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1335
|
|
CVE-2021-21893 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1336
|
|
CVE-2021-21894 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1337
|
|
CVE-2021-21895 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1337
|
|
CVE-2021-21896 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1338
|
|
CVE-2021-21897 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1346
|
|
CVE-2021-21898 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1349
|
|
CVE-2021-21899 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1350
|
|
CVE-2021-2190 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21900 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1351
|
|
CVE-2021-21901 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1353
|
|
CVE-2021-21902 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1354
|
|
CVE-2021-21903 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1355
|
|
CVE-2021-21904 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1356
|
|
CVE-2021-21905 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1357
|
|
CVE-2021-21906 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1357
|
|
CVE-2021-21907 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1358
|
|
CVE-2021-21908 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1359
|
|
CVE-2021-21909 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1359
|
|
CVE-2021-2191 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21910 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1360
|
|
CVE-2021-21911 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1360
|
|
CVE-2021-21912 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1360
|
|
CVE-2021-21913 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1361
|
|
CVE-2021-21914 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1362
|
|
CVE-2021-21915 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363
|
|
CVE-2021-21916 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363
|
|
CVE-2021-21917 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363
|
|
CVE-2021-21918 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1364
|
|
CVE-2021-21919 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1364
|
|
CVE-2021-2192 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21920 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1365
|
|
CVE-2021-21921 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1365
|
|
CVE-2021-21922 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1365
|
|
CVE-2021-21923 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1365
|
|
CVE-2021-21924 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
|
|
CVE-2021-21925 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
|
|
CVE-2021-21926 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
|
|
CVE-2021-21927 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
|
|
CVE-2021-21928 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
|
|
CVE-2021-21929 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
|
|
CVE-2021-2193 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21930 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
|
|
CVE-2021-21931 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
|
|
CVE-2021-21932 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
|
|
CVE-2021-21933 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
|
|
CVE-2021-21934 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
|
|
CVE-2021-21935 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
|
|
CVE-2021-21936 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
|
|
CVE-2021-21937 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
|
|
CVE-2021-21938 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1367
|
|
CVE-2021-21939 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1368
|
|
CVE-2021-2194 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21940 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1369
|
|
CVE-2021-21941 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1370
|
|
CVE-2021-21942 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1371
|
|
CVE-2021-21943 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1373
|
|
CVE-2021-21944 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1374
|
|
CVE-2021-21945 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1374
|
|
CVE-2021-21946 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1375
|
|
CVE-2021-21947 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1375
|
|
CVE-2021-21948 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1376
|
|
CVE-2021-21949 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1377
|
|
CVE-2021-2195 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21950 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1378
|
|
CVE-2021-21951 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1378
|
|
CVE-2021-21952 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1379
|
|
CVE-2021-21953 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1380
|
|
CVE-2021-21954 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1381
|
|
CVE-2021-21955 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1382
|
|
CVE-2021-21956 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1383
|
|
CVE-2021-21957 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1384
|
|
CVE-2021-21958 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1386
|
|
CVE-2021-21959 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1388
|
|
CVE-2021-2196 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21960 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1389
|
|
CVE-2021-21961 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1389
|
|
CVE-2021-21962 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1390
|
|
CVE-2021-21963 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1391
|
|
CVE-2021-21964 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1392
|
|
CVE-2021-21965 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1392
|
|
CVE-2021-21966 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1393
|
|
CVE-2021-21967 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1394
|
|
CVE-2021-21968 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1395
|
|
CVE-2021-21969 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1396
|
|
CVE-2021-2197 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21970 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1396
|
|
CVE-2021-21971 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1406
|
|
CVE-2021-21972 - http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html
|
|
CVE-2021-21972 - http://packetstormsecurity.com/files/161695/VMware-vCenter-Server-File-Upload-Remote-Code-Execution.html
|
|
CVE-2021-21972 - http://packetstormsecurity.com/files/163268/VMware-vCenter-6.5-6.7-7.0-Remote-Code-Execution.html
|
|
CVE-2021-21974 - http://packetstormsecurity.com/files/162957/VMware-ESXi-OpenSLP-Heap-Overflow.html
|
|
CVE-2021-21975 - http://packetstormsecurity.com/files/162349/VMware-vRealize-Operations-Manager-Server-Side-Request-Forgery-Code-Execution.html
|
|
CVE-2021-21978 - http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html
|
|
CVE-2021-2198 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21983 - http://packetstormsecurity.com/files/162349/VMware-vRealize-Operations-Manager-Server-Side-Request-Forgery-Code-Execution.html
|
|
CVE-2021-21985 - http://packetstormsecurity.com/files/162812/VMware-Security-Advisory-2021-0010.html
|
|
CVE-2021-21985 - http://packetstormsecurity.com/files/163487/VMware-vCenter-Server-Virtual-SAN-Health-Check-Remote-Code-Execution.html
|
|
CVE-2021-21986 - http://packetstormsecurity.com/files/162812/VMware-Security-Advisory-2021-0010.html
|
|
CVE-2021-2199 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-21990 - https://herolab.usd.de/security-advisories/usd-2021-0008/
|
|
CVE-2021-21991 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-21992 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-21993 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-2200 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22000 - http://packetstormsecurity.com/files/163521/VMware-ThinApp-DLL-Hijacking.html
|
|
CVE-2021-22005 - http://packetstormsecurity.com/files/164439/VMware-vCenter-Server-Analytics-CEIP-Service-File-Upload.html
|
|
CVE-2021-22005 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-22006 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-22007 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-22008 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-22009 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-2201 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22010 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-22011 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-22012 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-22013 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-22014 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-22015 - http://packetstormsecurity.com/files/170116/VMware-vCenter-vScalation-Privilege-Escalation.html
|
|
CVE-2021-22015 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-22016 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-22017 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-22018 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-22019 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-2202 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22020 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html
|
|
CVE-2021-2203 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2204 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22045 - http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html
|
|
CVE-2021-22045 - https://www.vmware.com/security/advisories/VMSA-2022-0001.html
|
|
CVE-2021-22048 - http://packetstormsecurity.com/files/167733/VMware-Security-Advisory-2022-0025.2.html
|
|
CVE-2021-22048 - http://packetstormsecurity.com/files/167795/VMware-Security-Advisory-2021-0025.3.html
|
|
CVE-2021-2205 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22056 - https://www.vmware.com/security/advisories/VMSA-2021-0030.html
|
|
CVE-2021-22057 - https://www.vmware.com/security/advisories/VMSA-2021-0030.html
|
|
CVE-2021-2206 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22060 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-2207 - http://packetstormsecurity.com/files/174448/Oracle-RMAN-Missing-Auditing.html
|
|
CVE-2021-2207 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2208 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2209 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22096 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-2210 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2211 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22112 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-22112 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-22112 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-22118 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-22118 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-22118 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-22118 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-22118 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-22119 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-22119 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-2212 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2213 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22132 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-22134 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-2214 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22141 - https://www.elastic.co/community/security/
|
|
CVE-2021-22142 - https://www.elastic.co/community/security
|
|
CVE-2021-22143 - https://www.elastic.co/community/security
|
|
CVE-2021-22144 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-22145 - http://packetstormsecurity.com/files/163648/ElasticSearch-7.13.3-Memory-Disclosure.html
|
|
CVE-2021-22145 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-22146 - http://packetstormsecurity.com/files/163655/Elasticsearch-ECE-7.13.3-Database-Disclosure.html
|
|
CVE-2021-22147 - https://www.elastic.co/community/security/
|
|
CVE-2021-22148 - https://www.elastic.co/community/security/
|
|
CVE-2021-22149 - https://www.elastic.co/community/security/
|
|
CVE-2021-2215 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22150 - https://www.elastic.co/community/security
|
|
CVE-2021-22151 - https://www.elastic.co/community/security
|
|
CVE-2021-2216 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2217 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22171 - https://gitlab.com/gitlab-org/gitlab-pages/-/issues/262
|
|
CVE-2021-22173 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-22174 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-22175 - https://gitlab.com/gitlab-org/gitlab/-/issues/294178
|
|
CVE-2021-2218 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2219 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22191 - https://gitlab.com/wireshark/wireshark/-/issues/17232
|
|
CVE-2021-22191 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-22195 - https://gitlab.com/gitlab-org/gitlab-vscode-extension/-/issues/325
|
|
CVE-2021-2220 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22204 - http://packetstormsecurity.com/files/162558/ExifTool-DjVu-ANT-Perl-Injection.html
|
|
CVE-2021-22204 - http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html
|
|
CVE-2021-22204 - http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html
|
|
CVE-2021-22204 - http://packetstormsecurity.com/files/167038/ExifTool-12.23-Arbitrary-Code-Execution.html
|
|
CVE-2021-22204 - http://www.openwall.com/lists/oss-security/2021/05/10/5
|
|
CVE-2021-22205 - http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html
|
|
CVE-2021-22205 - http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html
|
|
CVE-2021-22207 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-2221 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22213 - https://gitlab.com/gitlab-org/gitlab/-/issues/300308
|
|
CVE-2021-22214 - https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22214.json
|
|
CVE-2021-2222 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22222 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-22224 - https://gitlab.com/gitlab-org/gitlab/-/issues/324397
|
|
CVE-2021-22225 - https://gitlab.com/gitlab-org/gitlab/-/issues/331051
|
|
CVE-2021-2223 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22238 - https://gitlab.com/gitlab-org/gitlab/-/issues/332420
|
|
CVE-2021-2224 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22241 - https://gitlab.com/gitlab-org/gitlab/-/issues/336460
|
|
CVE-2021-22245 - https://gitlab.com/gitlab-org/gitlab/-/issues/255612
|
|
CVE-2021-2225 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2226 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22261 - https://gitlab.com/gitlab-org/gitlab/-/issues/328389
|
|
CVE-2021-2227 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2228 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2229 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22298 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-2230 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2231 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2232 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2233 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2234 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2235 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2236 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2237 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2238 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2239 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2240 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2241 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2242 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2244 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2244 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2245 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2246 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2247 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2248 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2249 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22492 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-22494 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-22495 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-2250 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22502 - http://packetstormsecurity.com/files/162408/Micro-Focus-Operations-Bridge-Reporter-Unauthenticated-Command-Injection.html
|
|
CVE-2021-2251 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2252 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2253 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2254 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22543 - https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584
|
|
CVE-2021-2255 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22555 - http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html
|
|
CVE-2021-22555 - http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html
|
|
CVE-2021-22555 - http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html
|
|
CVE-2021-22555 - http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html
|
|
CVE-2021-22555 - http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
|
|
CVE-2021-22555 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21
|
|
CVE-2021-22555 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d
|
|
CVE-2021-22555 - https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528
|
|
CVE-2021-22557 - http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html
|
|
CVE-2021-2256 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22569 - http://www.openwall.com/lists/oss-security/2022/01/12/4
|
|
CVE-2021-22569 - http://www.openwall.com/lists/oss-security/2022/01/12/7
|
|
CVE-2021-22569 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-2257 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22570 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-22571 - https://github.com/google/sa360-webquery-bigquery/pull/15
|
|
CVE-2021-2258 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2259 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2260 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22600 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
|
|
CVE-2021-2261 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2262 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2263 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2264 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22652 - http://packetstormsecurity.com/files/161937/Advantech-iView-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2021-2266 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2267 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2268 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2269 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22696 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-22696 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-2270 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2271 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2272 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2273 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2274 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2275 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2276 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2277 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2278 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2279 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2280 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2281 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2282 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2283 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2284 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2285 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2286 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2287 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22871 - http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scripting-Open-Redirect.html
|
|
CVE-2021-22872 - http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scripting-Open-Redirect.html
|
|
CVE-2021-22872 - https://hackerone.com/reports/986365
|
|
CVE-2021-22873 - http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scripting-Open-Redirect.html
|
|
CVE-2021-22876 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-2288 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22883 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-22883 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-22883 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-22884 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-22884 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-22884 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-22887 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44712
|
|
CVE-2021-2289 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22890 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-22894 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY
|
|
CVE-2021-22897 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-22897 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-22897 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-22898 - https://curl.se/docs/CVE-2021-22898.html
|
|
CVE-2021-22898 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-22898 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-22898 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-22899 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY
|
|
CVE-2021-2290 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22900 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY
|
|
CVE-2021-22901 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-22901 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-22901 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-2291 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22911 - http://packetstormsecurity.com/files/162997/Rocket.Chat-3.12.1-NoSQL-Injection-Code-Execution.html
|
|
CVE-2021-22911 - http://packetstormsecurity.com/files/163419/Rocket.Chat-3.12.1-NoSQL-Injection-Code-Execution.html
|
|
CVE-2021-2292 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22922 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-22923 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-22924 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-22924 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-22925 - http://seclists.org/fulldisclosure/2021/Sep/39
|
|
CVE-2021-22925 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-22925 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-22926 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-22926 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-2293 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22931 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-22931 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-22931 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-22939 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-22939 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-22939 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-2294 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22940 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-22940 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-22940 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-22945 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-22946 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-22946 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-22946 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-22946 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-22947 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-22947 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-22947 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-22947 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-2295 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22959 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-2296 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22960 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-2297 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2298 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-22986 - http://packetstormsecurity.com/files/162059/F5-iControl-Server-Side-Request-Forgery-Remote-Command-Execution.html
|
|
CVE-2021-22986 - http://packetstormsecurity.com/files/162066/F5-BIG-IP-16.0.x-Remote-Code-Execution.html
|
|
CVE-2021-2299 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2300 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2301 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-23017 - http://packetstormsecurity.com/files/167720/Nginx-1.20.0-Denial-Of-Service.html
|
|
CVE-2021-23017 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-23017 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-23017 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-2302 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-23024 - http://packetstormsecurity.com/files/163264/F5-BIG-IQ-VE-8.0.0-2923215-Remote-Root.html
|
|
CVE-2021-2303 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2304 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2305 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2306 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2307 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2308 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2309 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2310 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2311 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2312 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-23133 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b
|
|
CVE-2021-23133 - https://www.openwall.com/lists/oss-security/2021/04/18/2
|
|
CVE-2021-2314 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2315 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-23158 - https://github.com/michaelrsweet/htmldoc/issues/414
|
|
CVE-2021-2316 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-23165 - https://github.com/michaelrsweet/htmldoc/issues/413
|
|
CVE-2021-2317 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2318 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-23180 - https://github.com/michaelrsweet/htmldoc/issues/418
|
|
CVE-2021-2319 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-23191 - https://github.com/michaelrsweet/htmldoc/issues/415
|
|
CVE-2021-2320 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-23206 - https://github.com/michaelrsweet/htmldoc/issues/416
|
|
CVE-2021-2321 - https://www.oracle.com/security-alerts/cpuapr2021.html
|
|
CVE-2021-2323 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2324 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2326 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2328 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2329 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2330 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2332 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-23327 - https://github.com/apexcharts/apexcharts.js/pull/2158
|
|
CVE-2021-23327 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1070616
|
|
CVE-2021-23327 - https://snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708
|
|
CVE-2021-23328 - https://snyk.io/vuln/SNYK-JS-INIPARSERJS-1065989
|
|
CVE-2021-23329 - https://github.com/Geta/NestedObjectAssign/pull/11
|
|
CVE-2021-23329 - https://snyk.io/vuln/SNYK-JS-NESTEDOBJECTASSIGN-1065977
|
|
CVE-2021-2333 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23330 - https://github.com/bitovi/launchpad/pull/124
|
|
CVE-2021-23331 - https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUP-1065988
|
|
CVE-2021-23335 - https://snyk.io/vuln/SNYK-JS-ISUSERVALID-1056766
|
|
CVE-2021-23336 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-23336 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-23336 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-23336 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932
|
|
CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930
|
|
CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928
|
|
CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931
|
|
CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929
|
|
CVE-2021-23337 - https://snyk.io/vuln/SNYK-JS-LODASH-1040724
|
|
CVE-2021-23337 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-23337 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-23337 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-23337 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-23338 - https://github.com/418sec/huntr/pull/1329
|
|
CVE-2021-23338 - https://snyk.io/vuln/SNYK-PYTHON-QLIB-1054635
|
|
CVE-2021-2334 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23340 - https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1070132
|
|
CVE-2021-23341 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1076583
|
|
CVE-2021-23341 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076582
|
|
CVE-2021-23341 - https://snyk.io/vuln/SNYK-JS-PRISMJS-1076581
|
|
CVE-2021-23342 - http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html
|
|
CVE-2021-23342 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593
|
|
CVE-2021-23342 - https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017
|
|
CVE-2021-23343 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028
|
|
CVE-2021-23343 - https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067
|
|
CVE-2021-23344 - https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069
|
|
CVE-2021-23346 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1080633
|
|
CVE-2021-23346 - https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306
|
|
CVE-2021-23346 - https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307
|
|
CVE-2021-23348 - https://github.com/rrainn/PortProcesses/security/advisories/GHSA-vm67-7vmg-66vm
|
|
CVE-2021-23348 - https://snyk.io/vuln/SNYK-JS-PORTPROCESSES-1078536
|
|
CVE-2021-2335 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23352 - https://snyk.io/vuln/SNYK-JS-MADGE-1082875
|
|
CVE-2021-23353 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289
|
|
CVE-2021-23353 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287
|
|
CVE-2021-23353 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288
|
|
CVE-2021-23353 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286
|
|
CVE-2021-23353 - https://snyk.io/vuln/SNYK-JS-JSPDF-1073626
|
|
CVE-2021-23355 - https://snyk.io/vuln/SNYK-JS-PSKILL-1078529
|
|
CVE-2021-23356 - https://snyk.io/vuln/SNYK-JS-KILLPROCESSBYNAME-1078534
|
|
CVE-2021-23358 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504
|
|
CVE-2021-23358 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505
|
|
CVE-2021-23358 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503
|
|
CVE-2021-23358 - https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984
|
|
CVE-2021-23359 - https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078533
|
|
CVE-2021-2336 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23360 - https://snyk.io/vuln/SNYK-JS-KILLPORT-1078535
|
|
CVE-2021-23362 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356
|
|
CVE-2021-23362 - https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355
|
|
CVE-2021-23363 - https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531
|
|
CVE-2021-23364 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182
|
|
CVE-2021-23364 - https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194
|
|
CVE-2021-23368 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795
|
|
CVE-2021-23368 - https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595
|
|
CVE-2021-23369 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950
|
|
CVE-2021-23369 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074951
|
|
CVE-2021-23369 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952
|
|
CVE-2021-23369 - https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1056767
|
|
CVE-2021-2337 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23370 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1244698
|
|
CVE-2021-23370 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1244699
|
|
CVE-2021-23370 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBNOLIMITS4WEB-1244697
|
|
CVE-2021-23370 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244696
|
|
CVE-2021-23370 - https://snyk.io/vuln/SNYK-JS-SWIPER-1088062
|
|
CVE-2021-23373 - https://security.snyk.io/vuln/SNYK-JS-SETDEEPPROP-1083231
|
|
CVE-2021-23374 - https://snyk.io/vuln/SNYK-JS-PSVISITOR-1078544
|
|
CVE-2021-23375 - https://snyk.io/vuln/SNYK-JS-PSNODE-1078543
|
|
CVE-2021-23376 - https://snyk.io/vuln/SNYK-JS-FFMPEGDOTJS-1078542
|
|
CVE-2021-23377 - https://snyk.io/vuln/SNYK-JS-ONIONOLEDJS-1078808
|
|
CVE-2021-23378 - https://snyk.io/vuln/SNYK-JS-PICOTTS-1078539
|
|
CVE-2021-23379 - https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078537
|
|
CVE-2021-2338 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23380 - https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528
|
|
CVE-2021-23381 - https://snyk.io/vuln/SNYK-JS-KILLING-1078532
|
|
CVE-2021-23382 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641
|
|
CVE-2021-23382 - https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640
|
|
CVE-2021-23383 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031
|
|
CVE-2021-23383 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032
|
|
CVE-2021-23383 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030
|
|
CVE-2021-23383 - https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029
|
|
CVE-2021-23384 - https://snyk.io/vuln/SNYK-JS-KOAREMOVETRAILINGSLASHES-1085708
|
|
CVE-2021-23385 - https://security.snyk.io/vuln/SNYK-PYTHON-FLASKSECURITY-1293234
|
|
CVE-2021-23385 - https://snyk.io/blog/url-confusion-vulnerabilities/
|
|
CVE-2021-23387 - https://snyk.io/vuln/SNYK-JS-TRAILINGSLASH-1085707
|
|
CVE-2021-23389 - https://snyk.io/vuln/SNYK-JS-TOTALJS-1088607
|
|
CVE-2021-2339 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23390 - https://snyk.io/vuln/SNYK-JS-TOTAL4-1130527
|
|
CVE-2021-23391 - https://snyk.io/vuln/SNYK-JS-CALIPSO-1300555
|
|
CVE-2021-23392 - https://snyk.io/vuln/SNYK-JS-LOCUTUS-1090597
|
|
CVE-2021-23393 - https://snyk.io/vuln/SNYK-PYTHON-FLASKUNCHAINED-1293189
|
|
CVE-2021-23394 - https://github.com/Studio-42/elFinder
|
|
CVE-2021-23394 - https://github.com/Studio-42/elFinder/issues/3295
|
|
CVE-2021-23394 - https://snyk.io/vuln/SNYK-PHP-STUDIO42ELFINDER-1290554
|
|
CVE-2021-23395 - https://snyk.io/vuln/SNYK-JS-NEDB-1305279
|
|
CVE-2021-23396 - https://snyk.io/vuln/SNYK-JS-LUTILS-1311023
|
|
CVE-2021-23397 - https://security.snyk.io/vuln/SNYK-JS-IANWALTERMERGE-1311022
|
|
CVE-2021-23398 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314286
|
|
CVE-2021-23398 - https://snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285
|
|
CVE-2021-23399 - https://snyk.io/vuln/SNYK-JS-WINCRED-1078538
|
|
CVE-2021-2340 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23400 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737
|
|
CVE-2021-23400 - https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415
|
|
CVE-2021-23401 - https://snyk.io/vuln/SNYK-PYTHON-FLASKUSER-1293188
|
|
CVE-2021-23402 - https://snyk.io/vuln/SNYK-JS-RECORDLIKEDEEPASSIGN-1311024
|
|
CVE-2021-23403 - https://snyk.io/vuln/SNYK-JS-TSNODASH-1311009
|
|
CVE-2021-23404 - https://snyk.io/vuln/SNYK-PYTHON-SQLITEWEB-1316324
|
|
CVE-2021-23405 - https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1316297
|
|
CVE-2021-23406 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506
|
|
CVE-2021-23406 - https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857
|
|
CVE-2021-23407 - https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1315152
|
|
CVE-2021-23408 - https://snyk.io/vuln/SNYK-JAVA-COMGRAPHHOPPER-1320114
|
|
CVE-2021-2341 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2341 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-23411 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1320695
|
|
CVE-2021-23411 - https://snyk.io/vuln/SNYK-JS-ANCHORME-1311008
|
|
CVE-2021-23412 - https://snyk.io/vuln/SNYK-JS-GITLOGPLUS-1315832
|
|
CVE-2021-23413 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1251499
|
|
CVE-2021-23413 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1251498
|
|
CVE-2021-23413 - https://snyk.io/vuln/SNYK-JS-JSZIP-1251497
|
|
CVE-2021-23414 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588
|
|
CVE-2021-23414 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587
|
|
CVE-2021-23414 - https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429
|
|
CVE-2021-23415 - https://snyk.io/vuln/SNYK-DOTNET-ELFINDERASPNET-1315153
|
|
CVE-2021-23416 - https://snyk.io/vuln/SNYK-JS-CURLYBRACKETPARSER-1297106
|
|
CVE-2021-23417 - https://snyk.io/vuln/SNYK-JS-DEEPMERGEFN-1310984
|
|
CVE-2021-23419 - https://snyk.io/vuln/SNYK-JS-OPENGRAPH-1536747
|
|
CVE-2021-2342 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23420 - https://github.com/JinYiTong/poc
|
|
CVE-2021-23420 - https://snyk.io/vuln/SNYK-PHP-CODECEPTIONCODECEPTION-1324585
|
|
CVE-2021-23424 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567198
|
|
CVE-2021-23424 - https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849
|
|
CVE-2021-23425 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197
|
|
CVE-2021-23425 - https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850
|
|
CVE-2021-23426 - https://snyk.io/vuln/SNYK-JS-PROTO-1316301
|
|
CVE-2021-23427 - https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1567778
|
|
CVE-2021-23428 - https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1313838
|
|
CVE-2021-23429 - https://snyk.io/vuln/SNYK-JS-TRANSPILE-1290774
|
|
CVE-2021-2343 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23430 - https://snyk.io/vuln/SNYK-JS-STARTSERVER-1296388
|
|
CVE-2021-23431 - https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e
|
|
CVE-2021-23432 - https://snyk.io/vuln/SNYK-JS-MOOTOOLS-1325536
|
|
CVE-2021-23433 - https://snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421
|
|
CVE-2021-23434 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423
|
|
CVE-2021-23434 - https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453
|
|
CVE-2021-23436 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579266
|
|
CVE-2021-23436 - https://snyk.io/vuln/SNYK-JS-IMMER-1540542
|
|
CVE-2021-23438 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579548
|
|
CVE-2021-23438 - https://snyk.io/vuln/SNYK-JS-MPATH-1577289
|
|
CVE-2021-23439 - https://snyk.io/vuln/SNYK-JS-FILEUPLOADWITHPREVIEW-1579492
|
|
CVE-2021-2344 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23440 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212
|
|
CVE-2021-23440 - https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541
|
|
CVE-2021-23440 - https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/
|
|
CVE-2021-23440 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-23442 - https://snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793
|
|
CVE-2021-23443 - https://snyk.io/vuln/SNYK-JS-EDGEJS-1579556
|
|
CVE-2021-23444 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817
|
|
CVE-2021-23444 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816
|
|
CVE-2021-23444 - https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578
|
|
CVE-2021-23445 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1715371
|
|
CVE-2021-23445 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1715376
|
|
CVE-2021-23445 - https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1540544
|
|
CVE-2021-23447 - https://snyk.io/vuln/SNYK-JS-TEDDY-1579557
|
|
CVE-2021-23448 - https://github.com/jarradseers/config-handler/issues/1
|
|
CVE-2021-23449 - https://snyk.io/vuln/SNYK-JS-VM2-1585918
|
|
CVE-2021-2345 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23450 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2313036
|
|
CVE-2021-23450 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2313035
|
|
CVE-2021-23450 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBDOJO-2313034
|
|
CVE-2021-23450 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2313033
|
|
CVE-2021-23450 - https://snyk.io/vuln/SNYK-JS-DOJO-1535223
|
|
CVE-2021-23450 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-23450 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-23452 - https://snyk.io/vuln/SNYK-JS-XASSIGN-1759314
|
|
CVE-2021-2346 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23460 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2342127
|
|
CVE-2021-23460 - https://snyk.io/vuln/SNYK-JS-MINDASH-2340605
|
|
CVE-2021-23463 - https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238
|
|
CVE-2021-23463 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-2347 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23470 - https://snyk.io/vuln/SNYK-JS-PUTILMERGE-2391487
|
|
CVE-2021-23472 - https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597
|
|
CVE-2021-23472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690
|
|
CVE-2021-23472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689
|
|
CVE-2021-23472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687
|
|
CVE-2021-23472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688
|
|
CVE-2021-23472 - https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597
|
|
CVE-2021-2348 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23484 - https://snyk.io/vuln/SNYK-JS-ZIPLOCAL-2327477
|
|
CVE-2021-2349 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23490 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2321973
|
|
CVE-2021-23490 - https://snyk.io/vuln/SNYK-JS-PARSELINKHEADER-1582783
|
|
CVE-2021-23497 - https://snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-2385945
|
|
CVE-2021-2350 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23507 - https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576
|
|
CVE-2021-23509 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1767165
|
|
CVE-2021-23509 - https://snyk.io/vuln/SNYK-JS-JSONPTR-1577291
|
|
CVE-2021-2351 - http://packetstormsecurity.com/files/165255/Oracle-Database-Protection-Mechanism-Bypass.html
|
|
CVE-2021-2351 - http://packetstormsecurity.com/files/165258/Oracle-Database-Weak-NNE-Integrity-Key-Derivation.html
|
|
CVE-2021-2351 - http://seclists.org/fulldisclosure/2021/Dec/19
|
|
CVE-2021-2351 - http://seclists.org/fulldisclosure/2021/Dec/20
|
|
CVE-2021-2351 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-2351 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-2351 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2351 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-2351 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-23514 - https://snyk.io/vuln/SNYK-UNMANAGED-CROW-2336163
|
|
CVE-2021-23518 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2348246
|
|
CVE-2021-23518 - https://snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-2342653
|
|
CVE-2021-2352 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2353 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2354 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23543 - https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309908
|
|
CVE-2021-2355 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23555 - https://snyk.io/vuln/SNYK-JS-VM2-2309905
|
|
CVE-2021-23556 - https://snyk.io/vuln/SNYK-PYTHON-GUAKE-2386334
|
|
CVE-2021-23558 - https://snyk.io/vuln/SNYK-JS-BMOOR-2342622
|
|
CVE-2021-2356 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23561 - https://snyk.io/vuln/SNYK-JS-COMB-1730083
|
|
CVE-2021-23566 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550
|
|
CVE-2021-23566 - https://snyk.io/vuln/SNYK-JS-NANOID-2332193
|
|
CVE-2021-23568 - https://snyk.io/vuln/SNYK-JS-EXTEND2-2320315
|
|
CVE-2021-2357 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23574 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2320790
|
|
CVE-2021-23574 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2320791
|
|
CVE-2021-23574 - https://snyk.io/vuln/SNYK-JS-JSDATA-1584361
|
|
CVE-2021-2358 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2359 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23592 - https://snyk.io/vuln/SNYK-PHP-TOPTHINKFRAMEWORK-2385695
|
|
CVE-2021-23594 - https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309907
|
|
CVE-2021-23597 - https://snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-2395480
|
|
CVE-2021-2360 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2361 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2362 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23624 - https://snyk.io/vuln/SNYK-JS-DOTTY-1577292
|
|
CVE-2021-2363 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23631 - https://gist.github.com/legndery/a248350bb25b8502a03c2f407cedeb14
|
|
CVE-2021-23631 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-1582785
|
|
CVE-2021-23631 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGTOJPEG-2348245
|
|
CVE-2021-23631 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGTOPNG-2348244
|
|
CVE-2021-23632 - https://snyk.io/vuln/SNYK-JS-GIT-1568518
|
|
CVE-2021-23639 - https://github.com/simonhaenisch/md-to-pdf/issues/99
|
|
CVE-2021-23639 - https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880
|
|
CVE-2021-2364 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23648 - https://snyk.io/vuln/SNYK-JS-BRAINTREESANITIZEURL-2339882
|
|
CVE-2021-2365 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23654 - https://github.com/hanwentao/html2csv/blob/master/html2csv/converter.py
|
|
CVE-2021-2366 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23663 - https://snyk.io/vuln/SNYK-JS-SEY-1727592
|
|
CVE-2021-23664 - https://snyk.io/vuln/SNYK-JS-ISOMORPHICGITCORSPROXY-1734788
|
|
CVE-2021-2367 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23673 - https://snyk.io/vuln/SNYK-JS-PEKEUPLOAD-1584360
|
|
CVE-2021-2368 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23682 - https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250
|
|
CVE-2021-23682 - https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820
|
|
CVE-2021-2369 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2369 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-2370 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23700 - https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593
|
|
CVE-2021-23702 - https://snyk.io/vuln/SNYK-JS-OBJECTEXTEND-2401470
|
|
CVE-2021-2371 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23718 - https://snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362
|
|
CVE-2021-2372 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23727 - https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953
|
|
CVE-2021-2373 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2374 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2375 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23758 - http://packetstormsecurity.com/files/175677/AjaxPro-Deserialization-Remote-Code-Execution.html
|
|
CVE-2021-2376 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23760 - https://snyk.io/vuln/SNYK-JS-KEYGET-2342624
|
|
CVE-2021-2377 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23771 - https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587
|
|
CVE-2021-23771 - https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946
|
|
CVE-2021-23772 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169
|
|
CVE-2021-23772 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170
|
|
CVE-2021-2378 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23784 - https://snyk.io/vuln/SNYK-JS-TEMPURA-1569633
|
|
CVE-2021-23797 - https://snyk.io/vuln/SNYK-JS-HTTPSERVERNODE-1727656
|
|
CVE-2021-2380 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23803 - https://snyk.io/vuln/SNYK-PHP-LATTELATTE-1932226
|
|
CVE-2021-23807 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910273
|
|
CVE-2021-23807 - https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288
|
|
CVE-2021-2381 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2382 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23820 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910686
|
|
CVE-2021-23820 - https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577287
|
|
CVE-2021-23824 - https://snyk.io/vuln/SNYK-UNMANAGED-CROW-2336164
|
|
CVE-2021-2383 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23835 - http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html
|
|
CVE-2021-23835 - https://sec-consult.com/vulnerability-lab/
|
|
CVE-2021-23836 - http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html
|
|
CVE-2021-23836 - https://sec-consult.com/vulnerability-lab/
|
|
CVE-2021-23837 - http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html
|
|
CVE-2021-23837 - https://sec-consult.com/vulnerability-lab/
|
|
CVE-2021-23838 - http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html
|
|
CVE-2021-23838 - https://sec-consult.com/vulnerability-lab/
|
|
CVE-2021-23839 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
|
|
CVE-2021-23839 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-23839 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-23839 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-23839 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-2384 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23840 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
|
|
CVE-2021-23840 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366
|
|
CVE-2021-23840 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-23840 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-23840 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-23840 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-23840 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-23840 - https://www.tenable.com/security/tns-2021-03
|
|
CVE-2021-23840 - https://www.tenable.com/security/tns-2021-09
|
|
CVE-2021-23840 - https://www.tenable.com/security/tns-2021-10
|
|
CVE-2021-23841 - http://seclists.org/fulldisclosure/2021/May/67
|
|
CVE-2021-23841 - http://seclists.org/fulldisclosure/2021/May/68
|
|
CVE-2021-23841 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
|
|
CVE-2021-23841 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-23841 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-23841 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-23841 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-23841 - https://www.tenable.com/security/tns-2021-03
|
|
CVE-2021-23841 - https://www.tenable.com/security/tns-2021-09
|
|
CVE-2021-2385 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2386 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2387 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23878 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345
|
|
CVE-2021-23879 - https://kc.mcafee.com/corporate/index?page=content&id=SB10351
|
|
CVE-2021-2388 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2388 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-23880 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345
|
|
CVE-2021-23881 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345
|
|
CVE-2021-23882 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345
|
|
CVE-2021-23883 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345
|
|
CVE-2021-23884 - https://kc.mcafee.com/corporate/index?page=content&id=SB10353
|
|
CVE-2021-23885 - https://kc.mcafee.com/corporate/index?page=content&id=SB10349
|
|
CVE-2021-23886 - https://kc.mcafee.com/corporate/index?page=content&id=SB10354
|
|
CVE-2021-23886 - https://kc.mcafee.com/corporate/index?page=content&id=SB10357
|
|
CVE-2021-23887 - https://kc.mcafee.com/corporate/index?page=content&id=SB10354
|
|
CVE-2021-23887 - https://kc.mcafee.com/corporate/index?page=content&id=SB10357
|
|
CVE-2021-23888 - https://kc.mcafee.com/corporate/index?page=content&id=SB10352
|
|
CVE-2021-23889 - https://kc.mcafee.com/corporate/index?page=content&id=SB10352
|
|
CVE-2021-2389 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23890 - https://kc.mcafee.com/corporate/index?page=content&id=SB10352
|
|
CVE-2021-23892 - https://kc.mcafee.com/corporate/index?page=content&id=SB10355
|
|
CVE-2021-23893 - https://kc.mcafee.com/corporate/index?page=content&id=SB10361
|
|
CVE-2021-23894 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359
|
|
CVE-2021-23895 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359
|
|
CVE-2021-23896 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359
|
|
CVE-2021-2390 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2391 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2392 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23926 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-23926 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-23927 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html
|
|
CVE-2021-23928 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html
|
|
CVE-2021-23929 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html
|
|
CVE-2021-2393 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23930 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html
|
|
CVE-2021-23931 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html
|
|
CVE-2021-23932 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html
|
|
CVE-2021-23933 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html
|
|
CVE-2021-23934 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html
|
|
CVE-2021-23935 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html
|
|
CVE-2021-23936 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html
|
|
CVE-2021-2394 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2395 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23953 - https://bugzilla.mozilla.org/show_bug.cgi?id=1683940
|
|
CVE-2021-23955 - https://bugzilla.mozilla.org/show_bug.cgi?id=1684837
|
|
CVE-2021-23956 - https://bugzilla.mozilla.org/show_bug.cgi?id=1338637
|
|
CVE-2021-2396 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23960 - https://bugzilla.mozilla.org/show_bug.cgi?id=1675755
|
|
CVE-2021-2397 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23971 - https://bugzilla.mozilla.org/show_bug.cgi?id=1678545
|
|
CVE-2021-23977 - https://bugzilla.mozilla.org/show_bug.cgi?id=1684761
|
|
CVE-2021-2398 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23980 - https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2021-23980
|
|
CVE-2021-23981 - https://bugzilla.mozilla.org/show_bug.cgi?id=1692832
|
|
CVE-2021-23986 - https://bugzilla.mozilla.org/show_bug.cgi?id=1692623
|
|
CVE-2021-2399 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-23991 - https://bugzilla.mozilla.org/show_bug.cgi?id=1673240
|
|
CVE-2021-23994 - https://bugzilla.mozilla.org/show_bug.cgi?id=1699077
|
|
CVE-2021-23997 - https://bugzilla.mozilla.org/show_bug.cgi?id=1701942
|
|
CVE-2021-23999 - https://bugzilla.mozilla.org/show_bug.cgi?id=1691153
|
|
CVE-2021-2400 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24000 - https://bugzilla.mozilla.org/show_bug.cgi?id=1694698
|
|
CVE-2021-24002 - https://bugzilla.mozilla.org/show_bug.cgi?id=1702374
|
|
CVE-2021-2401 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2402 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2403 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24033 - https://github.com/facebook/create-react-app/pull/10644
|
|
CVE-2021-2404 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24040 - http://packetstormsecurity.com/files/164136/Facebook-ParlAI-1.0.0-Code-Execution-Deserialization.html
|
|
CVE-2021-24045 - https://www.facebook.com/security/advisories/cve-2021-24045
|
|
CVE-2021-2405 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2406 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2407 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2408 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24086 - http://packetstormsecurity.com/files/163499/Windows-TCP-IP-Denial-Of-Service.html
|
|
CVE-2021-2409 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24091 - http://packetstormsecurity.com/files/161713/Microsoft-Windows-WindowsCodecsRaw-COlympusE300LoadRaw-Out-Of-Bounds-Write.html
|
|
CVE-2021-24093 - http://packetstormsecurity.com/files/161582/Microsoft-DirectWrite-fsg_ExecuteGlyph-Buffer-Overflow.html
|
|
CVE-2021-2410 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2411 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2412 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24122 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-24123 - https://wpscan.com/vulnerability/43aa30bf-eaf8-467a-93a1-78f9bdb37b36
|
|
CVE-2021-24124 - https://wpscan.com/vulnerability/8d0eb0b4-0cc0-44e5-b720-90b01df3a6ee
|
|
CVE-2021-24125 - https://wpscan.com/vulnerability/8591b3c9-b041-4ff5-b8d9-6f9f81041178
|
|
CVE-2021-24126 - https://wpscan.com/vulnerability/f3952bd1-ac2f-4007-9e19-6c44a22465f3
|
|
CVE-2021-24127 - https://wpscan.com/vulnerability/1fbd9f7a-6f99-45a2-9d57-01631a1f35d6
|
|
CVE-2021-24128 - https://wpscan.com/vulnerability/11dc3325-e696-4c9e-ba10-968416d5c864
|
|
CVE-2021-24129 - https://wpscan.com/vulnerability/c8537e5f-1948-418b-9d29-3cf50cd8f9a6
|
|
CVE-2021-24130 - https://wpscan.com/vulnerability/46af9a4d-67ac-4e08-a753-a2a44245f4f8
|
|
CVE-2021-24131 - https://wpscan.com/vulnerability/1bc28021-28c0-43fa-b89e-6b93c345e5d8
|
|
CVE-2021-24132 - https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c
|
|
CVE-2021-24133 - https://wpscan.com/vulnerability/a72a5be4-654b-496f-94cd-3814c0e40120
|
|
CVE-2021-24134 - https://wpscan.com/vulnerability/8f3cca92-d072-4806-9142-7f1a987f840b
|
|
CVE-2021-24135 - https://wpscan.com/vulnerability/07e9e70b-97a6-42e3-b0de-8cb69dedcbd3
|
|
CVE-2021-24136 - https://wpscan.com/vulnerability/537ee410-3833-4e88-9d4a-ee3c72b44ca1
|
|
CVE-2021-24137 - https://wpscan.com/vulnerability/9eb94e55-765b-4df5-baea-b247ef72aef3
|
|
CVE-2021-24138 - https://wpscan.com/vulnerability/aafac655-3616-4b27-9d0f-1cbc2faf0151
|
|
CVE-2021-24139 - https://wpscan.com/vulnerability/2e33088e-7b93-44af-aa6a-e5d924f86e28
|
|
CVE-2021-2414 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24140 - https://wpscan.com/vulnerability/1876312e-3dba-4909-97a5-afbb76fbc056
|
|
CVE-2021-24141 - https://wpscan.com/vulnerability/5c8adca0-fe19-4624-81ef-465b8d007f93
|
|
CVE-2021-24142 - https://wpscan.com/vulnerability/19800898-d7b6-4edd-887b-dac3c0597f14
|
|
CVE-2021-24143 - https://wpscan.com/vulnerability/02c5e10c-1ac7-447e-8ae5-b6d251be750b
|
|
CVE-2021-24144 - https://wpscan.com/vulnerability/143cdaff-c536-4ff9-8d64-c617511ddd48
|
|
CVE-2021-24145 - http://packetstormsecurity.com/files/163346/WordPress-Modern-Events-Calendar-5.16.2-Shell-Upload.html
|
|
CVE-2021-24145 - http://packetstormsecurity.com/files/163672/WordPress-Modern-Events-Calendar-Remote-Code-Execution.html
|
|
CVE-2021-24145 - https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610
|
|
CVE-2021-24146 - http://packetstormsecurity.com/files/163345/WordPress-Modern-Events-Calendar-5.16.2-Information-Disclosure.html
|
|
CVE-2021-24146 - https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc
|
|
CVE-2021-24147 - https://wpscan.com/vulnerability/0f9ba284-5d7e-4092-8344-c68316b0146f
|
|
CVE-2021-24148 - https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882
|
|
CVE-2021-24149 - https://wpscan.com/vulnerability/26819680-22a8-4348-b63d-dc52c0d50ed0
|
|
CVE-2021-2415 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24150 - https://wpscan.com/vulnerability/6bc6023f-a5e7-4665-896c-95afa5b638fb
|
|
CVE-2021-24151 - https://wpscan.com/vulnerability/5ee77dd7-5a73-4d4e-8038-23e6e763e20c/
|
|
CVE-2021-24152 - https://wpscan.com/vulnerability/597e9686-f4e2-43bf-85ef-c5967e5652bd
|
|
CVE-2021-24153 - https://packetstormsecurity.com/files/138192/
|
|
CVE-2021-24154 - https://wpscan.com/vulnerability/566c6836-fc3d-4dd9-b351-c3d9da9ec22e
|
|
CVE-2021-24155 - http://packetstormsecurity.com/files/163382/WordPress-Backup-Guard-1.5.8-Shell-Upload.html
|
|
CVE-2021-24155 - http://packetstormsecurity.com/files/163623/WordPress-Backup-Guard-Authenticated-Remote-Code-Execution.html
|
|
CVE-2021-24155 - https://wpscan.com/vulnerability/d442acac-4394-45e4-b6bb-adf4a40960fb
|
|
CVE-2021-24156 - https://wpscan.com/vulnerability/8b6f4a77-4008-4730-9a91-fa055a8b3e68
|
|
CVE-2021-24157 - https://wpscan.com/vulnerability/28e42f4e-e38a-4bf4-b51b-d8f21c40f037
|
|
CVE-2021-24158 - https://wpscan.com/vulnerability/d81d0e72-9bb5-47ef-a796-3b305a4b604f
|
|
CVE-2021-24159 - https://wpscan.com/vulnerability/363182f1-9fda-4363-8f6a-be37c4c07aa9
|
|
CVE-2021-2416 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24160 - https://wpscan.com/vulnerability/066ba5d4-4aaa-4462-b106-500c1f291c37
|
|
CVE-2021-24161 - https://wpscan.com/vulnerability/efca27e0-bdb6-4497-8330-081f909d6933
|
|
CVE-2021-24162 - https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5
|
|
CVE-2021-24163 - https://wpscan.com/vulnerability/55fde9fa-f6cd-4546-bee8-4acc628251c2
|
|
CVE-2021-24164 - https://wpscan.com/vulnerability/dfa32afa-c6de-4237-a9f2-709843dcda89
|
|
CVE-2021-24165 - https://wpscan.com/vulnerability/6147acf5-e43f-47e6-ab56-c9c8be584818
|
|
CVE-2021-24166 - https://wpscan.com/vulnerability/b531fb65-a8ff-4150-a9a1-2a62a3c00bd6
|
|
CVE-2021-24168 - https://wpscan.com/vulnerability/bfaa7d79-904e-45f1-bc42-ddd90a65ce74
|
|
CVE-2021-24169 - http://packetstormsecurity.com/files/164263/WordPress-Advanced-Order-Export-For-WooCommerce-3.1.7-Cross-Site-Scripting.html
|
|
CVE-2021-24169 - https://wpscan.com/vulnerability/09681a6c-57b8-4448-982a-fe8d28c87fc3
|
|
CVE-2021-2417 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24170 - https://wpscan.com/vulnerability/29fc5b0e-0a5f-4484-a1e6-a0a1206726cc
|
|
CVE-2021-24171 - https://www.wordfence.com/blog/2021/03/critical-vulnerability-patched-in-woocommerce-upload-files/
|
|
CVE-2021-24172 - https://wpscan.com/vulnerability/187e6967-6961-4843-a9d5-866f6ebdb7bc
|
|
CVE-2021-24173 - https://wpscan.com/vulnerability/b69ea1bc-3c9b-47d7-a164-c860ee46a9af
|
|
CVE-2021-24174 - http://packetstormsecurity.com/files/163091/WordPress-Database-Backups-1.2.2.6-Cross-Site-Request-Forgery.html
|
|
CVE-2021-24174 - https://wpscan.com/vulnerability/350c3e9a-bcc2-486a-90e6-d1dc13ce1bd5
|
|
CVE-2021-24175 - https://wpscan.com/vulnerability/c311feef-7041-4c21-9525-132b9bd32f89
|
|
CVE-2021-24175 - https://www.wordfence.com/blog/2021/03/critical-0-day-in-the-plus-addons-for-elementor-allows-site-takeover/
|
|
CVE-2021-24176 - https://ganofins.com/blog/my-first-cve-2021-24176/
|
|
CVE-2021-24176 - https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585
|
|
CVE-2021-24177 - https://n4nj0.github.io/advisories/wordpress-plugin-wp-file-manager-i/
|
|
CVE-2021-24178 - https://wpscan.com/vulnerability/700f3b04-8298-447c-8d3c-4581880a63b5
|
|
CVE-2021-24179 - https://wpscan.com/vulnerability/c0a5cdde-732a-432a-86c2-776df5d130a7
|
|
CVE-2021-2418 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24180 - https://wpscan.com/vulnerability/7593d5c8-cbc2-4469-b36b-5d4fb6d49718
|
|
CVE-2021-24181 - https://wpscan.com/vulnerability/d5a00322-7098-4f8d-8e5e-157b63449c17
|
|
CVE-2021-24182 - https://wpscan.com/vulnerability/f74dfc52-46ba-41e3-994b-23115a22984f
|
|
CVE-2021-24183 - https://wpscan.com/vulnerability/9b8da6b7-f1d6-4a7d-a621-4ca01e4b7496
|
|
CVE-2021-24184 - https://wpscan.com/vulnerability/5e85917c-7a58-49cb-b8b3-05aa18ffff3e
|
|
CVE-2021-24185 - https://wpscan.com/vulnerability/0cba5349-e916-43f0-a1fe-62cf73e352a2
|
|
CVE-2021-24186 - https://wpscan.com/vulnerability/5f5c0c6c-6f76-4366-b590-0aab557f8c60
|
|
CVE-2021-24187 - https://wpscan.com/vulnerability/c234700e-61dd-46a0-90fb-609e704269a9
|
|
CVE-2021-24188 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c
|
|
CVE-2021-24189 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c
|
|
CVE-2021-2419 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24190 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c
|
|
CVE-2021-24191 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c
|
|
CVE-2021-24192 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c
|
|
CVE-2021-24193 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c
|
|
CVE-2021-24194 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c
|
|
CVE-2021-24195 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c
|
|
CVE-2021-24196 - https://purinechu.github.io/posts/social_slider_widget_reflected_xss/
|
|
CVE-2021-24196 - https://wpscan.com/vulnerability/bb20d732-a5e4-4140-ab51-b2aa1a53db12
|
|
CVE-2021-24197 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/
|
|
CVE-2021-24198 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/
|
|
CVE-2021-24199 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/
|
|
CVE-2021-2420 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24200 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/
|
|
CVE-2021-24201 - https://wpscan.com/vulnerability/9647f516-b130-4cc8-85fb-2e69b034ced0
|
|
CVE-2021-24202 - https://wpscan.com/vulnerability/b72bd13d-c8e2-4347-b009-542fc0fe21bb
|
|
CVE-2021-24203 - https://wpscan.com/vulnerability/aa152ad0-5b3d-4d1f-88f4-6899a546e72e
|
|
CVE-2021-24204 - https://wpscan.com/vulnerability/772e172f-c8b4-4a6a-9eb9-9663295cfedf
|
|
CVE-2021-24205 - https://wpscan.com/vulnerability/ef23df6d-e265-44f6-bb94-1005b16d34d9
|
|
CVE-2021-24206 - https://wpscan.com/vulnerability/2f66efd9-7d55-4f33-9109-3cb583a0c309
|
|
CVE-2021-24207 - https://wpscan.com/vulnerability/21e7a46f-e9a3-4b20-b44a-a5b6ce7b7ce6
|
|
CVE-2021-24209 - https://wpscan.com/vulnerability/733d8a02-0d44-4b78-bbb2-37e447acd2f3
|
|
CVE-2021-2421 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24210 - https://wpscan.com/vulnerability/9b3c5412-8699-49e8-b60c-20d2085857fb
|
|
CVE-2021-24211 - https://wpscan.com/vulnerability/37e0a033-3dee-476d-ae86-68354e8f0b1c
|
|
CVE-2021-24212 - https://wpscan.com/vulnerability/cf9305e8-f5bc-45c3-82db-0ef00fd46129
|
|
CVE-2021-24213 - https://bentl.ee/posts/cve-givewp/
|
|
CVE-2021-24213 - https://wpscan.com/vulnerability/da4ab508-a423-4c7f-a1d4-42ec6f989309
|
|
CVE-2021-24214 - https://wpscan.com/vulnerability/31cf0dfb-4025-4898-a5f4-fc7115565a10
|
|
CVE-2021-24215 - https://wpscan.com/vulnerability/eec0f29f-a985-4285-8eed-d1855d204a20
|
|
CVE-2021-24216 - https://wpscan.com/vulnerability/87c6052c-2628-4987-a9a3-a03b5ca1e083
|
|
CVE-2021-24217 - https://wpscan.com/vulnerability/509f2754-a1a1-4142-9126-ae023a88533a
|
|
CVE-2021-24218 - https://wpscan.com/vulnerability/169d21fc-d191-46ff-82e8-9ac887aed8a4
|
|
CVE-2021-24219 - https://wpscan.com/vulnerability/35acd2d8-85fc-4af5-8f6c-224fa7d92900
|
|
CVE-2021-24219 - https://www.wordfence.com/blog/2021/03/recently-patched-vulnerability-in-thrive-themes-actively-exploited-in-the-wild
|
|
CVE-2021-2422 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24220 - https://wpscan.com/vulnerability/a2424354-2639-4f53-a24f-afc11f6c4cac
|
|
CVE-2021-24220 - https://www.wordfence.com/blog/2021/03/recently-patched-vulnerability-in-thrive-themes-actively-exploited-in-the-wild
|
|
CVE-2021-24221 - https://wpscan.com/vulnerability/3b52b25c-82a1-41c7-83ac-92e244f7c5ab
|
|
CVE-2021-24222 - https://wpscan.com/vulnerability/4d715de6-8595-4da9-808a-04a28e409900
|
|
CVE-2021-24223 - https://wpscan.com/vulnerability/d7a72183-0cd1-45de-b98b-2e295b27e5db
|
|
CVE-2021-24224 - https://wpscan.com/vulnerability/ed0c054b-54bf-4df8-9015-c76704c93484
|
|
CVE-2021-24225 - https://wpscan.com/vulnerability/25ca8af5-ab48-4e6d-b2ef-fc291742f1d5
|
|
CVE-2021-24226 - https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16
|
|
CVE-2021-2423 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24232 - https://wpscan.com/vulnerability/f06629b5-8b15-48eb-a7a7-78b693e06b71
|
|
CVE-2021-24233 - https://wpscan.com/vulnerability/ed620de5-1ad2-4480-b08b-719480472bc0
|
|
CVE-2021-24233 - https://www.getastra.com/blog/911/reflected-xss-found-in-cooked-pro-recipe-plugin-for-wordpress/
|
|
CVE-2021-24234 - https://wpscan.com/vulnerability/ecc620be-8e29-4860-9d32-86b5814a3835
|
|
CVE-2021-24235 - https://wpscan.com/vulnerability/eece90aa-582b-4c49-8b7c-14027f9df139
|
|
CVE-2021-24236 - https://wpscan.com/vulnerability/8f24e74f-60e3-4100-9ab2-ec31b9c9cdea
|
|
CVE-2021-24237 - https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e
|
|
CVE-2021-24238 - https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5
|
|
CVE-2021-24239 - https://wpscan.com/vulnerability/f1b67f40-642f-451e-a67a-b7487918ee34
|
|
CVE-2021-2424 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24240 - https://wpscan.com/vulnerability/10528cb2-12a1-43f7-9b7d-d75d18fdf5bb
|
|
CVE-2021-24241 - https://wpscan.com/vulnerability/d1e9c995-37bd-4952-b88e-945e02e3c83f
|
|
CVE-2021-24242 - https://wpscan.com/vulnerability/20f3e63a-31d8-49a0-b4ef-209749feff5c
|
|
CVE-2021-24243 - https://wpscan.com/vulnerability/3bc0733a-b949-40c9-a5fb-f56814fc4af3
|
|
CVE-2021-24244 - https://wpscan.com/vulnerability/354b98d8-46a1-4189-b347-198701ea59b9
|
|
CVE-2021-24245 - http://packetstormsecurity.com/files/162623/WordPress-Stop-Spammers-2021.8-Cross-Site-Scripting.html
|
|
CVE-2021-24245 - https://wpscan.com/vulnerability/5e7accd6-08dc-4c6e-9d19-73e2d7e97735
|
|
CVE-2021-24246 - https://wpscan.com/vulnerability/2365a9d0-f6f4-4602-9804-5af23d0cb11d
|
|
CVE-2021-24247 - https://wpscan.com/vulnerability/e2990a7a-d4f0-424e-b01d-ecf67cf9c9f3
|
|
CVE-2021-24248 - https://wpscan.com/vulnerability/ca886a34-cd2b-4032-9de1-8089b5cf3001
|
|
CVE-2021-24249 - https://wpscan.com/vulnerability/fc4cf749-34ef-43b8-a529-5065d698ab81
|
|
CVE-2021-2425 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24250 - https://wpscan.com/vulnerability/e23bf712-d891-4df7-99cc-9ef64f19f685
|
|
CVE-2021-24251 - https://wpscan.com/vulnerability/c9911236-4af3-4557-9bc0-217face534e1
|
|
CVE-2021-24252 - https://wpscan.com/vulnerability/91e81c6d-f24d-4f87-bc13-746715af8f7c
|
|
CVE-2021-24253 - https://wpscan.com/vulnerability/ee42c233-0ff6-4b27-a5ec-ad3246bef079
|
|
CVE-2021-24254 - https://wpscan.com/vulnerability/bb3e56dd-ae2e-45c2-a6c9-a59ae5fc1dc4
|
|
CVE-2021-24255 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24256 - https://wpscan.com/vulnerability/a9412fed-aed3-4931-a504-1a86f876892e
|
|
CVE-2021-24256 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24257 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24258 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24259 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-2426 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24260 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24261 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24262 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24263 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24264 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24265 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24266 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24267 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24268 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24269 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-2427 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24270 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24271 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24272 - http://packetstormsecurity.com/files/164261/WordPress-Fitness-Calculators-1.9.5-Cross-Site-Request-Forgery.html
|
|
CVE-2021-24272 - https://wpscan.com/vulnerability/e643040b-1f3b-4c13-8a20-acfd069dcc4f
|
|
CVE-2021-24273 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24274 - http://packetstormsecurity.com/files/164316/WordPress-Ultimate-Maps-1.2.4-Cross-Site-Scripting.html
|
|
CVE-2021-24274 - https://wpscan.com/vulnerability/200a3031-7c42-4189-96b1-bed9e0ab7c1d
|
|
CVE-2021-24275 - http://packetstormsecurity.com/files/164311/WordPress-Popup-1.10.4-Cross-Site-Scripting.html
|
|
CVE-2021-24275 - https://wpscan.com/vulnerability/efdc76e0-c14a-4baf-af70-9d381107308f
|
|
CVE-2021-24276 - http://packetstormsecurity.com/files/164308/WordPress-Contact-Form-1.7.14-Cross-Site-Scripting.html
|
|
CVE-2021-24276 - https://wpscan.com/vulnerability/1301123c-5e63-432a-ab90-3221ca532d9c
|
|
CVE-2021-24277 - https://wpscan.com/vulnerability/8ebf56be-46c0-4435-819f-dc30370eafa4
|
|
CVE-2021-24278 - https://wpscan.com/vulnerability/99f30604-d62b-4e30-afcd-b482f8d66413
|
|
CVE-2021-24279 - https://wpscan.com/vulnerability/75f7690d-7f6b-48a8-a9d1-95578a657920
|
|
CVE-2021-2428 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24280 - https://wpscan.com/vulnerability/db4ba6b0-887e-4ec1-8935-ab21d369b329
|
|
CVE-2021-24281 - https://wpscan.com/vulnerability/daf12b85-f5ad-4261-ab39-be6840ad3cdc
|
|
CVE-2021-24283 - https://wpscan.com/vulnerability/6ccd9990-e15f-4800-b499-f7c74b480051
|
|
CVE-2021-24284 - http://packetstormsecurity.com/files/167743/WordPress-Kaswara-Modern-WPBakery-Page-Builder-3.0.1-File-Upload.html
|
|
CVE-2021-24284 - https://wpscan.com/vulnerability/8d66e338-a88f-4610-8d12-43e8be2da8c5
|
|
CVE-2021-24285 - https://wpscan.com/vulnerability/f35d6ab7-dd52-48b3-a79c-3f89edf24162
|
|
CVE-2021-24286 - http://packetstormsecurity.com/files/164328/WordPress-Redirect-404-To-Parent-1.3.0-Cross-Site-Scripting.html
|
|
CVE-2021-24286 - https://wpscan.com/vulnerability/b9a535f3-cb0b-46fe-b345-da3462584e27
|
|
CVE-2021-24287 - http://packetstormsecurity.com/files/164327/WordPress-Select-All-Categories-And-Taxonomies-1.3.1-Cross-Site-Scripting.html
|
|
CVE-2021-24287 - https://wpscan.com/vulnerability/56e1bb56-bfc5-40dd-b2d0-edef43d89bdf
|
|
CVE-2021-24288 - https://wpscan.com/vulnerability/56628862-1687-4862-9ed4-145d8dfbca97
|
|
CVE-2021-24289 - https://wpscan.com/vulnerability/078e93cd-7cf2-4e23-8171-58d44e354d62
|
|
CVE-2021-2429 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24290 - https://wpscan.com/vulnerability/dc368484-f2fe-4c76-ba3d-e00e7f633719
|
|
CVE-2021-24291 - https://packetstormsecurity.com/files/162227/
|
|
CVE-2021-24291 - https://wpscan.com/vulnerability/cfb982b2-8b6d-4345-b3ab-3d2b130b873a
|
|
CVE-2021-24292 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/
|
|
CVE-2021-24293 - https://wpscan.com/vulnerability/5e1a4725-3d20-44b0-8a35-bbf4263957f7
|
|
CVE-2021-24294 - https://wpscan.com/vulnerability/43b8cfb4-f875-432b-8e3b-52653fdee87c
|
|
CVE-2021-24295 - https://www.wordfence.com/blog/2021/05/sql-injection-vulnerability-patched-in-cleantalk-antispam-plugin/
|
|
CVE-2021-24296 - https://wpscan.com/vulnerability/c450f54a-3372-49b2-8ad8-68d5cc0dd49e
|
|
CVE-2021-24297 - https://wpscan.com/vulnerability/a64a3b2e-7924-47aa-96e8-3aa02a6cdccc
|
|
CVE-2021-24298 - https://codevigilant.com/disclosure/2021/wp-plugin-giveasap-xss/
|
|
CVE-2021-24298 - https://wpscan.com/vulnerability/30aebded-3eb3-4dda-90b5-12de5e622c91
|
|
CVE-2021-24299 - http://packetstormsecurity.com/files/162756/WordPress-ReDi-Restaurant-Reservation-21.0307-Cross-Site-Scripting.html
|
|
CVE-2021-24299 - https://wpscan.com/vulnerability/fd6ce00b-8c5f-4180-b648-f47b37303670
|
|
CVE-2021-2430 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24300 - https://wpscan.com/vulnerability/5fbbc7ad-3f1a-48a1-b2eb-e57f153eb837
|
|
CVE-2021-24301 - https://wpscan.com/vulnerability/eb8e2b9d-f153-49c9-862a-5c016934f9ad
|
|
CVE-2021-24302 - https://wpscan.com/vulnerability/372a66ca-1c3c-4429-86a5-81dbdaa9ec7d
|
|
CVE-2021-24303 - https://github.com/ja9er/CVEProject/blob/main/wordpress_jiangqie-official-website-mini-program_sqli.md
|
|
CVE-2021-24303 - https://wpscan.com/vulnerability/cbd65b7d-d3c3-4ee3-8e5e-ff0eeeaa7b30
|
|
CVE-2021-24304 - https://wpscan.com/vulnerability/bb71f2f9-76bd-43f4-a8c9-35771dd28dff
|
|
CVE-2021-24305 - https://wpscan.com/vulnerability/4d55d1f5-a7b8-4029-942d-7a13e2498f64
|
|
CVE-2021-24306 - https://wpscan.com/vulnerability/35516555-c50c-486a-886c-df49c9e51e2c
|
|
CVE-2021-24307 - https://wpscan.com/vulnerability/ab2c94d2-f6c4-418b-bd14-711ed164bcf1
|
|
CVE-2021-24308 - http://packetstormsecurity.com/files/162856/WordPress-LifterLMS-4.21.0-Cross-Site-Scripting.html
|
|
CVE-2021-24308 - https://wpscan.com/vulnerability/f29f68a5-6575-441d-98c9-867145f2b082
|
|
CVE-2021-24309 - https://wpscan.com/vulnerability/ba1d01dc-16e4-464f-94be-ed311ff6ccf9
|
|
CVE-2021-2431 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24310 - https://wpscan.com/vulnerability/f34096ec-b1b0-471d-88a4-4699178a3165
|
|
CVE-2021-24311 - https://wpscan.com/vulnerability/4fb90999-6f91-4200-a0cc-bfe9b34a5de9
|
|
CVE-2021-24312 - https://wpscan.com/vulnerability/2142c3d3-9a7f-4e3c-8776-d469a355d62f
|
|
CVE-2021-24313 - https://bastijnouwendijk.com/cve-2021-24313/
|
|
CVE-2021-24313 - https://wpscan.com/vulnerability/c7ab736d-27c4-4ec5-9681-a3f0dda86586
|
|
CVE-2021-24314 - https://m0ze.ru/vulnerability/%5B2021-03-24%5D-%5BWordPress%5D-%5BCWE-89%5D-Goto-WordPress-Theme-v2.0.txt
|
|
CVE-2021-24314 - https://wpscan.com/vulnerability/1cc6dc17-b019-49dd-8149-c8bba165eb30
|
|
CVE-2021-24315 - https://m0ze.ru/vulnerability/%5B2021-04-02%5D-%5BWordPress%5D-%5BCWE-79%5D-GiveWP-WordPress-Plugin-v2.10.3.txt
|
|
CVE-2021-24315 - https://wpscan.com/vulnerability/006b37c9-641c-4676-a315-9b6053e001d2
|
|
CVE-2021-24316 - https://m0ze.ru/vulnerability/%5B2021-03-14%5D-%5BWordPress%5D-%5BCWE-79%5D-Mediumish-WordPress-Theme-v1.0.47.txt
|
|
CVE-2021-24316 - https://wpscan.com/vulnerability/57e27de4-58f5-46aa-9b59-809705733b2e
|
|
CVE-2021-24317 - https://m0ze.ru/vulnerability/%5B2021-02-10%5D-%5BWordPress%5D-%5BCWE-79%5D-Listeo-WordPress-Theme-v1.6.10.txt
|
|
CVE-2021-24317 - https://wpscan.com/vulnerability/704d8886-df9e-4217-88d1-a72a71924174
|
|
CVE-2021-24318 - https://m0ze.ru/vulnerability/%5B2021-02-10%5D-%5BWordPress%5D-%5BCWE-639%5D-Listeo-WordPress-Theme-v1.6.10.txt
|
|
CVE-2021-24318 - https://wpscan.com/vulnerability/9afa7e11-68b3-4196-975e-8b3f8e68ce56
|
|
CVE-2021-24319 - https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-1021%5D-Bello-WordPress-Theme-v1.5.9.txt
|
|
CVE-2021-24319 - https://wpscan.com/vulnerability/2c274eb7-25f1-49d4-a2c8-8ce8cecebe68
|
|
CVE-2021-2432 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366
|
|
CVE-2021-2432 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-2432 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24320 - https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-79%5D-Bello-WordPress-Theme-v1.5.9.txt
|
|
CVE-2021-24320 - https://wpscan.com/vulnerability/6b5b42fd-028a-4405-b027-3266058029bb
|
|
CVE-2021-24321 - https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-89%5D-Bello-WordPress-Theme-v1.5.9.txt
|
|
CVE-2021-24321 - https://wpscan.com/vulnerability/7314f9fa-c047-4e0c-b145-940240a50c02
|
|
CVE-2021-24322 - https://m0ze.ru/vulnerability/%5B2021-04-04%5D-%5BWordPress%5D-%5BCWE-79%5D-WP-DB-Backup-WordPress-Plugin-v2.3.3.txt
|
|
CVE-2021-24322 - https://wpscan.com/vulnerability/6bea6301-0762-45c3-a4eb-15d6ac4f9f37
|
|
CVE-2021-24323 - https://wpscan.com/vulnerability/6d262555-7ae4-4e36-add6-4baa34dc3010
|
|
CVE-2021-24324 - https://wpscan.com/vulnerability/63a24890-3735-4016-b4b7-4b070a842664
|
|
CVE-2021-24325 - https://wpscan.com/vulnerability/96e9a7fd-9ab8-478e-9420-4bca2a0b23a1
|
|
CVE-2021-24326 - https://wpscan.com/vulnerability/63d6ca03-e0df-40db-9839-531c13619094
|
|
CVE-2021-24327 - https://wpscan.com/vulnerability/ca8068f7-dcf0-44fd-841d-d02987220d79
|
|
CVE-2021-24328 - https://m0ze.ru/exploit/csrf-wp-login-security-and-history-v1.0.html
|
|
CVE-2021-24328 - https://m0ze.ru/vulnerability/%5B2021-03-29%5D-%5BWordPress%5D-%5BCWE-79%5D-WP-Login-Security-and-History-WordPress-Plugin-v1.0.txt
|
|
CVE-2021-24328 - https://wpscan.com/vulnerability/eeb41d7b-8f9e-4a12-b65f-f310f08e4ace
|
|
CVE-2021-24329 - https://wpscan.com/vulnerability/9df86d05-1408-4c22-af55-5e3d44249fd0
|
|
CVE-2021-2433 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24330 - https://wpscan.com/vulnerability/b9748066-83b7-4762-9124-de021f687477
|
|
CVE-2021-24331 - https://wpscan.com/vulnerability/2c7ca586-def8-4723-b779-09d7f37fa1ab
|
|
CVE-2021-24332 - https://wpscan.com/vulnerability/6678e064-ce21-4bb2-8c50-061073fb22fb
|
|
CVE-2021-24333 - https://m0ze.ru/exploit/csrf-prevent-content-copy-image-save-v1.3.html
|
|
CVE-2021-24333 - https://wpscan.com/vulnerability/c722f8d0-f86b-41c2-9f1f-48e475e22864
|
|
CVE-2021-24334 - https://wpscan.com/vulnerability/ae79189a-6b63-4110-9567-cd7c97d71e4f
|
|
CVE-2021-24335 - https://wpscan.com/vulnerability/39258aba-2449-4214-a490-b8e46945117d
|
|
CVE-2021-24336 - https://codevigilant.com/disclosure/2021/wp-plugin-flightlog-sql-injection/
|
|
CVE-2021-24336 - https://wpscan.com/vulnerability/dda0593e-cd97-454e-a8c8-15d7f690311c
|
|
CVE-2021-24337 - https://codevigilant.com/disclosure/2021/wp-plugin-video-embed-box/
|
|
CVE-2021-24337 - https://wpscan.com/vulnerability/a8fd8dd4-5b5e-462e-8dae-065d5e2d003a
|
|
CVE-2021-24338 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-24338
|
|
CVE-2021-24339 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-24339
|
|
CVE-2021-2434 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24340 - https://wpscan.com/vulnerability/d2970cfb-0aa9-4516-9a4b-32971f41a19c
|
|
CVE-2021-24341 - https://wpscan.com/vulnerability/1eba1c73-a19b-4226-afec-d27c48388a04
|
|
CVE-2021-24342 - https://wpscan.com/vulnerability/415ca763-fe65-48cb-acd3-b375a400217e
|
|
CVE-2021-24343 - https://wpscan.com/vulnerability/d6c72d90-e321-47b9-957a-6fea7c944293
|
|
CVE-2021-24344 - https://wpscan.com/vulnerability/6d6c1d46-5c3d-4d56-9728-2f94064132aa
|
|
CVE-2021-24345 - https://codevigilant.com/disclosure/2021/wp-plugin-sendit/
|
|
CVE-2021-24345 - https://wpscan.com/vulnerability/02ba4d8b-f4d2-42cd-9fae-b543e112fa04
|
|
CVE-2021-24346 - https://codevigilant.com/disclosure/2021/wp-plugin-stock-in/
|
|
CVE-2021-24346 - https://wpscan.com/vulnerability/c25146fd-4143-463c-8c85-05dd33e9a77b
|
|
CVE-2021-24347 - http://packetstormsecurity.com/files/163434/WordPress-SP-Project-And-Document-Manager-4.21-Shell-Upload.html
|
|
CVE-2021-24347 - http://packetstormsecurity.com/files/163675/WordPress-SP-Project-And-Document-Remote-Code-Execution.html
|
|
CVE-2021-24347 - https://wpscan.com/vulnerability/8f6e82d5-c0e9-468e-acb8-7cd549f6a45a
|
|
CVE-2021-24348 - https://codevigilant.com/disclosure/2021/wp-plugin-side-menu/
|
|
CVE-2021-24348 - https://wpscan.com/vulnerability/e0ca257e-6e78-4611-a9ad-be43d37cf474
|
|
CVE-2021-24349 - https://wpscan.com/vulnerability/6bb4eb71-d702-4732-b01f-b723077d66ca
|
|
CVE-2021-2435 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24350 - https://wpscan.com/vulnerability/06f1889d-8e2f-481a-b91b-3a8008e00ffc
|
|
CVE-2021-24351 - https://wpscan.com/vulnerability/2ee62f85-7aea-4b7d-8b2d-5d86d9fb8016
|
|
CVE-2021-24352 - https://wpscan.com/vulnerability/d770f1fa-7652-465a-833c-b7178146847d
|
|
CVE-2021-24353 - https://wpscan.com/vulnerability/74c23d56-e81f-47e9-bf8b-33d3f0e81894
|
|
CVE-2021-24354 - https://wpscan.com/vulnerability/8638b36c-6641-491f-b9df-5db3645e4668
|
|
CVE-2021-24355 - https://wpscan.com/vulnerability/ce8f9648-30fb-4fb9-894e-879dc0f26f98
|
|
CVE-2021-24356 - https://wpscan.com/vulnerability/be356530-5e00-4f27-8177-b80f3c1ae6e8
|
|
CVE-2021-24357 - https://wpscan.com/vulnerability/950f46ae-4476-4969-863a-0e55752953b3
|
|
CVE-2021-24358 - https://wpscan.com/vulnerability/fd4352ad-dae0-4404-94d1-11083cb1f44d
|
|
CVE-2021-24359 - https://wpscan.com/vulnerability/486b82d1-30d4-44d2-9542-f33e3f149e92
|
|
CVE-2021-2436 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24360 - https://wpscan.com/vulnerability/d9586453-cc5c-4d26-bb45-a6370c9427fe
|
|
CVE-2021-24361 - https://wpscan.com/vulnerability/5aff50fc-ac96-4076-a07c-bb145ae37025
|
|
CVE-2021-24362 - https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851a
|
|
CVE-2021-24363 - https://wpscan.com/vulnerability/1628935f-1d7d-4609-b7a9-e5526499c974
|
|
CVE-2021-24364 - https://wpscan.com/vulnerability/1d53fbe5-a879-42ca-a9d3-768a80018382
|
|
CVE-2021-24365 - https://wpscan.com/vulnerability/fdbeb137-b404-46c7-85fb-394a3bdac388
|
|
CVE-2021-24365 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-032.txt
|
|
CVE-2021-24366 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-24366
|
|
CVE-2021-24367 - https://wpscan.com/vulnerability/f35b7c8f-cfb6-42b6-8a3a-8c07cd1e9da0
|
|
CVE-2021-24368 - https://wpscan.com/vulnerability/7f2fda5b-45a5-4fc6-968f-90bc9674c999
|
|
CVE-2021-24369 - https://wpscan.com/vulnerability/1d1a731b-78f7-4d97-b40d-80f66700edae
|
|
CVE-2021-2437 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24370 - https://lists.openwall.net/full-disclosure/2020/11/17/2
|
|
CVE-2021-24370 - https://seclists.org/fulldisclosure/2020/Nov/30
|
|
CVE-2021-24370 - https://wpscan.com/vulnerability/82c52461-1fdc-41e4-9f51-f9dd84962b38
|
|
CVE-2021-24370 - https://www.wordfence.com/blog/2021/06/critical-0-day-in-fancy-product-designer-under-active-attack/
|
|
CVE-2021-24371 - https://codevigilant.com/disclosure/2021/wp-plugin-rsvpmaker/
|
|
CVE-2021-24371 - https://wpscan.com/vulnerability/63be225c-ebee-4cac-b43e-cf033ee7425d
|
|
CVE-2021-24372 - https://wpscan.com/vulnerability/5340ae4e-95ba-4a69-beb1-3459cac17782
|
|
CVE-2021-24373 - https://wpscan.com/vulnerability/fcf17278-609f-4f75-8a87-9b4579dee1c8
|
|
CVE-2021-24374 - https://wpscan.com/vulnerability/08a8a51c-49d3-4bce-b7e0-e365af1d8f33
|
|
CVE-2021-24375 - https://jetpack.com/2021/06/09/motor-wordpress-theme-vulnerabilities/
|
|
CVE-2021-24375 - https://wpscan.com/vulnerability/d9518429-79d3-4b13-88ff-3722d05efa9f
|
|
CVE-2021-24376 - https://wpscan.com/vulnerability/93edcc23-894a-46c2-84d2-407dcb64ba1e
|
|
CVE-2021-24377 - https://wpscan.com/vulnerability/85c0a564-2e56-413d-bc3a-1039343207e4
|
|
CVE-2021-24378 - https://wpscan.com/vulnerability/375bd694-1a30-41af-bbd4-8a8ee54f0dbf
|
|
CVE-2021-24379 - https://wpscan.com/vulnerability/aae7a889-195c-45a3-bbe4-e6d4cd2d7fd9
|
|
CVE-2021-2438 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24380 - https://wpscan.com/vulnerability/1dd0f9a8-22ab-4ecc-a925-605822739000
|
|
CVE-2021-24381 - https://wpscan.com/vulnerability/e383fae6-e0da-4aba-bb62-adf51c01bf8d
|
|
CVE-2021-24382 - https://wpscan.com/vulnerability/7b32a282-e51f-4ee5-b59f-5ba10e62a54d
|
|
CVE-2021-24383 - http://packetstormsecurity.com/files/163261/WordPress-WP-Google-Maps-8.1.11-Cross-Site-Scripting.html
|
|
CVE-2021-24383 - https://wpscan.com/vulnerability/1270588c-53fe-447e-b83c-1b877dc7a954
|
|
CVE-2021-24384 - https://wpscan.com/vulnerability/fb6c407c-713c-4e83-92ce-4e5f791be696
|
|
CVE-2021-24385 - https://wpscan.com/vulnerability/754ac750-0262-4f65-b23e-d5523995fbfa
|
|
CVE-2021-24386 - https://wpscan.com/vulnerability/e9b48b19-14cc-41ad-a029-f7f9ae236e4e
|
|
CVE-2021-24387 - https://wpscan.com/vulnerability/27264f30-71d5-4d2b-8f36-4009a2be6745
|
|
CVE-2021-24388 - https://wpscan.com/vulnerability/e3f6576f-08cb-4278-8c79-3ef4d0b85cd9
|
|
CVE-2021-24389 - https://wpscan.com/vulnerability/23b8b8c4-cded-4887-a021-5f3ea610213b
|
|
CVE-2021-2439 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24390 - https://codevigilant.com/disclosure/2021/wp-plugin-alipay/
|
|
CVE-2021-24390 - https://wpscan.com/vulnerability/92b0abec-082f-4545-9636-1b2f4dac66fe
|
|
CVE-2021-24391 - https://codevigilant.com/disclosure/2021/wp-plugin-cashtomer/
|
|
CVE-2021-24391 - https://wpscan.com/vulnerability/0c26ee50-df3d-438a-93bb-faa88b7983af
|
|
CVE-2021-24392 - https://codevigilant.com/disclosure/2021/wp-plugin-club-management-software/
|
|
CVE-2021-24392 - https://wpscan.com/vulnerability/68530e63-bba3-4a9a-ae83-516684aa5dc6
|
|
CVE-2021-24393 - https://codevigilant.com/disclosure/2021/wp-plugin-comment-highlighter/
|
|
CVE-2021-24393 - https://wpscan.com/vulnerability/24969766-19e3-47cd-b32c-6c3330651d1f
|
|
CVE-2021-24394 - https://codevigilant.com/disclosure/2021/wp-plugin-easy-testimonial-manager/
|
|
CVE-2021-24394 - https://wpscan.com/vulnerability/e0bc9251-cccc-4416-91b2-8395d89d8fb3
|
|
CVE-2021-24395 - https://codevigilant.com/disclosure/2021/wp-plugin-embed-youtube-video/
|
|
CVE-2021-24395 - https://wpscan.com/vulnerability/6cd9ebcf-e78f-4f97-a8f9-b7e4ceab66b7
|
|
CVE-2021-24396 - https://codevigilant.com/disclosure/2021/wp-plugin-gseor/
|
|
CVE-2021-24396 - https://wpscan.com/vulnerability/28687291-2369-49e0-8905-dc4359454830
|
|
CVE-2021-24397 - https://codevigilant.com/disclosure/2021/wp-plugin-microcopy/
|
|
CVE-2021-24397 - https://wpscan.com/vulnerability/2edab2b0-d4fd-4d50-aca0-2a1b7b37c23d
|
|
CVE-2021-24398 - https://codevigilant.com/disclosure/2021/wp-plugin-morpheus-slider/
|
|
CVE-2021-24398 - https://wpscan.com/vulnerability/e6fb2256-0214-4891-b4b7-e4371a1599a5
|
|
CVE-2021-24399 - https://codevigilant.com/disclosure/2021/wp-plugin-the-sorter/
|
|
CVE-2021-24399 - https://wpscan.com/vulnerability/f7af0795-f111-4acc-9b1e-63cae5862f8b
|
|
CVE-2021-2440 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24400 - https://codevigilant.com/disclosure/2021/wp-plugin-wp-display-users/
|
|
CVE-2021-24400 - https://wpscan.com/vulnerability/614cf338-c8cf-4570-ae83-4f79cbdcc9d5
|
|
CVE-2021-24401 - https://codevigilant.com/disclosure/2021/wp-plugins-domain-redirect/
|
|
CVE-2021-24401 - https://wpscan.com/vulnerability/f9ae34a9-84c9-4d48-af6a-9e6c786f856e
|
|
CVE-2021-24402 - https://codevigilant.com/disclosure/2021/wp-plugin-wp-icommerce/
|
|
CVE-2021-24402 - https://wpscan.com/vulnerability/7840e664-907f-42d1-950d-8c919032b707
|
|
CVE-2021-24403 - https://codevigilant.com/disclosure/2021/wp-plugin-wpagecontact/
|
|
CVE-2021-24403 - https://wpscan.com/vulnerability/a87040c1-58fc-4bf7-8bfa-0b9712a62ba8
|
|
CVE-2021-24404 - https://codevigilant.com/disclosure/2021/wp-plugin-wp-board/
|
|
CVE-2021-24404 - https://wpscan.com/vulnerability/a86240e1-f064-4972-9f97-6b349fdd57f6
|
|
CVE-2021-24405 - http://packetstormsecurity.com/files/166543/WordPress-Easy-Cookie-Policy-1.6.2-Cross-Site-Scripting.html
|
|
CVE-2021-24405 - https://wpscan.com/vulnerability/9157d6d2-4bda-4fcd-8192-363a63a51ff5
|
|
CVE-2021-24406 - https://wpscan.com/vulnerability/a9284931-555b-4c96-86a3-09e1040b0388
|
|
CVE-2021-24407 - https://wpscan.com/vulnerability/fba9f010-1202-4eea-a6f5-78865c084153
|
|
CVE-2021-24408 - https://wpscan.com/vulnerability/51855853-e7bd-425f-802c-824209f4f84d
|
|
CVE-2021-24409 - https://wpscan.com/vulnerability/ae3cd3ed-aecd-4d8c-8a2b-2936aaaef0cf
|
|
CVE-2021-2441 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24410 - https://wpscan.com/vulnerability/b47ea36e-f37c-4745-b750-31f5b91f543f
|
|
CVE-2021-24411 - https://wpscan.com/vulnerability/ebe7f625-67e1-4df5-a569-20526dd57b24
|
|
CVE-2021-24412 - https://wpscan.com/vulnerability/c4ed3e52-cbe0-46dc-ab43-65de78cfb225
|
|
CVE-2021-24413 - https://wpscan.com/vulnerability/ce6d17c3-6741-4c80-ab13-e1824960ae24
|
|
CVE-2021-24414 - https://wpscan.com/vulnerability/e20b805d-eb11-4702-9803-77de276000ac
|
|
CVE-2021-24415 - https://wpscan.com/vulnerability/fd312bfd-7c98-4682-877d-846442e9c6a2
|
|
CVE-2021-24416 - https://wpscan.com/vulnerability/260c7e2d-d48c-42d6-ae05-bad3f3bac01d
|
|
CVE-2021-24418 - https://wpscan.com/vulnerability/1512bba9-89e2-493d-b85d-10c7acb903db
|
|
CVE-2021-24419 - https://wpscan.com/vulnerability/0eeff1ee-d11e-4d52-a032-5f5bd8a6a2d7
|
|
CVE-2021-2442 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24420 - https://wpscan.com/vulnerability/426eafb1-0261-4e7e-8c70-75bf4c476f18
|
|
CVE-2021-24421 - https://wpscan.com/vulnerability/b378d36d-66d9-4373-a628-e379e4766375
|
|
CVE-2021-24423 - https://wpscan.com/vulnerability/541974d6-2df8-4497-9aee-afd3b9024102
|
|
CVE-2021-24424 - https://wpscan.com/vulnerability/90cf8f9d-4d37-405d-b161-239bdb281828
|
|
CVE-2021-24425 - https://wpscan.com/vulnerability/14632fa8-597e-49ff-8583-9797208a3583
|
|
CVE-2021-24426 - https://wpscan.com/vulnerability/48464b3f-fe57-40fe-8868-398a36099fb9
|
|
CVE-2021-24427 - https://wpscan.com/vulnerability/5da5ce9a-82a6-404f-8dec-795d7905b3f9
|
|
CVE-2021-24428 - https://wpscan.com/vulnerability/9fcf6ebe-01d9-4730-a20e-58b192bb6d87
|
|
CVE-2021-24429 - https://wpscan.com/vulnerability/e922b788-7da5-43b4-9b05-839c8610252a
|
|
CVE-2021-2443 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24430 - https://wpscan.com/vulnerability/945d6d2e-fa25-42c0-a7b4-b1794732a0df
|
|
CVE-2021-24431 - https://wpscan.com/vulnerability/ae50cec9-5f80-4221-b6a8-4593ab66c37b
|
|
CVE-2021-24432 - https://wpscan.com/vulnerability/b92ec5f7-d6a8-476f-a01e-21001a558914/
|
|
CVE-2021-24433 - https://wpscan.com/vulnerability/2ce8c786-ba82-427c-b5e7-e3b300a24c5f/
|
|
CVE-2021-24434 - https://wpscan.com/vulnerability/dbea2dc2-83f6-4e70-b044-a68a4c9b9c39
|
|
CVE-2021-24435 - https://wpscan.com/vulnerability/a88ffc42-6611-406e-8660-3af24c9cc5e8
|
|
CVE-2021-24436 - https://wpscan.com/vulnerability/05988ebb-7378-4a3a-9d2d-30f8f58fe9ef
|
|
CVE-2021-24437 - https://wpscan.com/vulnerability/ed9d26be-cc96-4274-a05b-0b7ad9d8cfd9
|
|
CVE-2021-24438 - https://wpscan.com/vulnerability/af472879-9328-45c2-957f-e7bed77e4c2d
|
|
CVE-2021-24439 - https://wpscan.com/vulnerability/9c538c51-ae58-461d-b93b-cc9dfebf2bc0
|
|
CVE-2021-2444 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24440 - https://wpscan.com/vulnerability/ba4503f7-684e-4274-bc53-3aa848712496
|
|
CVE-2021-24441 - https://wpscan.com/vulnerability/ec9292b1-5cbd-4332-bdb6-2351c94f5ac6
|
|
CVE-2021-24442 - https://wpscan.com/vulnerability/7376666e-9b2a-4239-b11f-8544435b444a
|
|
CVE-2021-24443 - https://wpscan.com/vulnerability/a4432acd-df49-4a4f-8184-b55cdd5d4d34
|
|
CVE-2021-24444 - http://packetstormsecurity.com/files/164604/WordPress-TaxoPress-3.0.7.1-Cross-Site-Scripting.html
|
|
CVE-2021-24444 - https://wpscan.com/vulnerability/a31321fe-adc6-4480-a220-35aedca52b8b
|
|
CVE-2021-24445 - https://wpscan.com/vulnerability/d60634a3-ca39-43be-893b-ff9ba625360f
|
|
CVE-2021-24446 - https://wpscan.com/vulnerability/be55131b-d9f2-4ac1-b667-c544c066887f
|
|
CVE-2021-24447 - https://wpscan.com/vulnerability/fb9dbcdf-4ffd-484d-9b67-283683d050fd
|
|
CVE-2021-24448 - https://wpscan.com/vulnerability/81e42812-93eb-480d-a2d2-5ba5e02dd0ba
|
|
CVE-2021-2445 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24450 - https://wpscan.com/vulnerability/a8625579-fe8f-4bc1-a641-0e26ad141c92
|
|
CVE-2021-24451 - https://wpscan.com/vulnerability/40603382-404b-44a2-8212-f2008366891c
|
|
CVE-2021-24452 - https://wpscan.com/vulnerability/3e855e09-056f-45b5-89a9-d644b7d8c9d0
|
|
CVE-2021-24453 - https://wpscan.com/vulnerability/78575072-4e04-4a8a-baec-f313cfffe829
|
|
CVE-2021-24454 - https://wpscan.com/vulnerability/48ade7a5-5abb-4267-b9b6-13e31e1b3e91
|
|
CVE-2021-24455 - https://wpscan.com/vulnerability/9ef14cf1-1e04-4125-a296-9aa5388612f9
|
|
CVE-2021-24456 - https://wpscan.com/vulnerability/929ad37d-9cdb-4117-8cd3-cf7130a7c9d4
|
|
CVE-2021-24457 - https://wpscan.com/vulnerability/97f4f7da-22a8-42a6-88ac-82e95a6c06dd
|
|
CVE-2021-24458 - https://wpscan.com/vulnerability/8a588266-54cd-4779-adcf-f9b9e226c297
|
|
CVE-2021-24459 - https://wpscan.com/vulnerability/3fafbec0-55e4-41cf-8402-1b57b6615225
|
|
CVE-2021-2446 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24460 - https://wpscan.com/vulnerability/9c0164f2-464b-4876-a48f-c0ebd63cf397
|
|
CVE-2021-24461 - https://wpscan.com/vulnerability/311974b5-6d6e-4b47-a33d-6d8f468aa528
|
|
CVE-2021-24462 - https://wpscan.com/vulnerability/e24dac6d-de48-42c1-bdde-4a45fb331376
|
|
CVE-2021-24463 - https://wpscan.com/vulnerability/994e6198-f0e9-4e30-989f-b5a3dfe95ded
|
|
CVE-2021-24464 - https://wpscan.com/vulnerability/531b3fac-48b9-4821-a3aa-4db073d43aae
|
|
CVE-2021-24465 - https://wpscan.com/vulnerability/08dbe202-0136-4502-87e7-5e984dc27b16
|
|
CVE-2021-24466 - https://wpscan.com/vulnerability/37c7bdbb-f27f-47d3-9886-69d2e83d7581
|
|
CVE-2021-24467 - https://wpscan.com/vulnerability/ac32d265-066e-49ec-9042-3145cd99e2e8
|
|
CVE-2021-24468 - https://wpscan.com/vulnerability/4b7c61da-952c-492a-8ce6-3c2126942a7c
|
|
CVE-2021-2447 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24470 - https://wpscan.com/vulnerability/b01a85cc-0e45-4183-a916-19476354d5d4
|
|
CVE-2021-24471 - https://wpscan.com/vulnerability/a8ccb09a-9f8c-448f-b2d0-9b01c3a748ac
|
|
CVE-2021-24472 - https://wpscan.com/vulnerability/17591ac5-88fa-4cae-a61a-4dcf5dc0b72a
|
|
CVE-2021-24473 - https://wpscan.com/vulnerability/79982ea9-4733-4b1e-a43e-17629c1136de
|
|
CVE-2021-24474 - https://wpscan.com/vulnerability/49bc46a8-9d55-4fa1-8e0d-0556a6336fa0
|
|
CVE-2021-24476 - https://wpscan.com/vulnerability/d1885641-9547-4dd5-84be-ba4a160ee1f5
|
|
CVE-2021-24477 - https://wpscan.com/vulnerability/7915070f-1d9b-43c3-b01e-fec35f633a4d
|
|
CVE-2021-24478 - https://wpscan.com/vulnerability/c73818e5-0734-46c9-9703-d211b4f58664
|
|
CVE-2021-24479 - https://wpscan.com/vulnerability/5fd2246a-fbd9-4f2a-8b0b-a64c3f91157c
|
|
CVE-2021-2448 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24480 - https://wpscan.com/vulnerability/243d417a-6fb9-4e17-9e12-a8c605f9af8a
|
|
CVE-2021-24481 - https://wpscan.com/vulnerability/a4c352de-9815-4dfe-ac51-65b5bfb37438
|
|
CVE-2021-24482 - https://wpscan.com/vulnerability/2f86e418-22fd-4cb8-8de1-062b17cf20a7
|
|
CVE-2021-24483 - https://wpscan.com/vulnerability/0dc931c6-1fce-4d70-a658-a4bbab10dab3
|
|
CVE-2021-24484 - https://wpscan.com/vulnerability/9ce0153d-4a8b-4215-b6b6-15ca68c4f52c
|
|
CVE-2021-24485 - https://wpscan.com/vulnerability/4a6b278a-4c11-4624-86bf-754212979643
|
|
CVE-2021-24486 - https://wpscan.com/vulnerability/324e6b7b-a2ac-4c08-8b97-0967513f7328
|
|
CVE-2021-24487 - https://wpscan.com/vulnerability/def352f8-1bbe-4263-ad1a-1486140269f4
|
|
CVE-2021-24488 - https://wpscan.com/vulnerability/1fc0aace-ba85-4939-9007-d150960add4a
|
|
CVE-2021-24489 - https://wpscan.com/vulnerability/36e8efe8-b29f-4c9e-9dd5-3e317aa43e0c
|
|
CVE-2021-2449 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24490 - https://wpscan.com/vulnerability/4ea0127e-afef-41bf-a005-c57432f9f58c
|
|
CVE-2021-24491 - https://wpscan.com/vulnerability/ddd37827-f4c1-4806-8846-d06d9fbf23dd
|
|
CVE-2021-24492 - https://codevigilant.com/disclosure/2021/wp-plugin-handsome-testimonials/
|
|
CVE-2021-24492 - https://wpscan.com/vulnerability/42760007-0e59-4d45-8d64-86bc0b8dacea
|
|
CVE-2021-24493 - https://wpscan.com/vulnerability/dcc7be04-550b-427a-a14f-a2365d96a00e
|
|
CVE-2021-24494 - https://wpscan.com/vulnerability/8f14733e-84c3-4f7c-93f8-e27c74519160
|
|
CVE-2021-24495 - https://wpscan.com/vulnerability/d11b79a3-f762-49ab-b7c8-3174624d7638
|
|
CVE-2021-24496 - https://wpscan.com/vulnerability/5fd1cb7f-a036-4c5b-9557-0ffd4ef6b834
|
|
CVE-2021-24497 - https://wpscan.com/vulnerability/a1cf08fe-943a-4f14-beb0-25216011b538
|
|
CVE-2021-24498 - https://wpscan.com/vulnerability/3c5a5187-42b3-4f88-9b0e-4fdfa1c39e86
|
|
CVE-2021-24499 - http://packetstormsecurity.com/files/172876/WordPress-Workreap-2.2.2-Shell-Upload.html
|
|
CVE-2021-24499 - https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/
|
|
CVE-2021-24499 - https://wpscan.com/vulnerability/74611d5f-afba-42ae-bc19-777cdf2808cb
|
|
CVE-2021-2450 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24500 - https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/
|
|
CVE-2021-24500 - https://wpscan.com/vulnerability/0c4b5ecc-54d0-45ec-9f92-b2ca3cadbe56
|
|
CVE-2021-24501 - https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/
|
|
CVE-2021-24501 - https://wpscan.com/vulnerability/66e4aaf4-5ef7-4da8-a45c-e24f449c363e
|
|
CVE-2021-24502 - https://wpscan.com/vulnerability/f95c3a48-5228-4047-9b92-de985741d157
|
|
CVE-2021-24503 - https://wpscan.com/vulnerability/18ab1570-2b4a-48a4-86e6-c1d368563691
|
|
CVE-2021-24504 - https://wpscan.com/vulnerability/e0182508-23f4-4bdb-a1ef-1d1be38f3ad1
|
|
CVE-2021-24505 - https://wpscan.com/vulnerability/550e08ac-4c3a-4e22-8e98-bc5bfc020ca9
|
|
CVE-2021-24506 - https://wpscan.com/vulnerability/52c8755c-46b9-4383-8c8d-8816f03456b0
|
|
CVE-2021-24507 - https://wpscan.com/vulnerability/a1a0dc0b-c351-4d46-ac9b-b297ce4d251c
|
|
CVE-2021-24508 - https://wpscan.com/vulnerability/2b543740-d4b0-49b5-a021-454a3a72162f
|
|
CVE-2021-24509 - https://wpscan.com/vulnerability/06df2729-21da-4c22-ae1e-dda1f15bdf8f
|
|
CVE-2021-2451 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24510 - https://wpscan.com/vulnerability/715721b0-13a1-413a-864d-2380f38ecd39
|
|
CVE-2021-24511 - https://codevigilant.com/disclosure/2021/wp-plugin-purple-xmls-google-product-feed-for-woocommerce/
|
|
CVE-2021-24511 - https://wpscan.com/vulnerability/0fa114a0-29df-4312-9138-eb9f0aedb3c5
|
|
CVE-2021-24512 - https://wpscan.com/vulnerability/458a576e-a7ed-4758-a80c-cd08c370aaf4
|
|
CVE-2021-24513 - https://wpscan.com/vulnerability/a1dc0ea9-51dd-43c3-bfd9-c5106193aeb6
|
|
CVE-2021-24514 - https://wpscan.com/vulnerability/0afa78d3-2403-4e0c-8f16-5b7874b03cd2
|
|
CVE-2021-24515 - https://wpscan.com/vulnerability/6bbea7fe-e966-406b-ad06-0206fcc6f0a0
|
|
CVE-2021-24516 - https://wpscan.com/vulnerability/88d70e35-4c22-4bc7-b1a5-24068d55257c
|
|
CVE-2021-24517 - https://wpscan.com/vulnerability/f440edd8-94fe-440a-8a5b-e3d24dcfcbc1
|
|
CVE-2021-24518 - https://packetstormsecurity.com/files/163472/
|
|
CVE-2021-24518 - https://wpscan.com/vulnerability/53103cdc-a4bf-40fa-aeb1-790fc7a65f0a
|
|
CVE-2021-24519 - https://wpscan.com/vulnerability/368828f9-fdd1-4a82-8658-20e0f4c4da0c
|
|
CVE-2021-2452 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24520 - https://wpscan.com/vulnerability/f903aadd-17af-4ddf-8635-abb3338ac815
|
|
CVE-2021-24521 - https://github.com/pang0lin/CVEproject/blob/main/wordpress_side-menu-lite_sqli.md
|
|
CVE-2021-24521 - https://wpscan.com/vulnerability/eb21ebc5-265c-4378-b2c6-62f6bc2f69cd
|
|
CVE-2021-24522 - https://wpscan.com/vulnerability/25b51add-197c-4aff-b1a8-b92fb11d8697
|
|
CVE-2021-24523 - https://wpscan.com/vulnerability/832fe086-1d33-430b-bdb5-e444761576b2
|
|
CVE-2021-24524 - https://wpscan.com/vulnerability/5a4774ec-c0ee-4c6b-92a6-fa10821ec336
|
|
CVE-2021-24525 - https://wpscan.com/vulnerability/7f5659bd-50c3-4725-95f4-cf88812acf1c
|
|
CVE-2021-24526 - https://wpscan.com/vulnerability/17287d8a-ba27-42dc-9370-a931ef404995
|
|
CVE-2021-24527 - https://wpscan.com/vulnerability/c142e738-bc4b-4058-a03e-1be6fca47207
|
|
CVE-2021-24528 - https://wpscan.com/vulnerability/8b8d316b-96b2-4cdc-9da5-c9ea6108a85b
|
|
CVE-2021-24529 - https://wpscan.com/vulnerability/8953d931-19f9-4b73-991c-9c48db1af8b5
|
|
CVE-2021-2453 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24530 - https://wpscan.com/vulnerability/caf36ca5-aafd-48bd-a1e5-30f3973d8eb8
|
|
CVE-2021-24531 - https://wpscan.com/vulnerability/a5837621-ee6e-4876-9f65-82658fc0341f
|
|
CVE-2021-24533 - https://wpscan.com/vulnerability/174b2119-b806-4da4-a23d-c19b552c86cb
|
|
CVE-2021-24534 - https://wpscan.com/vulnerability/b968b9a1-67f3-4bef-a3d3-6e8942bb6570
|
|
CVE-2021-24535 - https://wpscan.com/vulnerability/351de889-9c0a-4637-bd06-0e1fe1d7e89f
|
|
CVE-2021-24536 - https://wpscan.com/vulnerability/e1ca9978-a44d-4717-b963-acaf56258fc9
|
|
CVE-2021-24537 - https://wpscan.com/vulnerability/0d6b46cb-5244-486f-ad70-4023907ac9eb
|
|
CVE-2021-24538 - https://wpscan.com/vulnerability/f9911a43-0f4c-403f-9fca-7822eb693317
|
|
CVE-2021-24539 - https://wpscan.com/vulnerability/4bda5dff-f577-4cd8-a225-c6b4c32f22b4
|
|
CVE-2021-2454 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24540 - https://wpscan.com/vulnerability/67910e5d-ea93-418b-af81-c50d0e05d213
|
|
CVE-2021-24541 - https://wpscan.com/vulnerability/e6602369-87f4-4454-8298-89cc69f8375c
|
|
CVE-2021-24543 - https://wpscan.com/vulnerability/aa23f743-811b-4fd1-81a9-42916342e312
|
|
CVE-2021-24544 - https://wpscan.com/vulnerability/4a2dddfc-6ce2-4edd-aaaa-4c130a9356d0
|
|
CVE-2021-24545 - https://wpscan.com/vulnerability/64267134-9d8c-4e0c-b24f-d18692a5775e
|
|
CVE-2021-24546 - https://wpscan.com/vulnerability/bdc36f6a-682d-4d66-b587-92e86085d971
|
|
CVE-2021-24547 - https://wpscan.com/vulnerability/faaeb685-ea02-4a5a-ac5f-87081efe94e0
|
|
CVE-2021-24548 - https://wpscan.com/vulnerability/10660c95-d366-4152-9ce8-b57c57a2ec6c
|
|
CVE-2021-24549 - https://codevigilant.com/disclosure/2021/wp-plugin-aceide/
|
|
CVE-2021-24549 - https://wpscan.com/vulnerability/c594abaf-b152-448c-8a20-9b3267fe547a
|
|
CVE-2021-2455 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24550 - https://codevigilant.com/disclosure/2021/wp-plugin-broken-link-manager/
|
|
CVE-2021-24550 - https://wpscan.com/vulnerability/1bf65448-689c-474d-a566-c9b6797d3e4a
|
|
CVE-2021-24551 - https://codevigilant.com/disclosure/2021/wp-plugin-edit-comments/
|
|
CVE-2021-24551 - https://wpscan.com/vulnerability/e62fb8db-384f-4384-ad24-e10eb9058ed5
|
|
CVE-2021-24552 - https://codevigilant.com/disclosure/2021/wp-plugin-simple-events-calendar/
|
|
CVE-2021-24552 - https://wpscan.com/vulnerability/3482a015-a5ed-4913-b516-9eae2b3f89db
|
|
CVE-2021-24553 - https://codevigilant.com/disclosure/2021/wp-plugin-timeline-calendar/
|
|
CVE-2021-24553 - https://wpscan.com/vulnerability/14c75a00-a52b-430b-92da-5145e5aee30a
|
|
CVE-2021-24554 - https://codevigilant.com/disclosure/2021/wp-plugin-wp-paytm-pay/
|
|
CVE-2021-24554 - https://wpscan.com/vulnerability/f2842ac8-76fa-4490-aa0c-5f2b07ecf2ad
|
|
CVE-2021-24555 - https://codevigilant.com/disclosure/2021/wp-plugin-diary-availability-calendar/
|
|
CVE-2021-24555 - https://wpscan.com/vulnerability/8eafd84b-6214-450b-869b-0afe7cca4c5f
|
|
CVE-2021-24556 - https://codevigilant.com/disclosure/2021/wp-plugin-email-subscriber/
|
|
CVE-2021-24556 - https://wpscan.com/vulnerability/f050aedc-f79f-4b27-acac-0cdb33b25af8
|
|
CVE-2021-24557 - https://codevigilant.com/disclosure/2021/wp-plugin-m-vslider/
|
|
CVE-2021-24557 - https://wpscan.com/vulnerability/8b8e41e8-5a40-4062-b5b7-3b01b1a709ef
|
|
CVE-2021-24558 - https://codevigilant.com/disclosure/2021/wp-plugin-project-status/
|
|
CVE-2021-24558 - https://wpscan.com/vulnerability/ca5f2152-fcfd-492d-a552-f9604011beff
|
|
CVE-2021-24559 - https://wpscan.com/vulnerability/65a29976-163a-4bbf-a4e8-590ddc4b83f2/
|
|
CVE-2021-2456 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24560 - https://wpscan.com/vulnerability/d51fcd97-e535-42dd-997a-edc2f5f12269
|
|
CVE-2021-24561 - https://wpscan.com/vulnerability/5433ef4c-4451-4b6e-992b-69c5eccabf90
|
|
CVE-2021-24562 - https://wpscan.com/vulnerability/d45bb744-4a0d-4af0-aa16-71f7e3ea6e00
|
|
CVE-2021-24563 - http://packetstormsecurity.com/files/165515/WordPress-Frontend-Uploader-1.3.2-Cross-Site-Scripting.html
|
|
CVE-2021-24563 - https://wpscan.com/vulnerability/e53ef41e-a176-4d00-916a-3a03835370f1
|
|
CVE-2021-24564 - https://wpscan.com/vulnerability/b25af0e1-392f-4305-ad44-50e64ef3dbdf
|
|
CVE-2021-24565 - https://wpscan.com/vulnerability/97bfef5e-2ee0-491a-a931-4f44c83e5be0
|
|
CVE-2021-24566 - https://jetpack.com/2021/07/22/severe-vulnerability-patched-in-woocommerce-currency-switcher/
|
|
CVE-2021-24567 - https://wpscan.com/vulnerability/a3cd3115-2181-4e14-8b39-4de096433847/
|
|
CVE-2021-24568 - https://wpscan.com/vulnerability/cf7c0207-adb2-44c6-9469-2b24dbfec83a
|
|
CVE-2021-24569 - https://wpscan.com/vulnerability/38053e05-4b17-4fa9-acd3-85d8529b202b
|
|
CVE-2021-2457 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24570 - https://wpscan.com/vulnerability/5c73754c-eebe-424a-9d3b-ca83eb53bf87
|
|
CVE-2021-24571 - https://wpscan.com/vulnerability/377fd65f-3a8c-4f7a-9e40-046d52ec0eef
|
|
CVE-2021-24572 - https://wpscan.com/vulnerability/7b1ebd26-ea8b-448c-a775-66a04102e44f
|
|
CVE-2021-24574 - https://wpscan.com/vulnerability/9adf7022-5108-43b7-bf0e-a42593185b74
|
|
CVE-2021-24575 - https://wpscan.com/vulnerability/83c9c3af-9eca-45e0-90d7-edc69e616e6a
|
|
CVE-2021-24576 - https://wpscan.com/vulnerability/4d0c60d1-db5a-4c4f-9bdb-669975ac7210
|
|
CVE-2021-24577 - https://wpscan.com/vulnerability/d453b547-41a8-4a6b-8349-8686b7054805
|
|
CVE-2021-24578 - https://wpscan.com/vulnerability/69351798-c790-42d4-9485-1813cd325769
|
|
CVE-2021-24579 - https://wpscan.com/vulnerability/08edce3f-2746-4886-8439-76e44ec76fa8
|
|
CVE-2021-2458 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24580 - https://wpscan.com/vulnerability/2faccd1b-4b1c-4b3e-b917-de2d05e860f8
|
|
CVE-2021-24581 - https://wpscan.com/vulnerability/75abd073-b45f-4fe6-8501-7a6d0163f78d
|
|
CVE-2021-24582 - https://wpscan.com/vulnerability/5a5293ed-ddcb-4a63-9420-09942e7d69c2
|
|
CVE-2021-24583 - https://wpscan.com/vulnerability/7aec4ef4-db3b-41fb-9177-88ce9d37bca6
|
|
CVE-2021-24584 - https://wpscan.com/vulnerability/60eadf75-8298-49de-877e-ce103fc34d58
|
|
CVE-2021-24585 - https://wpscan.com/vulnerability/cd288a92-903b-47c9-83ac-8e5b677e949b
|
|
CVE-2021-24586 - https://wpscan.com/vulnerability/e9885fba-0e73-41a0-9e1d-47badc09be85
|
|
CVE-2021-24587 - https://wpscan.com/vulnerability/bb5d94ad-e1ce-44e2-8403-d73fe75a146a
|
|
CVE-2021-24588 - https://wpscan.com/vulnerability/dc2ce546-9da1-442c-8ee2-cd660634501f
|
|
CVE-2021-24590 - https://wpscan.com/vulnerability/d6846774-1958-4c8d-bb64-af0d8c46e6e7
|
|
CVE-2021-24591 - https://wpscan.com/vulnerability/c5cbe3b4-2829-4fd2-8194-4b3a2ae0e257
|
|
CVE-2021-24592 - https://wpscan.com/vulnerability/9579ff13-9597-4a77-8cb9-997e35265d22
|
|
CVE-2021-24593 - https://wpscan.com/vulnerability/309296d4-c397-4fc7-85fb-a28b5b5b6a8d
|
|
CVE-2021-24594 - https://wpscan.com/vulnerability/cf7b0f07-8b9b-40a1-ba7b-e8d34f515a6b
|
|
CVE-2021-24595 - https://wpscan.com/vulnerability/c809bdb3-d820-4ce1-9cbc-e41985fb5052
|
|
CVE-2021-24596 - https://wpscan.com/vulnerability/b5def0e7-2b4a-43e0-8175-28b28aa2f8ae
|
|
CVE-2021-24597 - https://wpscan.com/vulnerability/37554d0e-68e2-4df9-8c59-65f5cd7f184e
|
|
CVE-2021-24598 - https://wpscan.com/vulnerability/365c09a7-0b10-4145-a415-5c0e9f429ae0
|
|
CVE-2021-24599 - https://wpscan.com/vulnerability/625a272f-5c69-4f6a-8eee-32f70cd4a558
|
|
CVE-2021-2460 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24600 - https://wpscan.com/vulnerability/413b3a2e-1c05-45ec-b00f-1c137a1ae33e
|
|
CVE-2021-24601 - https://wpscan.com/vulnerability/bb437706-a918-4d66-b027-b083ab486074
|
|
CVE-2021-24602 - https://wpscan.com/vulnerability/5fd2548a-08de-4417-bff1-f174dab718d5
|
|
CVE-2021-24603 - https://wpscan.com/vulnerability/72aea0e5-1fa7-4827-a173-59982202d323
|
|
CVE-2021-24604 - https://wpscan.com/vulnerability/d084c5b1-45f1-4e7e-b3e9-3c98ae4bce9c
|
|
CVE-2021-24605 - https://wpscan.com/vulnerability/e0be384c-3e63-49f6-b2ab-3024dcd88686
|
|
CVE-2021-24606 - https://wpscan.com/vulnerability/fe49f48a-f97a-44fe-8d71-be08e7ce4f83
|
|
CVE-2021-24607 - https://wpscan.com/vulnerability/efa7d91a-447b-4fd8-aa21-5364b177fee9
|
|
CVE-2021-24608 - https://wpscan.com/vulnerability/75305ea8-730b-4caf-a3c6-cb94adee683c
|
|
CVE-2021-24609 - https://wpscan.com/vulnerability/8b639743-3eb5-4f74-a156-76cb657bbe05
|
|
CVE-2021-2461 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24610 - http://packetstormsecurity.com/files/164306/WordPress-TranslatePress-2.0.8-Cross-Site-Scripting.html
|
|
CVE-2021-24610 - https://wpscan.com/vulnerability/b87fcc2f-c2eb-4e23-9757-d1c590f26d3f
|
|
CVE-2021-24611 - https://wpscan.com/vulnerability/b4a2e595-6971-4a2a-a346-ac4445a5e0cd
|
|
CVE-2021-24612 - https://wpscan.com/vulnerability/12f1ed97-d392-449d-b25c-42d241693888
|
|
CVE-2021-24613 - https://wpscan.com/vulnerability/0b8c5947-bc73-448e-8f10-a4f4456e4000
|
|
CVE-2021-24614 - https://wpscan.com/vulnerability/e8b5c609-dc67-4dce-b6bb-7d63c0c2a014
|
|
CVE-2021-24615 - https://wpscan.com/vulnerability/9d48313b-76d7-4252-9b81-2fdd0373561b
|
|
CVE-2021-24616 - https://wpscan.com/vulnerability/04eaf380-c345-425f-8800-142e3f4745a9
|
|
CVE-2021-24617 - https://wpscan.com/vulnerability/3e262cd7-ca64-4190-8d8c-38b07bbe63e0
|
|
CVE-2021-24618 - https://wpscan.com/vulnerability/d50b801a-16b5-45e9-a465-e3bb0445cb49
|
|
CVE-2021-24619 - https://wpscan.com/vulnerability/f360f383-0646-44ca-b49e-e2258dfbf3a6
|
|
CVE-2021-2462 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24620 - https://wpscan.com/vulnerability/1f2b3c4a-f7e9-4d22-b71e-f6b051fd8349
|
|
CVE-2021-24621 - https://wpscan.com/vulnerability/bfbb32ac-9ef9-46de-8e5e-7d6d6fb868d8
|
|
CVE-2021-24622 - https://wpscan.com/vulnerability/41a2c72c-7db1-473a-8844-47f6ae9d0594
|
|
CVE-2021-24623 - https://wpscan.com/vulnerability/41d9027c-a982-44c7-889e-721333496b5c
|
|
CVE-2021-24624 - https://wpscan.com/vulnerability/d79d2f6a-257a-4c9e-b971-9837abd4211c
|
|
CVE-2021-24625 - https://codevigilant.com/disclosure/2021/wp-plugin-catalog/
|
|
CVE-2021-24625 - https://wpscan.com/vulnerability/33e4d7c6-fa6f-459f-84b9-732ec40088b8
|
|
CVE-2021-24626 - https://codevigilant.com/disclosure/2021/wp-plugin-chameleon-css/
|
|
CVE-2021-24626 - https://wpscan.com/vulnerability/06cb6c14-99b8-45b6-be2e-f4dcca8a4165
|
|
CVE-2021-24627 - https://codevigilant.com/disclosure/2021/wp-plugin-g-auto-hyperlink/
|
|
CVE-2021-24627 - https://wpscan.com/vulnerability/c04ea768-150f-41b8-b08c-78d1ae006bbb
|
|
CVE-2021-24628 - https://codevigilant.com/disclosure/2021/wp-plugin-mwp-forms/
|
|
CVE-2021-24628 - https://wpscan.com/vulnerability/d742ab35-4e2d-42a8-bebc-b953b2e10e3c
|
|
CVE-2021-24629 - https://codevigilant.com/disclosure/2021/wp-plugin-post-content-xmlrpc/
|
|
CVE-2021-24629 - https://wpscan.com/vulnerability/fb42980c-93e5-42d5-a478-c2b348eaea67
|
|
CVE-2021-2463 - https://www.oracle.com/security-alerts/cpujul2021.html
|
|
CVE-2021-24630 - https://codevigilant.com/disclosure/2021/wp-plugin-schreikasten/
|
|
CVE-2021-24630 - https://wpscan.com/vulnerability/a0787dae-a4b7-4248-9960-aaffabfaeb9f
|
|
CVE-2021-24631 - https://codevigilant.com/disclosure/2021/wp-plugin-unlimited-popups/
|
|
CVE-2021-24631 - https://wpscan.com/vulnerability/9841176d-1d37-4636-9144-0ca42b6f3605
|
|
CVE-2021-24632 - https://wpscan.com/vulnerability/55cd6d5e-92c1-407a-8c0f-f89d415ebb66
|
|
CVE-2021-24633 - https://wpscan.com/vulnerability/431901eb-0f95-4033-b943-324e6d3844a5
|
|
CVE-2021-24634 - https://wpscan.com/vulnerability/a49c5a5b-57c0-4801-8bf1-cd3a05b12288
|
|
CVE-2021-24635 - https://wpscan.com/vulnerability/854b23d9-e3f8-4835-8d29-140c580f11c9
|
|
CVE-2021-24636 - https://wpscan.com/vulnerability/db8ace7b-7a44-4620-9fe8-ddf0ad520f5e
|
|
CVE-2021-24637 - https://wpscan.com/vulnerability/dd2b3f22-5e8b-41cf-bcb8-d2e673e1d21e
|
|
CVE-2021-24638 - https://wpscan.com/vulnerability/c783a746-f1fe-4d68-9d0a-477de5dbb35c
|
|
CVE-2021-24639 - https://wpscan.com/vulnerability/1ada2a96-32aa-4e37-809c-705db6026e0b
|
|
CVE-2021-2464 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-24640 - https://wpscan.com/vulnerability/e61dd498-5d0e-45ce-b660-a36c576f8d78
|
|
CVE-2021-24641 - https://wpscan.com/vulnerability/972f8c5d-22b7-42de-a981-2e5acb72297b
|
|
CVE-2021-24642 - https://wpscan.com/vulnerability/8d9129ab-33c3-44ee-b150-f7552d88e658
|
|
CVE-2021-24643 - https://wpscan.com/vulnerability/240ddde9-095f-4919-832a-50279196dac5
|
|
CVE-2021-24644 - https://wpscan.com/vulnerability/5a363eeb-9510-4535-97e2-9dfd3b10d511
|
|
CVE-2021-24645 - https://wpscan.com/vulnerability/b15744de-bf56-4e84-9427-b5652d123c15
|
|
CVE-2021-24646 - https://wpscan.com/vulnerability/36aae14e-4bdf-4da6-a0f9-d71935105d45
|
|
CVE-2021-24647 - https://wpscan.com/vulnerability/40d347b1-b86e-477d-b4c6-da105935ce37
|
|
CVE-2021-24648 - https://wpscan.com/vulnerability/a3573212-2a98-4504-b8f4-b4d46655e17c
|
|
CVE-2021-24649 - https://wpscan.com/vulnerability/9486744e-ab24-44e4-b06e-9e0b4be132e2
|
|
CVE-2021-24651 - https://wpscan.com/vulnerability/24f933b0-ad57-4ed3-817d-d637256e2fb1
|
|
CVE-2021-24652 - https://wpscan.com/vulnerability/5375bd3e-a30d-4f24-9b17-470b28a8231c
|
|
CVE-2021-24653 - https://wpscan.com/vulnerability/bfa8f46f-d323-4a2d-b875-39cd9b4cee0a
|
|
CVE-2021-24654 - https://wpscan.com/vulnerability/5c7a9473-d32e-47d6-9f8e-15b96fe758f2
|
|
CVE-2021-24655 - https://wpscan.com/vulnerability/cce03550-7f65-4172-819e-025755fb541f
|
|
CVE-2021-24656 - https://wpscan.com/vulnerability/8e897dcc-6e52-440b-83ad-b119c55751c7
|
|
CVE-2021-24657 - https://wpscan.com/vulnerability/c789ca04-d88c-4789-8be1-812888f0c8f8
|
|
CVE-2021-24658 - https://wpscan.com/vulnerability/ec70f02b-02a1-4511-949e-68f2d9d37ca8
|
|
CVE-2021-24659 - https://wpscan.com/vulnerability/5f2fe510-7513-4d33-82d9-3107b3b3f2ae
|
|
CVE-2021-24660 - https://wpscan.com/vulnerability/af14ac23-843d-4f80-beaf-237618109edd
|
|
CVE-2021-24661 - https://wpscan.com/vulnerability/8d966ff1-9c88-43c7-8f4b-93c88e214677
|
|
CVE-2021-24662 - https://wpscan.com/vulnerability/8a74a2a0-3d8c-427f-9a83-0160d652c5f0
|
|
CVE-2021-24663 - https://wpscan.com/vulnerability/8b5b5b57-50c5-4cd8-9171-168c3e9df46a
|
|
CVE-2021-24664 - http://packetstormsecurity.com/files/164974/WordPress-WPSchoolPress-2.1.16-Cross-Site-Scripting.html
|
|
CVE-2021-24664 - https://wpscan.com/vulnerability/3f8e170c-6579-4b1a-a1ac-7d93da17b669
|
|
CVE-2021-24665 - https://wpscan.com/vulnerability/42a8947f-2ae5-4f12-bd3d-ab3716501df5
|
|
CVE-2021-24666 - https://wpscan.com/vulnerability/fb4d7988-60ff-4862-96a1-80b1866336fe
|
|
CVE-2021-24667 - https://wpscan.com/vulnerability/5925b263-6d6f-4a03-a98a-620150dff8f7
|
|
CVE-2021-24668 - https://wpscan.com/vulnerability/519205ff-2ff6-41e4-9e95-475ab2ce35b9
|
|
CVE-2021-24669 - https://wpscan.com/vulnerability/b97afbe8-c9ae-40a2-81e5-b1d7a6b31831
|
|
CVE-2021-24670 - https://wpscan.com/vulnerability/a092548f-1ad5-44d3-9901-cdf4ebcee40a
|
|
CVE-2021-24671 - https://wpscan.com/vulnerability/4e51dffa-027d-4f3d-a190-dcc5269f6435
|
|
CVE-2021-24672 - https://wpscan.com/vulnerability/762c506a-f57d-450f-99c0-32d750306ddc
|
|
CVE-2021-24673 - https://wpscan.com/vulnerability/75a67932-d831-4dfb-a70d-a07650eaa755
|
|
CVE-2021-24674 - https://wpscan.com/vulnerability/26965878-c4c9-4f43-9e9a-6e58d6b46ef2
|
|
CVE-2021-24675 - https://wpscan.com/vulnerability/9b9a55d5-c121-4b5b-80df-f9f419c0dc55
|
|
CVE-2021-24676 - https://wpscan.com/vulnerability/59589e74-f901-4f4d-81de-26ad19d1b7fd
|
|
CVE-2021-24677 - https://wpscan.com/vulnerability/40c7e424-9a97-41ab-a312-2a06b607609a
|
|
CVE-2021-24678 - https://wpscan.com/vulnerability/b83880f7-8614-4409-9305-d059b5df15dd
|
|
CVE-2021-24679 - https://wpscan.com/vulnerability/7c6c0aac-1733-4abc-8e95-05416636a127
|
|
CVE-2021-24680 - https://wpscan.com/vulnerability/30f2a0d5-7959-436c-9860-2535020e82d3
|
|
CVE-2021-24681 - https://wpscan.com/vulnerability/9ebdd1df-1d6f-4399-8b0f-77a79f841464
|
|
CVE-2021-24682 - https://wpscan.com/vulnerability/7dfdd50d-77f9-4f0a-8673-8f033c0b0e05
|
|
CVE-2021-24683 - https://wpscan.com/vulnerability/54f95b51-5804-4bee-9e4a-f73b8ef9bbd5
|
|
CVE-2021-24684 - https://wpscan.com/vulnerability/b5295bf9-8cf6-416e-b215-074742a5fc63
|
|
CVE-2021-24685 - https://wpscan.com/vulnerability/972ecde8-3d44-4dd9-81e3-643d8737434f
|
|
CVE-2021-24686 - https://wpscan.com/vulnerability/38018695-901d-48d9-b39a-7c00df7f0a4b
|
|
CVE-2021-24687 - https://wpscan.com/vulnerability/300ba418-63ed-4c03-9031-263742ed522e
|
|
CVE-2021-24688 - https://wpscan.com/vulnerability/78bc7cf1-7563-4ada-aec9-af4c943e3e2c
|
|
CVE-2021-24689 - https://wpscan.com/vulnerability/31824250-e0d4-4285-97fa-9880b363e075
|
|
CVE-2021-24690 - https://wpscan.com/vulnerability/b2f473b4-268c-48b7-95e8-0a8eeaa3fc28
|
|
CVE-2021-24691 - https://wpscan.com/vulnerability/ecf6a082-b563-42c4-9d8c-3757aa6b696f
|
|
CVE-2021-24692 - https://wpscan.com/vulnerability/4c9fe97e-3d9b-4079-88d9-34e2d0605215
|
|
CVE-2021-24693 - https://wpscan.com/vulnerability/4bb559b7-8dde-4c90-a9a6-d8dcfbea53a7
|
|
CVE-2021-24694 - https://wpscan.com/vulnerability/9d0d8f8c-f8fb-457f-b557-255a052ccc32
|
|
CVE-2021-24695 - https://wpscan.com/vulnerability/d7bdaf2b-cdd9-4aee-b1bb-01728160ff25
|
|
CVE-2021-24696 - https://wpscan.com/vulnerability/e94772af-39ac-4743-a556-52351ebda9fe
|
|
CVE-2021-24697 - https://wpscan.com/vulnerability/ef9ae513-6c29-45c2-b5ae-4a06a217c499
|
|
CVE-2021-24698 - https://wpscan.com/vulnerability/1fda1356-77d8-4e77-9ee6-8f9ceeb3d380
|
|
CVE-2021-24699 - https://wpscan.com/vulnerability/4f5c3f75-0501-4a1a-95ea-cbfd3fc96852
|
|
CVE-2021-24700 - https://wpscan.com/vulnerability/1d489b05-296e-4268-8082-9737608f9b41
|
|
CVE-2021-24701 - https://wpscan.com/vulnerability/f7b95789-43f2-42a5-95e6-eb7accbd5ed3
|
|
CVE-2021-24702 - https://wpscan.com/vulnerability/30635cc9-4415-48bb-9c67-ea670ea1b942
|
|
CVE-2021-24703 - https://wpscan.com/vulnerability/4ed8296e-1306-481f-9a22-723b051122c0
|
|
CVE-2021-24704 - https://wpscan.com/vulnerability/60843022-fe43-4608-8859-9c9109b35b42
|
|
CVE-2021-24705 - https://wpscan.com/vulnerability/eca883d8-9499-4dbd-8fe1-4447fc2ca28a
|
|
CVE-2021-24706 - https://wpscan.com/vulnerability/ecddb611-de75-41d5-a470-8fc2cf0780a4
|
|
CVE-2021-24707 - https://wpscan.com/vulnerability/0be5e06e-4ff1-43d2-8ba7-2530519d517e
|
|
CVE-2021-24708 - https://wpscan.com/vulnerability/4560eef4-253b-49a4-8e20-9520c45c6f7f
|
|
CVE-2021-24709 - https://wpscan.com/vulnerability/df74ed76-af9e-47a8-9a4d-c5c57e9e0f91
|
|
CVE-2021-2471 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-2471 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24710 - https://wpscan.com/vulnerability/84e83d52-f69a-4de2-80c8-7c1996b30a04
|
|
CVE-2021-24711 - https://wpscan.com/vulnerability/3351bc30-e5ff-471f-8d1c-b1bcdf419937
|
|
CVE-2021-24712 - https://wpscan.com/vulnerability/e677e51b-0d3f-44a5-9fcd-c159786b9926
|
|
CVE-2021-24713 - https://wpscan.com/vulnerability/4a90be69-41eb-43e9-962d-34316497b4df
|
|
CVE-2021-24714 - https://wpscan.com/vulnerability/a8d314b9-26ac-4b56-a85c-a2528e55e73a
|
|
CVE-2021-24715 - https://wpscan.com/vulnerability/da66d54e-dda8-4aa8-8d27-b8b87100bb21
|
|
CVE-2021-24716 - https://wpscan.com/vulnerability/576cc93d-1499-452b-97dd-80f69002e2a0
|
|
CVE-2021-24717 - https://wpscan.com/vulnerability/5916ea42-eb33-463d-8528-2a142805c91f
|
|
CVE-2021-24718 - https://wpscan.com/vulnerability/60c9d78f-ae2c-49e0-aca3-6dce1bd8f697
|
|
CVE-2021-24719 - http://packetstormsecurity.com/files/164548/WordPress-Enfold-Theme-4.8.3-Cross-Site-Scripting.html
|
|
CVE-2021-24719 - https://wpscan.com/vulnerability/a53e213f-6011-47f8-93e6-aa5ad30e857e
|
|
CVE-2021-24720 - https://wpscan.com/vulnerability/9de5cc51-f64c-4475-a0f4-d932dc4364a6
|
|
CVE-2021-24721 - https://wpscan.com/vulnerability/bc7d4774-fce8-4b0b-8015-8ef4c5b02d38
|
|
CVE-2021-24722 - https://wpscan.com/vulnerability/14b29450-2450-4b5f-8630-bb2cbfbd0a83
|
|
CVE-2021-24723 - https://wpscan.com/vulnerability/0a46ae96-41e5-4b52-91c3-409f7387aecc
|
|
CVE-2021-24724 - https://wpscan.com/vulnerability/c1194a1e-bf33-4f3f-a4a6-27b76b1b1eeb
|
|
CVE-2021-24724 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29235
|
|
CVE-2021-24725 - https://wpscan.com/vulnerability/01483284-57f5-4ae9-b5f1-ae26b623571f
|
|
CVE-2021-24725 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29225
|
|
CVE-2021-24726 - https://wpscan.com/vulnerability/f85b6033-d7c1-45b7-b3b0-8967f7373bb8
|
|
CVE-2021-24726 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29176
|
|
CVE-2021-24727 - https://wpscan.com/vulnerability/ffa1f718-f2c5-48ef-8eea-33a18a628a2c
|
|
CVE-2021-24727 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29174
|
|
CVE-2021-24728 - https://wpscan.com/vulnerability/2277d335-1c90-4fa8-b0bf-25873c039c38
|
|
CVE-2021-24728 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29172
|
|
CVE-2021-24729 - https://wpscan.com/vulnerability/5d70818e-730d-40c9-a2db-652052a5fd5c
|
|
CVE-2021-24730 - https://wpscan.com/vulnerability/d5534ff9-c4af-46b7-8852-0f3dfd644855
|
|
CVE-2021-24731 - https://wpscan.com/vulnerability/6bed00e4-b363-43b8-a392-d068d342151a
|
|
CVE-2021-24732 - https://wpscan.com/vulnerability/9425a9b2-e9b8-41f5-a3ca-623b6da0297c
|
|
CVE-2021-24733 - https://wpscan.com/vulnerability/a7fa5896-5a1d-44c6-985c-e4abcc53da0e
|
|
CVE-2021-24734 - https://wpscan.com/vulnerability/fb007191-b008-4d19-b896-55fbee2a3cf7
|
|
CVE-2021-24735 - https://wpscan.com/vulnerability/dcbcf6e7-e5b3-498b-9f5e-7896d309441f
|
|
CVE-2021-24736 - https://wpscan.com/vulnerability/d72275bd-0c66-4b2a-940d-d5256b5426cc
|
|
CVE-2021-24737 - https://wpscan.com/vulnerability/f51a350c-c46d-4d52-b787-762283625d0b
|
|
CVE-2021-24738 - https://wpscan.com/vulnerability/2c3d8c21-ecd4-41ba-8183-2ecbd9a3df25
|
|
CVE-2021-24739 - https://wpscan.com/vulnerability/2afadc76-93ad-47e1-a224-e442ac41cbce
|
|
CVE-2021-2474 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24740 - https://wpscan.com/vulnerability/e6cf694d-c4ae-4b91-97c0-a6bdbafc7d60
|
|
CVE-2021-24741 - https://medium.com/@lijohnjefferson/multiple-sql-injection-unauthenticated-in-support-board-v-3-3-3-3e9b4214a4f9
|
|
CVE-2021-24741 - https://wpscan.com/vulnerability/ccf293ec-7607-412b-b662-5e237b8690ca
|
|
CVE-2021-24742 - https://wpscan.com/vulnerability/8dfc86e4-56a0-4e30-9050-cf3f328ff993
|
|
CVE-2021-24743 - https://wpscan.com/vulnerability/998395f0-f176-45b9-baf7-b50d30538c7d
|
|
CVE-2021-24744 - https://wpscan.com/vulnerability/702a4283-1fd6-4186-9db7-6ad387d714ea
|
|
CVE-2021-24745 - https://wpscan.com/vulnerability/a965aeca-d8f9-4070-aa0d-9c9b95493dda
|
|
CVE-2021-24746 - https://wpscan.com/vulnerability/99f4fb32-e312-4059-adaf-f4cbaa92d4fa
|
|
CVE-2021-24747 - https://wpscan.com/vulnerability/40849d93-8949-4bd0-b60e-c0330b385fea
|
|
CVE-2021-24748 - https://wpscan.com/vulnerability/a8625b84-337d-4c4d-a698-73e59d1f8ee1
|
|
CVE-2021-24749 - https://wpscan.com/vulnerability/4b4e417d-0ae2-4c3c-81e6-4dcf39eb5697
|
|
CVE-2021-2475 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24750 - http://packetstormsecurity.com/files/165433/WordPress-WP-Visitor-Statistics-4.7-SQL-Injection.html
|
|
CVE-2021-24750 - https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de
|
|
CVE-2021-24751 - https://wpscan.com/vulnerability/e0131980-d2d3-4780-8a68-a81ee8c90b7a
|
|
CVE-2021-24752 - https://wpscan.com/vulnerability/181a729e-fffe-457c-9e8d-a4343fd2e630
|
|
CVE-2021-24753 - https://wpscan.com/vulnerability/be7b102f-3982-46bd-a79c-203498f7c820
|
|
CVE-2021-24754 - https://wpscan.com/vulnerability/132118aa-4b72-4eaa-8aa1-6ad7b0c7f495
|
|
CVE-2021-24755 - https://wpscan.com/vulnerability/01419d03-54d6-413d-9a67-64c63c26d741
|
|
CVE-2021-24756 - https://wpscan.com/vulnerability/0cea0717-8f54-4f1c-b3ee-aff7dd91bf59
|
|
CVE-2021-24757 - https://wpscan.com/vulnerability/352a9e05-2d5f-4bf7-8da9-85621fb15d91
|
|
CVE-2021-24758 - https://wpscan.com/vulnerability/8dd70db4-5845-440d-8b1d-012738abaac2
|
|
CVE-2021-24759 - https://wpscan.com/vulnerability/38274ef2-5100-4669-9544-a42346b6727d
|
|
CVE-2021-2476 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24760 - https://wpscan.com/vulnerability/aebf821f-1724-4e4c-8d42-5a94e509d271
|
|
CVE-2021-24761 - https://wpscan.com/vulnerability/c14e1ba6-fc00-4150-b541-0d6740fee4d2
|
|
CVE-2021-24762 - http://packetstormsecurity.com/files/166072/WordPress-Perfect-Survey-1.5.1-SQL-Injection.html
|
|
CVE-2021-24762 - https://wpscan.com/vulnerability/c1620905-7c31-4e62-80f5-1d9635be11ad
|
|
CVE-2021-24763 - https://wpscan.com/vulnerability/c73c7694-1cee-4f26-a425-9c336adce52b
|
|
CVE-2021-24764 - https://wpscan.com/vulnerability/c2f8e9b9-c044-4c45-8d17-e628e9cb5d59
|
|
CVE-2021-24765 - https://wpscan.com/vulnerability/4440e7ca-1a55-444d-8f6c-04153302d750
|
|
CVE-2021-24766 - https://wpscan.com/vulnerability/cc13db1e-5f7f-49b2-81da-f913cfe70543
|
|
CVE-2021-24767 - https://wpscan.com/vulnerability/0b35ad4a-3d94-49b1-a98d-07acf8dd4962
|
|
CVE-2021-24768 - https://wpscan.com/vulnerability/3673e13f-7ce6-4d72-b179-ae4bab55514c
|
|
CVE-2021-24769 - https://wpscan.com/vulnerability/a2f211af-5373-425f-9964-ebbf5efde87b
|
|
CVE-2021-2477 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24770 - https://wpscan.com/vulnerability/4365c813-4bd7-4c7c-a15b-ef9a42d32b26
|
|
CVE-2021-24771 - https://wpscan.com/vulnerability/a6d57fda-79a7-4bf8-b18e-8cf0a4efd1b3
|
|
CVE-2021-24772 - https://wpscan.com/vulnerability/b9d4f2ad-2f12-4822-817d-982a016af85d
|
|
CVE-2021-24773 - https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995
|
|
CVE-2021-24774 - https://wpscan.com/vulnerability/f80ef09a-d3e2-4d62-8532-f0ebe59ae110
|
|
CVE-2021-24775 - https://wpscan.com/vulnerability/c6f24afe-d273-4f87-83ca-a791a385b06b
|
|
CVE-2021-24776 - https://wpscan.com/vulnerability/a59ebab8-5df7-4093-b853-da9472f53508
|
|
CVE-2021-24777 - https://wpscan.com/vulnerability/2dfde2ef-1b33-4dc9-aa3e-02d319effb3a
|
|
CVE-2021-24778 - https://wpscan.com/vulnerability/e37f9aa6-e409-4155-b8e4-566c5bce58d6
|
|
CVE-2021-24779 - https://wpscan.com/vulnerability/8d0e65ee-fdd1-4fd6-9a27-01664c703d90
|
|
CVE-2021-2478 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24780 - https://wpscan.com/vulnerability/8764e550-4127-471e-84e6-494d6106a3b0
|
|
CVE-2021-24781 - https://wpscan.com/vulnerability/3550ba54-7786-4ad9-aeb1-1c0750f189d0
|
|
CVE-2021-24782 - https://wpscan.com/vulnerability/5cd846df-1d8b-488d-a691-b76850e8687a
|
|
CVE-2021-24783 - https://wpscan.com/vulnerability/de51b970-ab13-41a6-a479-a92cd0e70b71
|
|
CVE-2021-24784 - https://wpscan.com/vulnerability/2e9132b5-f8cd-4acc-839c-188d79277270
|
|
CVE-2021-24785 - https://wpscan.com/vulnerability/3957056c-df25-41f7-ab0d-1d09222f2fa5
|
|
CVE-2021-24786 - https://wpscan.com/vulnerability/a6571f16-66d2-449e-af83-1c6ddd56edfa
|
|
CVE-2021-24787 - https://wpscan.com/vulnerability/c89bf498-f384-49de-820e-6cbd70390db2
|
|
CVE-2021-24788 - https://wpscan.com/vulnerability/f8fdff8a-f158-46e8-94f1-f051a6c5608b
|
|
CVE-2021-24789 - https://wpscan.com/vulnerability/e8550ccd-3898-4e27-aca9-ade89823ff4d
|
|
CVE-2021-2479 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24790 - https://wpscan.com/vulnerability/adc5dd9b-0781-4cea-8cc5-2c10ac35b968
|
|
CVE-2021-24791 - https://wpscan.com/vulnerability/d55caa9b-d50f-4c13-bc69-dc475641735f
|
|
CVE-2021-24792 - https://wpscan.com/vulnerability/29514d8e-9d1c-4fb6-b378-f6b7374989ca
|
|
CVE-2021-24793 - https://wpscan.com/vulnerability/eeedbb3b-ae10-4472-a1d3-f196f95b9d96
|
|
CVE-2021-24794 - https://wpscan.com/vulnerability/651dc567-943e-4f57-8ec4-6eee466785f5
|
|
CVE-2021-24795 - https://wpscan.com/vulnerability/ef3c1d4f-53a4-439e-9434-b3b4adb687a4
|
|
CVE-2021-24796 - https://wpscan.com/vulnerability/d973dc0f-3cb4-408d-a8b0-01abeb9ef951
|
|
CVE-2021-24797 - https://wpscan.com/vulnerability/0eb07cc8-8a19-4e01-ab90-844495413453
|
|
CVE-2021-24798 - https://wpscan.com/vulnerability/58c9a007-42db-4142-b096-0b9ba8850f87
|
|
CVE-2021-24799 - https://wpscan.com/vulnerability/6010ce4e-3e46-4cc1-96d8-560b30b605ed
|
|
CVE-2021-2480 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24800 - https://wpscan.com/vulnerability/cd37ca81-d683-4955-bc97-60204cb9c346
|
|
CVE-2021-24801 - https://wpscan.com/vulnerability/78405609-2105-4011-b18e-1ba5f438972d
|
|
CVE-2021-24802 - https://wpscan.com/vulnerability/d92db61f-341c-4f3f-b962-326194ddbd1e
|
|
CVE-2021-24803 - https://wpscan.com/vulnerability/97adac02-4163-48d4-ba14-0b1badfd3d42
|
|
CVE-2021-24804 - https://wpscan.com/vulnerability/6f015e8e-462b-4ef7-a9a1-bb91e7d28e37
|
|
CVE-2021-24805 - https://wpscan.com/vulnerability/a6be3fcf-60f7-4f13-b773-871a7296113c
|
|
CVE-2021-24806 - https://wpscan.com/vulnerability/2746101e-e993-42b9-bd6f-dfd5544fa3fe
|
|
CVE-2021-24807 - https://medium.com/@lijohnjefferson/cve-2021-24807-6bc22af2a444
|
|
CVE-2021-24807 - https://wpscan.com/vulnerability/19d101aa-4b60-4db4-a33b-86c826b288b0
|
|
CVE-2021-24808 - https://wpscan.com/vulnerability/53ff82ec-00ec-4b20-8f60-db9db8c025b4
|
|
CVE-2021-24809 - https://wpscan.com/vulnerability/e186fef4-dca0-461f-b539-082c13a68d13
|
|
CVE-2021-2481 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24810 - https://wpscan.com/vulnerability/94670822-0251-4e77-8d7f-b47aa7232e52
|
|
CVE-2021-24811 - https://wpscan.com/vulnerability/000e65f1-89cd-4dd5-a09d-5febd9fdfbdb
|
|
CVE-2021-24812 - https://wpscan.com/vulnerability/6bc8fff1-ff10-4175-8a46-563f0f26f96a
|
|
CVE-2021-24813 - https://wpscan.com/vulnerability/a1fe0783-7a88-4d75-967f-cef970b73752
|
|
CVE-2021-24814 - https://wpscan.com/vulnerability/94ab34f6-86a9-4e14-bf86-26ff6cb4383e
|
|
CVE-2021-24815 - https://wpscan.com/vulnerability/08f4ebf5-6bbe-4fb0-a9d2-c8a994afe39b
|
|
CVE-2021-24816 - https://wpscan.com/vulnerability/5f63d677-20f3-4fe0-bb90-048b6898e6cd
|
|
CVE-2021-24817 - https://wpscan.com/vulnerability/ccb27d2e-2d2a-40d3-ba7e-bcd5e5012a9a
|
|
CVE-2021-24818 - https://wpscan.com/vulnerability/7cd524ed-5eb9-4d6b-b4d2-3d4be6b57879
|
|
CVE-2021-24819 - https://wpscan.com/vulnerability/c97b218c-b430-4301-884f-f64d0dd08f07
|
|
CVE-2021-2482 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24820 - https://wpscan.com/vulnerability/47652b24-a6f0-4bbc-834e-496b88523fe7
|
|
CVE-2021-24821 - https://wpscan.com/vulnerability/f0915b66-0b99-4aeb-9fba-759cafaeb0cb
|
|
CVE-2021-24822 - https://wpscan.com/vulnerability/db84a782-d4c8-4abf-99ea-ea672a9b806e
|
|
CVE-2021-24823 - https://wpscan.com/vulnerability/1bdebd9e-a7f2-4f55-b5b0-185eb619ebaf
|
|
CVE-2021-24824 - https://wpscan.com/vulnerability/7b4d4675-6089-4435-9b56-31496adc4767
|
|
CVE-2021-24825 - https://wpscan.com/vulnerability/be9d6f82-c972-459a-bacf-65b3dfb11a09
|
|
CVE-2021-24826 - https://wpscan.com/vulnerability/e247d78a-7243-486c-a017-7471a8dcb800
|
|
CVE-2021-24827 - https://wpscan.com/vulnerability/36cc5151-1d5e-4874-bcec-3b6326235db1
|
|
CVE-2021-24828 - https://wpscan.com/vulnerability/6f9d1ee5-7ed7-4304-96a2-611b2f0081d2
|
|
CVE-2021-24829 - https://wpscan.com/vulnerability/cc6585c8-5798-48a1-89f7-a3337f56df3f
|
|
CVE-2021-2483 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24830 - https://wpscan.com/vulnerability/1c46373b-d43d-4d18-b0ae-3711fb0be0f9
|
|
CVE-2021-24831 - https://wpscan.com/vulnerability/75ed9f5f-e091-4372-a6cb-57958ad5f900
|
|
CVE-2021-24832 - https://wpscan.com/vulnerability/cf031259-b76e-475c-8a8e-fa6a0d9e7bb4
|
|
CVE-2021-24833 - https://wpscan.com/vulnerability/7cb39087-fbab-463d-9592-003e3fca6d34
|
|
CVE-2021-24835 - https://wpscan.com/vulnerability/c493ac9c-67d1-48a9-be21-824b1a1d56c2
|
|
CVE-2021-24836 - https://wpscan.com/vulnerability/15eed13f-3195-4f5d-8933-36695c830f4f
|
|
CVE-2021-24837 - https://wpscan.com/vulnerability/5fea3ac3-d599-41f3-8f76-08f0d3552af1
|
|
CVE-2021-24838 - https://wpscan.com/vulnerability/562e81ad-7422-4437-a5b4-fcab9379db82
|
|
CVE-2021-24839 - https://wpscan.com/vulnerability/5e6e63c2-2675-4b8d-9b94-c16c525a1a0e
|
|
CVE-2021-2484 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24840 - https://wpscan.com/vulnerability/971302fd-4e8b-4c6a-818f-3a42c7fb83ef
|
|
CVE-2021-24841 - https://mikadmin.fr/tech/XSS-Stored-Helpful-5b10bc7f40ab319f9797eb4abad4f420660.pdf
|
|
CVE-2021-24841 - https://wpscan.com/vulnerability/55d11acf-8c47-40da-be47-24f74fd7566e
|
|
CVE-2021-24842 - https://wpscan.com/vulnerability/054bd981-dbdd-47dd-bad0-fa327e5860a2
|
|
CVE-2021-24843 - https://wpscan.com/vulnerability/b71f53d7-6b9e-458c-8754-576ad2a52f7d
|
|
CVE-2021-24844 - https://wpscan.com/vulnerability/ebd6d13c-572e-4861-b7d1-a7a87332ce0d
|
|
CVE-2021-24845 - https://wpscan.com/vulnerability/ab857454-7c7c-454d-9c7f-1db767961e5f
|
|
CVE-2021-24846 - https://wpscan.com/vulnerability/a1e7cd2b-8400-4c5d-8b47-a8ccd1e21675
|
|
CVE-2021-24847 - https://wpscan.com/vulnerability/679ca6ed-2343-43f3-9c3e-2c12e12407c1
|
|
CVE-2021-24848 - https://wpscan.com/vulnerability/156d4faf-7d34-4d9f-a654-9064d4eb3aea
|
|
CVE-2021-24849 - https://wpscan.com/vulnerability/763c08a0-4b2b-4487-b91c-be6cc2b9322e
|
|
CVE-2021-2485 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-24850 - https://wpscan.com/vulnerability/2d6f9be0-b9fd-48e5-bd68-94eeb3822c0a
|
|
CVE-2021-24851 - https://wpscan.com/vulnerability/919e67a1-3a50-4940-bb4f-5c5cc2017a83
|
|
CVE-2021-24852 - https://wpscan.com/vulnerability/1069fb40-44f0-468e-9fd4-7a0fb8cde5a5
|
|
CVE-2021-24853 - https://wpscan.com/vulnerability/240bed24-0315-4bbf-ba17-e4947e5ecacb
|
|
CVE-2021-24854 - https://wpscan.com/vulnerability/0d422397-69ff-4d05-aafa-7a572e460e5f
|
|
CVE-2021-24855 - https://wpscan.com/vulnerability/49328498-d3a0-4d27-8a52-24054b5e42f3
|
|
CVE-2021-24856 - https://wpscan.com/vulnerability/8fd483fb-d399-4b4f-b4ef-bbfad1b5cf1b
|
|
CVE-2021-24857 - https://wpscan.com/vulnerability/518204d8-fbf5-4bfa-9db5-835f908f8d8e
|
|
CVE-2021-24858 - https://wpscan.com/vulnerability/9bd1c040-09cc-4c2d-88c9-8406a653a48b
|
|
CVE-2021-24859 - https://wpscan.com/vulnerability/958f44a5-07e7-4349-9212-2a039a082ba0
|
|
CVE-2021-24860 - https://wpscan.com/vulnerability/d5891973-37d0-48cb-a5a3-a26c771b3369
|
|
CVE-2021-24861 - https://wpscan.com/vulnerability/9a50d5d0-7a50-47d1-a8f9-e0eb217919d9
|
|
CVE-2021-24862 - http://packetstormsecurity.com/files/165746/WordPress-RegistrationMagic-V-5.0.1.5-SQL-Injection.html
|
|
CVE-2021-24862 - https://wpscan.com/vulnerability/7d3af3b5-5548-419d-aa32-1f7b51622615
|
|
CVE-2021-24863 - https://wpscan.com/vulnerability/1e4dd002-6c96-44f9-bd55-61359265f7ae
|
|
CVE-2021-24864 - https://wpscan.com/vulnerability/e3b9ee9f-602d-4e9d-810c-e1e3ba604464
|
|
CVE-2021-24865 - https://wpscan.com/vulnerability/055a2dcf-77ec-4e54-be7d-9c47f7730d1b
|
|
CVE-2021-24866 - https://wpscan.com/vulnerability/a9073616-ffd6-4956-b2e7-0fb2eac6e9b5
|
|
CVE-2021-24868 - https://wpscan.com/vulnerability/45a43927-a427-46bc-9c61-e0b8532c8138
|
|
CVE-2021-24869 - https://jetpack.com/2021/10/14/multiple-vulnerabilities-in-wp-fastest-cache-plugin/
|
|
CVE-2021-24870 - https://jetpack.com/2021/10/14/multiple-vulnerabilities-in-wp-fastest-cache-plugin/
|
|
CVE-2021-24871 - https://wpscan.com/vulnerability/28007c80-dc14-4987-a52c-f2a05cfe5905
|
|
CVE-2021-24872 - https://wpscan.com/vulnerability/ec23734a-5ea7-4e46-aba9-3dee4e6dffb6
|
|
CVE-2021-24873 - https://wpscan.com/vulnerability/19980b57-1954-4a29-b2c2-43eadf758ed3
|
|
CVE-2021-24874 - https://wpscan.com/vulnerability/28d34cc1-2294-4409-a60f-c8c441eb3f2d
|
|
CVE-2021-24875 - https://wpscan.com/vulnerability/652efc4a-f931-4668-ae74-a58b288a5715
|
|
CVE-2021-24876 - https://wpscan.com/vulnerability/e77c2493-993d-418d-9629-a1f07b5a2b6f
|
|
CVE-2021-24877 - https://wpscan.com/vulnerability/b09fe120-ab9b-44f2-b50d-3b4b299d6d15
|
|
CVE-2021-24878 - https://wpscan.com/vulnerability/d2f1fd60-5e5e-4e38-9559-ba2d14ae37bf
|
|
CVE-2021-24879 - https://wpscan.com/vulnerability/6dfb4f61-c8cb-40ad-812f-139482be0fb4
|
|
CVE-2021-24880 - https://wpscan.com/vulnerability/09226067-0289-4d4f-9450-6f2c2ba058a0
|
|
CVE-2021-24881 - https://wpscan.com/vulnerability/0967303d-ea49-4993-84eb-a7ec97240071
|
|
CVE-2021-24882 - https://wpscan.com/vulnerability/6d71816c-8267-4b84-9087-191fbb976e72
|
|
CVE-2021-24884 - https://wpscan.com/vulnerability/b57dacdd-43c2-48f8-ac1e-eb8306b22533
|
|
CVE-2021-24885 - https://wpscan.com/vulnerability/d0b312f8-8b16-45be-b5e5-bf9d4b3e9b1e
|
|
CVE-2021-24888 - https://wpscan.com/vulnerability/19bffa71-705c-42fc-b2ca-bf62fabb70a0
|
|
CVE-2021-24889 - https://wpscan.com/vulnerability/55008a42-eb56-436c-bce0-10ee616d0495
|
|
CVE-2021-24890 - https://wpscan.com/vulnerability/f3b450d2-84ce-4c13-ad6a-b60785dee7e7
|
|
CVE-2021-24891 - https://wpscan.com/vulnerability/fbed0daa-007d-4f91-8d87-4bca7781de2d
|
|
CVE-2021-24892 - https://wpscan.com/vulnerability/364b0843-a990-4204-848a-60c928cc5bc0
|
|
CVE-2021-24893 - https://wpscan.com/vulnerability/05d3af69-20b4-499a-8322-2b53674d6a58
|
|
CVE-2021-24894 - https://wpscan.com/vulnerability/79bb5acb-ea56-41a9-83a1-28a181ae41e2
|
|
CVE-2021-24895 - https://wpscan.com/vulnerability/be7bbf4f-6f6a-4a44-bf86-2f096351ae08
|
|
CVE-2021-24896 - https://wpscan.com/vulnerability/2c469e8b-c761-460b-b31d-9219a43006ff
|
|
CVE-2021-24897 - https://wpscan.com/vulnerability/a0dd1da8-f8d2-453d-a2f2-711a49fb6466
|
|
CVE-2021-24898 - https://wpscan.com/vulnerability/10fdc464-0ddc-4919-8f21-969fff854011
|
|
CVE-2021-24899 - https://wpscan.com/vulnerability/cf4b266c-d68e-4add-892a-d01a31987a4b
|
|
CVE-2021-24900 - https://packetstormsecurity.com/files/164632/
|
|
CVE-2021-24900 - https://wpscan.com/vulnerability/213d7c08-a37c-49d0-a072-24db711da5ec
|
|
CVE-2021-24901 - https://wpscan.com/vulnerability/9c315404-b66a-448c-a3b7-367a37b53435
|
|
CVE-2021-24902 - https://wpscan.com/vulnerability/2bde2030-2dfe-4dd3-afc1-36f7031a91ea
|
|
CVE-2021-24903 - https://wpscan.com/vulnerability/ad67e45e-254a-46ce-a243-bfc86839446e
|
|
CVE-2021-24904 - https://wpscan.com/vulnerability/7b80f89b-e724-41c5-aa03-21d1eef50f21
|
|
CVE-2021-24905 - https://wpscan.com/vulnerability/cf022415-6614-4b95-913b-802186766ae6
|
|
CVE-2021-24906 - https://wpscan.com/vulnerability/4204682b-f657-42e1-941c-bee7a245e9fd
|
|
CVE-2021-24907 - https://wpscan.com/vulnerability/56dae1ae-d5d2-45d3-8991-db69cc47ddb7
|
|
CVE-2021-24908 - https://wpscan.com/vulnerability/77f50129-4b1f-4e50-8321-9dd32deba6e1
|
|
CVE-2021-24909 - https://wpscan.com/vulnerability/5855f1fe-28f6-4cd6-a83c-95c23d809b79
|
|
CVE-2021-24910 - https://wpscan.com/vulnerability/b5cbebf4-5749-41a0-8be3-3333853fca17
|
|
CVE-2021-24911 - https://wpscan.com/vulnerability/bd88be21-0cfc-46bd-b78a-23efc4868a55
|
|
CVE-2021-24912 - https://wpscan.com/vulnerability/349483e2-3ab5-4573-bc03-b1ebab40584d
|
|
CVE-2021-24913 - https://wpscan.com/vulnerability/2f499945-1924-49f0-ad6e-9192273a5c05
|
|
CVE-2021-24914 - https://wpscan.com/vulnerability/39392055-8cd3-452f-8bcb-a650f5bddc2e
|
|
CVE-2021-24915 - https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917
|
|
CVE-2021-24915 - https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac
|
|
CVE-2021-24916 - https://wpscan.com/vulnerability/93b893be-59ad-4500-8edb-9fa7a45304d5
|
|
CVE-2021-24917 - https://wpscan.com/vulnerability/15bb711a-7d70-4891-b7a2-c473e3e8b375
|
|
CVE-2021-24919 - https://wpscan.com/vulnerability/f472ec7d-765c-4266-ab9c-e2d06703ebb4
|
|
CVE-2021-24920 - https://wpscan.com/vulnerability/b00b5037-8ce4-4f61-b2ce-33315b39454e
|
|
CVE-2021-24921 - https://wpscan.com/vulnerability/43ab0997-4d15-4ff7-af41-7b528b0ba3c7
|
|
CVE-2021-24922 - https://wpscan.com/vulnerability/399ffd65-f3c0-4fbe-a83a-2a620976aad2
|
|
CVE-2021-24923 - https://wpscan.com/vulnerability/3afef591-9e00-4af8-a8a6-e04ec5e61795
|
|
CVE-2021-24924 - https://wpscan.com/vulnerability/4621e86e-aba4-429c-8e08-32cf9b4c65e6
|
|
CVE-2021-24925 - https://wpscan.com/vulnerability/82233588-6033-462d-b886-a8ef5ee9adb0
|
|
CVE-2021-24926 - https://wpscan.com/vulnerability/8cc7cbbd-f74f-4f30-9483-573641fea733
|
|
CVE-2021-24927 - https://wpscan.com/vulnerability/86f3acc7-8902-4215-bd75-6105d601524e
|
|
CVE-2021-24928 - https://wpscan.com/vulnerability/3762a77c-b8c9-428f-877c-bbfd7958e7be
|
|
CVE-2021-24930 - https://wpscan.com/vulnerability/479704d8-057b-4642-b84a-4a78567ba20b
|
|
CVE-2021-24931 - http://packetstormsecurity.com/files/165946/WordPress-Secure-Copy-Content-Protection-And-Content-Locking-2.8.1-SQL-Injection.html
|
|
CVE-2021-24931 - https://wpscan.com/vulnerability/1cd52d61-af75-43ed-9b99-b46c471c4231
|
|
CVE-2021-24932 - https://wpscan.com/vulnerability/575c02ea-4fe9-428c-bbc8-e161af679b6d
|
|
CVE-2021-24933 - https://wpscan.com/vulnerability/b8e6f0d3-a7d1-4ca8-aba8-0d5075167d55
|
|
CVE-2021-24934 - https://wpscan.com/vulnerability/0aa5a8d5-e736-4cd3-abfd-8e0a356bb6ef
|
|
CVE-2021-24935 - https://wpscan.com/vulnerability/53702281-1bd5-4828-b7a4-9f81cf0b6bb6
|
|
CVE-2021-24936 - https://wpscan.com/vulnerability/4fb61b84-ff5f-4b4c-a516-54b749f9611e
|
|
CVE-2021-24937 - https://wpscan.com/vulnerability/dde3c119-dad9-4205-a931-d49bbf3b6b87
|
|
CVE-2021-24938 - https://wpscan.com/vulnerability/df8a6f2c-e075-45d5-9262-b4eb63c9351e
|
|
CVE-2021-24939 - https://wpscan.com/vulnerability/1a46cfec-24ad-4619-8579-f09bbd8ee748
|
|
CVE-2021-24940 - https://wpscan.com/vulnerability/1980c5ca-447d-4875-b542-9212cc7ff77f
|
|
CVE-2021-24941 - https://wpscan.com/vulnerability/beca7afd-8f03-4909-bea0-77b63513564b
|
|
CVE-2021-24942 - https://wpscan.com/vulnerability/eaa28832-74c1-4cd5-9b0f-02338e23b418
|
|
CVE-2021-24943 - https://wpscan.com/vulnerability/ba50c590-42ee-4523-8aa0-87ac644b77ed
|
|
CVE-2021-24944 - https://wpscan.com/vulnerability/d1bfdce3-89bd-441f-8ebb-02cf0ff8b6cc
|
|
CVE-2021-24945 - https://wpscan.com/vulnerability/d7618061-a7fa-4da4-9384-be19bc5e8548
|
|
CVE-2021-24946 - http://packetstormsecurity.com/files/165742/WordPress-Modern-Events-Calendar-6.1-SQL-Injection.html
|
|
CVE-2021-24946 - https://wpscan.com/vulnerability/09871847-1d6a-4dfe-8a8c-f2f53ff87445
|
|
CVE-2021-24947 - https://wpscan.com/vulnerability/c6bb12b1-6961-40bd-9110-edfa9ee41a18
|
|
CVE-2021-24948 - https://wpscan.com/vulnerability/2b67005a-476e-4772-b15c-3191911a50b0
|
|
CVE-2021-24949 - https://wpscan.com/vulnerability/9d7f8ba8-a5d5-4ec3-a48f-5cd4b115e8d5
|
|
CVE-2021-24950 - https://wpscan.com/vulnerability/01d430ea-ef85-4529-9ae4-c1f70016bb75
|
|
CVE-2021-24951 - https://wpscan.com/vulnerability/0a16ddc5-5ab9-4a8f-86b5-41edcbeafc50
|
|
CVE-2021-24952 - https://wpscan.com/vulnerability/cbb8fa9f-1c84-4410-ae86-64cb1771ce78
|
|
CVE-2021-24953 - https://wpscan.com/vulnerability/0529261d-65e1-4c64-b8ed-ecb7356d9067
|
|
CVE-2021-24954 - https://wpscan.com/vulnerability/54ff0db8-1d9e-4e67-b71a-142a9e5ed851
|
|
CVE-2021-24955 - https://wpscan.com/vulnerability/e8005d4d-41c3-451d-b85a-2626decaa080
|
|
CVE-2021-24956 - https://wpscan.com/vulnerability/5882ea89-f463-4f0b-a624-150bbaf967c2
|
|
CVE-2021-24957 - https://wpscan.com/vulnerability/a282606f-6abf-4f75-99c9-dab0bea8cc96
|
|
CVE-2021-24958 - https://wpscan.com/vulnerability/011c2519-fd84-4c95-b8b8-23654af59d70
|
|
CVE-2021-24959 - https://wpscan.com/vulnerability/0471d2e2-e759-468f-becd-0b062f00b435
|
|
CVE-2021-24960 - https://plugins.trac.wordpress.org/changeset/2677722
|
|
CVE-2021-24960 - https://wpscan.com/vulnerability/18902832-2973-498d-808e-c75d1aedc11e
|
|
CVE-2021-24961 - https://plugins.trac.wordpress.org/changeset/2677722
|
|
CVE-2021-24961 - https://wpscan.com/vulnerability/c911bbbd-0196-4e3d-ada3-4efb8a339954
|
|
CVE-2021-24962 - https://plugins.trac.wordpress.org/changeset/2677722
|
|
CVE-2021-24962 - https://wpscan.com/vulnerability/7a95b3f2-285e-40e3-aead-41932c207623
|
|
CVE-2021-24963 - https://wpscan.com/vulnerability/7f8b4275-7586-4e04-afd9-d12bdab6ba9b
|
|
CVE-2021-24964 - https://wpscan.com/vulnerability/e9966b3e-2eb9-4d70-8c18-6a829b4827cc
|
|
CVE-2021-24965 - https://wpscan.com/vulnerability/306ecf09-fdf0-449c-930c-9dfa58f0efc2
|
|
CVE-2021-24966 - https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0
|
|
CVE-2021-24967 - https://wpscan.com/vulnerability/4e165122-4746-42de-952e-a3bf51393a74
|
|
CVE-2021-24968 - https://wpscan.com/vulnerability/f0a9e6cc-46cc-4ac2-927a-c006b8e8aa68
|
|
CVE-2021-24969 - https://wpscan.com/vulnerability/01144c50-54ca-44d9-9ce8-bf4f659114ee
|
|
CVE-2021-24970 - https://wpscan.com/vulnerability/9b15d47e-43b6-49a8-b2c3-b99c92101e10
|
|
CVE-2021-24971 - https://wpscan.com/vulnerability/661cb7e3-d7bd-4bc1-bf78-bdb4ba9610d7
|
|
CVE-2021-24972 - https://wpscan.com/vulnerability/b960cb36-62de-4b9f-a35d-144a34a4c63d
|
|
CVE-2021-24973 - https://wpscan.com/vulnerability/0118f245-0e6f-44c1-9bdb-5b3a5d2403d6
|
|
CVE-2021-24974 - https://wpscan.com/vulnerability/8ed549fe-7d27-4a7a-b226-c20252964b29
|
|
CVE-2021-24975 - https://wpscan.com/vulnerability/b99dae3d-8230-4427-adc5-4ef9cbfb8ba1
|
|
CVE-2021-24976 - https://wpscan.com/vulnerability/7d5f58a8-bee4-46be-9c08-d272678338f0
|
|
CVE-2021-24977 - https://wpscan.com/vulnerability/739831e3-cdfb-4a22-9abf-6c594d7e3d75
|
|
CVE-2021-24978 - https://wpscan.com/vulnerability/f0f2af29-e21e-4d16-9424-1a49bff7fb86
|
|
CVE-2021-24979 - https://wpscan.com/vulnerability/fc011990-4ec1-4553-901d-4ff1f482cb79
|
|
CVE-2021-24980 - https://wpscan.com/vulnerability/e50bcb39-9a01-433f-81b3-fd4018672b85
|
|
CVE-2021-24981 - https://wpscan.com/vulnerability/4c45df6d-b3f6-49e5-8b1f-edd32a12d71c
|
|
CVE-2021-24982 - https://wpscan.com/vulnerability/8e53f15e-8b6a-4d47-a40d-4ebbe6934286
|
|
CVE-2021-24983 - https://wpscan.com/vulnerability/31fdabb0-bc74-4d25-b0cd-c872aae6cb2f
|
|
CVE-2021-24984 - https://wpscan.com/vulnerability/96bb2fba-4b18-4c29-8344-3ba4d2f06a19
|
|
CVE-2021-24985 - https://wpscan.com/vulnerability/50be0ebf-fe6d-41e5-8af9-0d74f33aeb57
|
|
CVE-2021-24986 - https://wpscan.com/vulnerability/51e57f25-b8b2-44ca-9162-d7328eac64eb
|
|
CVE-2021-24987 - https://wpscan.com/vulnerability/a14b668f-812f-46ee-827e-0996b378f7f0
|
|
CVE-2021-24988 - https://wpscan.com/vulnerability/0742483b-6314-451b-a63a-536fd1e14845
|
|
CVE-2021-24989 - https://wpscan.com/vulnerability/82c2ead1-1d3c-442a-ae68-359a4748447f
|
|
CVE-2021-24991 - https://wpscan.com/vulnerability/88e706df-ae03-4665-94a3-db226e1f31a9
|
|
CVE-2021-24992 - https://wpscan.com/vulnerability/db0b9480-2ff4-423c-a745-68e983ffa12b
|
|
CVE-2021-24993 - https://wpscan.com/vulnerability/514416fa-d915-4953-bf1b-6dbf40b4d7e5
|
|
CVE-2021-24994 - https://wpscan.com/vulnerability/ea74257a-f6b0-49e9-a81f-53c0eb81b1da
|
|
CVE-2021-24995 - https://wpscan.com/vulnerability/3caf0de0-57f2-4c87-8713-d00a7db9eeef
|
|
CVE-2021-24996 - https://wpscan.com/vulnerability/6ee14423-f7ff-4433-987a-a1a6b7bd65e3
|
|
CVE-2021-24997 - https://wpscan.com/vulnerability/747e6c7e-a167-4d82-b6e6-9e8613f0e900
|
|
CVE-2021-24999 - https://wpscan.com/vulnerability/8527f4fe-312f-45c1-ae4c-7e799702fc26
|
|
CVE-2021-25000 - https://wpscan.com/vulnerability/bc167b3a-24ee-4988-9934-189b6216ce40
|
|
CVE-2021-25001 - https://wpscan.com/vulnerability/76f0257d-aae7-4054-9b3d-ba10b4005cf1
|
|
CVE-2021-25002 - https://wpscan.com/vulnerability/b14f476e-3124-4cbf-91b4-ae53c4dabd7c
|
|
CVE-2021-25003 - https://wpscan.com/vulnerability/5c21ad35-b2fb-4a51-858f-8ffff685de4a
|
|
CVE-2021-25004 - https://wpscan.com/vulnerability/cfbc2b43-b8f8-4bcb-a3d3-39d217afa530
|
|
CVE-2021-25005 - https://wpscan.com/vulnerability/af7d62ca-09b3-41c8-b771-be936ce8f6b2
|
|
CVE-2021-25006 - https://wpscan.com/vulnerability/dbe2c6ca-d2f1-40a2-83d5-4623c22d4d61
|
|
CVE-2021-25007 - https://wpscan.com/vulnerability/cf907d53-cc4a-4b02-bed3-64754128112c
|
|
CVE-2021-25008 - https://wpscan.com/vulnerability/cb232354-f74d-48bb-b437-7bdddd1df42a
|
|
CVE-2021-25009 - https://wpscan.com/vulnerability/ce2e3503-9a06-4f5c-ae0f-f40e7dfb2903
|
|
CVE-2021-25010 - https://wpscan.com/vulnerability/d1ebd15a-72ab-4ba2-a212-7e2eea0b0fb0
|
|
CVE-2021-25011 - https://wpscan.com/vulnerability/6639da0d-6d29-46c1-a3cc-5e5626305833
|
|
CVE-2021-25012 - https://wpscan.com/vulnerability/b126d2fc-6cc7-4c18-b95e-d32c2effcc4f
|
|
CVE-2021-25013 - https://wpscan.com/vulnerability/e88b7a70-ee71-439f-b3c6-0300adb980b0
|
|
CVE-2021-25014 - https://wpscan.com/vulnerability/63c58d7f-8e0b-4aa5-b3c8-8726b4f19bf1
|
|
CVE-2021-25015 - https://wpscan.com/vulnerability/7608829d-2820-49e2-a10e-e93eb3005f68
|
|
CVE-2021-25016 - https://wpscan.com/vulnerability/b5035987-6227-4fc6-bc45-1e8016e5c4c0
|
|
CVE-2021-25017 - https://wpscan.com/vulnerability/2d0c4872-a341-4974-926c-10b094a5d13c
|
|
CVE-2021-25018 - https://wpscan.com/vulnerability/9e092aad-0b36-45a9-8987-8d904b34fbb2
|
|
CVE-2021-25019 - https://wpscan.com/vulnerability/cea0ce4b-886a-47cc-8653-a297e9759d09
|
|
CVE-2021-25020 - https://wpscan.com/vulnerability/67398332-b93e-46ae-8904-68419949a124
|
|
CVE-2021-25021 - https://wpscan.com/vulnerability/92db763c-ca6b-43cf-87ff-c1678cf4ade5
|
|
CVE-2021-25022 - https://wpscan.com/vulnerability/1801c7ae-2b5c-493f-969d-4bb19a9feb15
|
|
CVE-2021-25023 - https://wpscan.com/vulnerability/4a27d374-f690-4a8a-987a-9e0f56bbe143
|
|
CVE-2021-25024 - https://wpscan.com/vulnerability/08864b76-d898-4dfe-970d-d7cc1b1115a7
|
|
CVE-2021-25025 - https://wpscan.com/vulnerability/24fb4eb4-9fe1-4433-8844-8904eaf13c0e
|
|
CVE-2021-25026 - https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe
|
|
CVE-2021-25027 - https://wpscan.com/vulnerability/48612c44-151d-4438-b91c-c27e96174270
|
|
CVE-2021-25028 - https://wpscan.com/vulnerability/80b0682e-2c3b-441b-9628-6462368e5fc7
|
|
CVE-2021-25029 - https://wpscan.com/vulnerability/723d0d07-c48b-4fe3-9fb2-7dae3c7d3cfb
|
|
CVE-2021-25030 - https://wpscan.com/vulnerability/bc7058b1-ca93-4c45-9ced-7848c7ae4150
|
|
CVE-2021-25031 - https://wpscan.com/vulnerability/1fbcf5ec-498e-4d40-8577-84b8c7ac3201
|
|
CVE-2021-25032 - https://wpscan.com/vulnerability/2f0f1a32-0c7a-48e6-8617-e0b2dcf62727
|
|
CVE-2021-25033 - https://wpscan.com/vulnerability/c2d2384c-41b9-4aaf-b918-c1cfda58af5c
|
|
CVE-2021-25034 - https://wpscan.com/vulnerability/c4e50dd2-450f-413d-b15f-ece413e42157
|
|
CVE-2021-25035 - https://wpscan.com/vulnerability/f426360e-5ba0-4d6b-bfd4-61bc54be3469
|
|
CVE-2021-25038 - https://wpscan.com/vulnerability/72ccdcb9-3d24-41d7-b9fa-c8bd73d30aa6
|
|
CVE-2021-25039 - https://wpscan.com/vulnerability/c92eb2bf-0a5d-40b9-b0be-1820e7b9bebb
|
|
CVE-2021-25040 - https://wpscan.com/vulnerability/3ed821a6-c3e2-4964-86f8-d14c4a54708a
|
|
CVE-2021-25041 - https://wpscan.com/vulnerability/32aee3ea-e0af-44da-a16c-102c83eaed8f
|
|
CVE-2021-25042 - https://wpscan.com/vulnerability/05b9e478-2d3b-4460-88c1-7f81d3a68ac4
|
|
CVE-2021-25043 - https://wpscan.com/vulnerability/8601bd21-becf-4809-8c11-d053d1121eae
|
|
CVE-2021-25044 - https://wpscan.com/vulnerability/dc1507c1-8894-4ab6-b25f-c5e26a425b03
|
|
CVE-2021-25045 - https://wpscan.com/vulnerability/c60a3d40-449c-4c84-8d13-68c04267c1d7
|
|
CVE-2021-25046 - https://wpscan.com/vulnerability/19c2f456-a41e-4755-912d-13683719bae6
|
|
CVE-2021-25047 - https://wpscan.com/vulnerability/d33241cc-17b6-491a-b836-dd9368652316
|
|
CVE-2021-25048 - https://wpscan.com/vulnerability/5687e5db-d987-416d-a7f4-036cce4d56cb
|
|
CVE-2021-25049 - https://wpscan.com/vulnerability/227cbf50-59da-4f4c-85da-1959a108ae7e
|
|
CVE-2021-25050 - https://wpscan.com/vulnerability/25a28adb-794f-4bdb-89e8-060296b45b38
|
|
CVE-2021-25051 - https://wpscan.com/vulnerability/566ff8dc-f820-412b-b2d3-fa789bce528e
|
|
CVE-2021-25052 - https://wpscan.com/vulnerability/a01844a0-0c43-4d96-b738-57fe5bfbd67a
|
|
CVE-2021-25053 - https://wpscan.com/vulnerability/a5448599-64de-43b0-b04d-c6492366eab1
|
|
CVE-2021-25054 - https://wpscan.com/vulnerability/200969eb-e2a4-4200-82d7-0c313de089af
|
|
CVE-2021-25055 - https://wpscan.com/vulnerability/7ed050a4-27eb-4ecb-9182-1d8fa1e71571
|
|
CVE-2021-25056 - https://wpscan.com/vulnerability/795acab2-f621-4662-834b-ebb6205ef7de
|
|
CVE-2021-25057 - https://wpscan.com/vulnerability/c0dd3ef1-579d-43a4-801a-660c41495d58
|
|
CVE-2021-25058 - https://wpscan.com/vulnerability/fd5271ef-1da5-4d09-888e-f1fd71820cde
|
|
CVE-2021-25059 - https://wpscan.com/vulnerability/b125a765-a6b6-421b-bd8a-effec12bc629
|
|
CVE-2021-25060 - https://wpscan.com/vulnerability/9e1ac711-1f65-49fa-b007-66170a77b265
|
|
CVE-2021-25061 - https://wpscan.com/vulnerability/bd9dc754-08a4-4bfc-8dda-3f5c0e070f7e
|
|
CVE-2021-25062 - https://wpscan.com/vulnerability/dc9a5d36-7453-46a8-a17f-712449d7987d
|
|
CVE-2021-25063 - https://wpscan.com/vulnerability/e2185887-3e53-4089-aa3f-981c944ee0bb
|
|
CVE-2021-25064 - https://wpscan.com/vulnerability/30c70315-3c17-41f0-a12f-7e3f793e259c
|
|
CVE-2021-25065 - https://wpscan.com/vulnerability/ae1aab4e-b00a-458b-a176-85761655bdcc
|
|
CVE-2021-25066 - https://wpscan.com/vulnerability/323d5fd0-abe8-44ef-9127-eea6fd4f3f3d
|
|
CVE-2021-25067 - https://wpscan.com/vulnerability/365007f0-61ac-4e81-8a3a-3a068f2c84bc
|
|
CVE-2021-25068 - https://wpscan.com/vulnerability/32799efd-99dc-46dd-8648-e9eb872a0371
|
|
CVE-2021-25069 - https://wpscan.com/vulnerability/4ff5e638-1b89-41df-b65a-f821de8934e8
|
|
CVE-2021-25070 - https://wpscan.com/vulnerability/e00b2946-15e5-4458-9b13-2e272630a36f
|
|
CVE-2021-25071 - https://wpscan.com/vulnerability/53085936-fa07-4f00-a7dc-bbe98c51320e
|
|
CVE-2021-25072 - https://wpscan.com/vulnerability/53d2c61d-ce73-40e0-a113-9d76d8fecc91
|
|
CVE-2021-25073 - https://wpscan.com/vulnerability/922a2037-9b5e-4c94-83d9-99efc494e9e2
|
|
CVE-2021-25074 - https://wpscan.com/vulnerability/f3c0a155-9563-4533-97d4-03b9bac83164
|
|
CVE-2021-25075 - https://wpscan.com/vulnerability/db5a0431-af4d-45b7-be4e-36b6c90a601b
|
|
CVE-2021-25076 - http://packetstormsecurity.com/files/166071/WordPress-WP-User-Frontend-3.5.25-SQL-Injection.html
|
|
CVE-2021-25076 - https://wpscan.com/vulnerability/6d3eeba6-5560-4380-a6e9-f008a9112ac6
|
|
CVE-2021-25077 - https://wpscan.com/vulnerability/53868650-aba0-4d07-89d2-a998bb0ee5f6
|
|
CVE-2021-25078 - https://wpscan.com/vulnerability/d4edb5f2-aa1b-4e2d-abb4-76c46def6c6e
|
|
CVE-2021-25079 - https://wpscan.com/vulnerability/c3d49271-9656-4428-8357-0d1d77b7fc63
|
|
CVE-2021-25080 - https://wpscan.com/vulnerability/acd3d98a-aab8-49be-b77e-e8c6ede171ac
|
|
CVE-2021-25081 - https://wpscan.com/vulnerability/f85cf258-1c2f-444e-91e5-b1fc55880f0e
|
|
CVE-2021-25082 - https://wpscan.com/vulnerability/0f90f10c-4b0a-46da-ac1f-aa6a03312132
|
|
CVE-2021-25083 - https://wpscan.com/vulnerability/9b69544d-6a08-4757-901b-6ccf1cd00ecc
|
|
CVE-2021-25084 - https://wpscan.com/vulnerability/7c5c602f-499f-431b-80bc-507053984a06
|
|
CVE-2021-25085 - https://wpscan.com/vulnerability/b7dd81c6-6af1-4976-b928-421ca69bfa90
|
|
CVE-2021-25086 - https://wpscan.com/vulnerability/2cf9e517-d882-4af2-bd12-e700b75e7a11
|
|
CVE-2021-25087 - https://wpscan.com/vulnerability/d7ceafae-65ec-4e05-9ed1-59470771bf07
|
|
CVE-2021-25088 - https://wpscan.com/vulnerability/820c51d6-186e-4d63-b4a7-bd0a59c02cc8
|
|
CVE-2021-25089 - https://wpscan.com/vulnerability/5adb977e-f7bf-4d36-b625-87bc23d379c8
|
|
CVE-2021-25090 - https://wpscan.com/vulnerability/32a4a2b5-ef65-4e29-af4a-f003dbd0809c
|
|
CVE-2021-25091 - https://wpscan.com/vulnerability/96204946-0b10-4a2c-8079-473883ff95b6
|
|
CVE-2021-25092 - https://wpscan.com/vulnerability/1cd30913-67c7-46c3-a2de-dcca0c332323
|
|
CVE-2021-25093 - https://wpscan.com/vulnerability/7a7603ce-d76d-4c49-a886-67653bed8cd3
|
|
CVE-2021-25094 - http://packetstormsecurity.com/files/167190/WordPress-Tatsu-Builder-Remote-Code-Execution.html
|
|
CVE-2021-25094 - https://wpscan.com/vulnerability/fb0097a0-5d7b-4e5b-97de-aacafa8fffcd
|
|
CVE-2021-25095 - https://wpscan.com/vulnerability/cbfa7211-ac1f-4cf2-bd79-ebce2fc4baa1
|
|
CVE-2021-25096 - https://wpscan.com/vulnerability/e6dd140e-0c9d-41dc-821e-4910a13122c1
|
|
CVE-2021-25097 - https://wpscan.com/vulnerability/67f5beb8-2cb0-4b43-87c7-dead9c005f9c
|
|
CVE-2021-25098 - https://wpscan.com/vulnerability/960a634d-a88a-4d90-9ac3-7d24b1fe07fe
|
|
CVE-2021-25099 - https://wpscan.com/vulnerability/87a64b27-23a3-40f5-a3d8-0650975fee6f
|
|
CVE-2021-25100 - https://wpscan.com/vulnerability/fe2c02bf-207c-43da-98bd-4c85d235de8b
|
|
CVE-2021-25101 - https://wpscan.com/vulnerability/5fd0380c-0d1d-4380-96f0-a07be5a61eba
|
|
CVE-2021-25102 - https://wpscan.com/vulnerability/9b8a00a6-622b-4309-bbbf-fe2c7fc9f8b6
|
|
CVE-2021-25103 - https://wpscan.com/vulnerability/90067336-c039-4cbe-aa9f-5eab5d1e1c3d
|
|
CVE-2021-25104 - https://wpscan.com/vulnerability/2ee6f1d8-3803-42f6-9193-3dd8f416b558
|
|
CVE-2021-25105 - https://wpscan.com/vulnerability/a9ab9e84-7f5e-4e7c-8647-114d9e02e59f
|
|
CVE-2021-25106 - https://wpscan.com/vulnerability/47df802d-5200-484b-959c-9f569edf992e
|
|
CVE-2021-25107 - https://wpscan.com/vulnerability/3999a1b9-df85-43b1-b412-dc8a6f71cc5d
|
|
CVE-2021-25108 - https://wpscan.com/vulnerability/9d416ca3-bd02-4fcf-b3b8-f2f2280d02d2
|
|
CVE-2021-25109 - https://wpscan.com/vulnerability/36261af9-3b34-4563-af3c-c9e54ae2d581
|
|
CVE-2021-25110 - https://wpscan.com/vulnerability/b655fc21-47a1-4786-8911-d78ab823c153
|
|
CVE-2021-25111 - https://wpscan.com/vulnerability/af548fab-96c2-4129-b609-e24aad0b1fc4
|
|
CVE-2021-25112 - https://wpscan.com/vulnerability/4aae2dd9-8d51-4633-91bc-ddb53ca3471c
|
|
CVE-2021-25113 - https://wpscan.com/vulnerability/7a5078db-e0d4-4076-9de9-5401c3ca0d65
|
|
CVE-2021-25114 - https://wpscan.com/vulnerability/6c25a5f0-a137-4ea5-9422-8ae393d7b76b
|
|
CVE-2021-25115 - https://wpscan.com/vulnerability/dbc18c2c-7547-44fc-8a41-c819757e47a7
|
|
CVE-2021-25116 - https://wpscan.com/vulnerability/140a15b6-12c8-4f03-a877-3876db866852
|
|
CVE-2021-25117 - https://wpscan.com/vulnerability/d2d9a789-edae-4ae1-92af-e6132db7efcd/
|
|
CVE-2021-25118 - https://wpscan.com/vulnerability/2c3f9038-632d-40ef-a099-6ea202efb550
|
|
CVE-2021-25119 - https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a
|
|
CVE-2021-25120 - https://wpscan.com/vulnerability/0ad020b5-0d16-4521-8ea7-39cd206ab9f6
|
|
CVE-2021-25121 - https://wpscan.com/vulnerability/efb1ddef-2123-416c-a932-856d41ed836d
|
|
CVE-2021-25122 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-25122 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-25122 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-25142 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us
|
|
CVE-2021-25155 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html
|
|
CVE-2021-25155 - http://packetstormsecurity.com/files/163524/Aruba-Instant-8.7.1.0-Arbitrary-File-Modification.html
|
|
CVE-2021-25156 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html
|
|
CVE-2021-25157 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html
|
|
CVE-2021-25158 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html
|
|
CVE-2021-25159 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html
|
|
CVE-2021-25160 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html
|
|
CVE-2021-25161 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html
|
|
CVE-2021-25162 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html
|
|
CVE-2021-25168 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us
|
|
CVE-2021-25169 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us
|
|
CVE-2021-25170 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us
|
|
CVE-2021-25171 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us
|
|
CVE-2021-25172 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us
|
|
CVE-2021-25179 - https://www.linkedin.com/in/gabrielegristina
|
|
CVE-2021-25215 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-25219 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-25264 - https://community.sophos.com/b/security-blog
|
|
CVE-2021-25264 - https://community.sophos.com/b/security-blog/posts/resolved-lpe-in-endpoint-for-macos-cve-2021-25264
|
|
CVE-2021-25265 - https://community.sophos.com/b/security-blog
|
|
CVE-2021-25265 - https://community.sophos.com/b/security-blog/posts/resolved-rce-in-sophos-connect-client-for-windows-cve-2021-25265
|
|
CVE-2021-25273 - http://seclists.org/fulldisclosure/2021/Dec/3
|
|
CVE-2021-25274 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/
|
|
CVE-2021-25275 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/
|
|
CVE-2021-25276 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/
|
|
CVE-2021-25277 - https://github.com/rauschecker/CVEs/tree/main/CVE-2021-25277
|
|
CVE-2021-25281 - http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html
|
|
CVE-2021-25281 - https://github.com/saltstack/salt/releases
|
|
CVE-2021-25282 - http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html
|
|
CVE-2021-25282 - https://github.com/saltstack/salt/releases
|
|
CVE-2021-25283 - https://github.com/saltstack/salt/releases
|
|
CVE-2021-25284 - https://github.com/saltstack/salt/releases
|
|
CVE-2021-25287 - https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470
|
|
CVE-2021-25288 - https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470
|
|
CVE-2021-25296 - http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html
|
|
CVE-2021-25296 - http://packetstormsecurity.com/files/170924/Nagios-XI-5.7.5-Remote-Code-Execution.html
|
|
CVE-2021-25296 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md
|
|
CVE-2021-25296 - https://www.fastly.com/blog/anatomy-of-a-command-injection-cve-2021-25296-7-8-with-metasploit-module-and
|
|
CVE-2021-25297 - http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html
|
|
CVE-2021-25297 - http://packetstormsecurity.com/files/170924/Nagios-XI-5.7.5-Remote-Code-Execution.html
|
|
CVE-2021-25297 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md
|
|
CVE-2021-25297 - https://www.fastly.com/blog/anatomy-of-a-command-injection-cve-2021-25296-7-8-with-metasploit-module-and
|
|
CVE-2021-25298 - http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html
|
|
CVE-2021-25298 - http://packetstormsecurity.com/files/170924/Nagios-XI-5.7.5-Remote-Code-Execution.html
|
|
CVE-2021-25298 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md
|
|
CVE-2021-25298 - https://www.fastly.com/blog/anatomy-of-a-command-injection-cve-2021-25296-7-8-with-metasploit-module-and
|
|
CVE-2021-25299 - http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html
|
|
CVE-2021-25299 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md
|
|
CVE-2021-25306 - https://research.nccgroup.com/2021/02/28/technical-advisory-administrative-passcode-recovery-and-authenticated-remote-buffer-overflow-vulnerabilities-in-gigaset-dx600a-handset-cve-2021-25309-cve-2021-25306/
|
|
CVE-2021-25309 - https://research.nccgroup.com/2021/02/28/technical-advisory-administrative-passcode-recovery-and-authenticated-remote-buffer-overflow-vulnerabilities-in-gigaset-dx600a-handset-cve-2021-25309-cve-2021-25306/
|
|
CVE-2021-25310 - https://research.nccgroup.com/2021/01/28/technical-advisory-linksys-wrt160nl-authenticated-command-injection-cve-2021-25310/
|
|
CVE-2021-25310 - https://research.nccgroup.com/?research=Technical%20advisories
|
|
CVE-2021-25316 - https://bugzilla.suse.com/show_bug.cgi?id=1182777
|
|
CVE-2021-25326 - http://packetstormsecurity.com/files/162455/Shenzhen-Skyworth-RN510-Information-Disclosure.html
|
|
CVE-2021-25326 - http://seclists.org/fulldisclosure/2021/May/8
|
|
CVE-2021-25326 - https://s3curityb3ast.github.io/KSA-Dev-013.md
|
|
CVE-2021-25327 - http://packetstormsecurity.com/files/162454/Shenzhen-Skyworth-RN510-Cross-Site-Request-Forgery-Cross-Site-Scripting.html
|
|
CVE-2021-25327 - http://seclists.org/fulldisclosure/2021/May/6
|
|
CVE-2021-25327 - https://s3curityb3ast.github.io/KSA-Dev-012.md
|
|
CVE-2021-25328 - http://packetstormsecurity.com/files/162450/Shenzhen-Skyworth-RN510-Buffer-Overflow.html
|
|
CVE-2021-25328 - http://seclists.org/fulldisclosure/2021/May/5
|
|
CVE-2021-25328 - https://s3curityb3ast.github.io/KSA-Dev-011.md
|
|
CVE-2021-25329 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-25329 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-25329 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-25330 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25334 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25335 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25336 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25337 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25338 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25339 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25340 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25344 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25345 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25346 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25347 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25356 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/
|
|
CVE-2021-25356 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25357 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25358 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25359 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25360 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25361 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25362 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25363 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25364 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25365 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25369 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25370 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25371 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25372 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-25382 - https://security.samsungmobile.com/securityUpdate.smsb?year=2020&month=10
|
|
CVE-2021-25383 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25384 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25385 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25386 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25387 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25388 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/
|
|
CVE-2021-25388 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25389 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25390 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/
|
|
CVE-2021-25390 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25391 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/
|
|
CVE-2021-25391 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25392 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/
|
|
CVE-2021-25392 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25393 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/
|
|
CVE-2021-25393 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25394 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25395 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25396 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25397 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/
|
|
CVE-2021-25397 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5
|
|
CVE-2021-25407 - http://packetstormsecurity.com/files/163198/Samsung-NPU-npu_session_format-Out-Of-Bounds-Write.html
|
|
CVE-2021-25407 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6
|
|
CVE-2021-25408 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6
|
|
CVE-2021-25409 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6
|
|
CVE-2021-25410 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/
|
|
CVE-2021-25410 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6
|
|
CVE-2021-25411 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6
|
|
CVE-2021-25412 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6
|
|
CVE-2021-25413 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/
|
|
CVE-2021-25413 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6
|
|
CVE-2021-25414 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/
|
|
CVE-2021-25414 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6
|
|
CVE-2021-25415 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6
|
|
CVE-2021-25416 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6
|
|
CVE-2021-25417 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6
|
|
CVE-2021-25426 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/
|
|
CVE-2021-25426 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7
|
|
CVE-2021-25427 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7
|
|
CVE-2021-25428 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7
|
|
CVE-2021-25429 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7
|
|
CVE-2021-25430 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7
|
|
CVE-2021-25440 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/
|
|
CVE-2021-25443 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=8
|
|
CVE-2021-25444 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=8
|
|
CVE-2021-25449 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9
|
|
CVE-2021-25450 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9
|
|
CVE-2021-25451 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9
|
|
CVE-2021-25452 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9
|
|
CVE-2021-25453 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9
|
|
CVE-2021-25454 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9
|
|
CVE-2021-25455 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9
|
|
CVE-2021-25456 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9
|
|
CVE-2021-25457 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9
|
|
CVE-2021-25458 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9
|
|
CVE-2021-25459 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9
|
|
CVE-2021-25460 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9
|
|
CVE-2021-25461 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9
|
|
CVE-2021-25462 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9
|
|
CVE-2021-25467 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25468 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25469 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25470 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25471 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25472 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25473 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25474 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25475 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25476 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25477 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25478 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25479 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25480 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25481 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25482 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25483 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25484 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25485 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25486 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25487 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25488 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25489 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25490 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25491 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10
|
|
CVE-2021-25500 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=11
|
|
CVE-2021-25501 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=11
|
|
CVE-2021-25502 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=11
|
|
CVE-2021-25503 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=11
|
|
CVE-2021-25510 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12
|
|
CVE-2021-25511 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12
|
|
CVE-2021-25512 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12
|
|
CVE-2021-25513 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12
|
|
CVE-2021-25514 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12
|
|
CVE-2021-25515 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12
|
|
CVE-2021-25516 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12
|
|
CVE-2021-25517 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12
|
|
CVE-2021-25518 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12
|
|
CVE-2021-25519 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12
|
|
CVE-2021-25631 - https://positive.security/blog/url-open-rce#open-libreoffice
|
|
CVE-2021-25646 - http://packetstormsecurity.com/files/162345/Apache-Druid-0.20.0-Remote-Command-Execution.html
|
|
CVE-2021-25659 - https://cert-portal.siemens.com/productcert/pdf/ssa-158827.pdf
|
|
CVE-2021-25679 - http://packetstormsecurity.com/files/162268/Adtran-Personal-Phone-Manager-10.8.1-Persistent-Cross-Site-Scripting.html
|
|
CVE-2021-25679 - https://github.com/3ndG4me/AdTran-Personal-Phone-Manager-Vulns/blob/main/CVE-2021-25679.md
|
|
CVE-2021-25680 - http://packetstormsecurity.com/files/162269/Adtran-Personal-Phone-Manager-10.8.1-Cross-Site-Scripting.html
|
|
CVE-2021-25680 - https://github.com/3ndG4me/AdTran-Personal-Phone-Manager-Vulns/blob/main/CVE-2021-25680.md
|
|
CVE-2021-25681 - http://packetstormsecurity.com/files/162280/Adtran-Personal-Phone-Manager-10.8.1-DNS-Exfiltration.html
|
|
CVE-2021-25681 - https://github.com/3ndG4me/AdTran-Personal-Phone-Manager-Vulns/blob/main/CVE-2021-25681.md
|
|
CVE-2021-25682 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1912326
|
|
CVE-2021-25683 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1912326
|
|
CVE-2021-25684 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1912326
|
|
CVE-2021-25783 - https://github.com/taogogo/taocms/issues/5
|
|
CVE-2021-25784 - https://github.com/taogogo/taocms/issues/4
|
|
CVE-2021-25785 - https://github.com/taogogo/taocms/issues/3
|
|
CVE-2021-25786 - https://github.com/qpdf/qpdf/issues/492
|
|
CVE-2021-25790 - https://www.exploit-db.com/exploits/49352
|
|
CVE-2021-25791 - https://www.exploit-db.com/exploits/49396
|
|
CVE-2021-25829 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25829
|
|
CVE-2021-25830 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25830
|
|
CVE-2021-25831 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25831
|
|
CVE-2021-25832 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25832
|
|
CVE-2021-25833 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25833
|
|
CVE-2021-25856 - https://github.com/pcmt/superMicro-CMS/issues/1
|
|
CVE-2021-25857 - https://github.com/pcmt/superMicro-CMS/issues/2
|
|
CVE-2021-25863 - https://github.com/open5gs/open5gs/issues/764
|
|
CVE-2021-25864 - https://github.com/Foddy/node-red-contrib-huemagic/issues/217
|
|
CVE-2021-25893 - https://www.itas.vn/itas-security-team-found-multi-vulnerabilities-on-magnolia-cms-platform/
|
|
CVE-2021-25894 - https://www.itas.vn/itas-security-team-found-multi-vulnerabilities-on-magnolia-cms-platform/
|
|
CVE-2021-25898 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/
|
|
CVE-2021-25898 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765
|
|
CVE-2021-25899 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/
|
|
CVE-2021-25899 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765
|
|
CVE-2021-25912 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25912
|
|
CVE-2021-25913 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25913
|
|
CVE-2021-25914 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25914
|
|
CVE-2021-25915 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25915
|
|
CVE-2021-25916 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916
|
|
CVE-2021-25917 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25917
|
|
CVE-2021-25918 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25918
|
|
CVE-2021-25919 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25919
|
|
CVE-2021-25921 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25921
|
|
CVE-2021-25922 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25922
|
|
CVE-2021-25923 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25923
|
|
CVE-2021-25924 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25924,
|
|
CVE-2021-25925 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925
|
|
CVE-2021-25926 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25926,
|
|
CVE-2021-25927 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25927
|
|
CVE-2021-25928 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25928
|
|
CVE-2021-25929 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25929
|
|
CVE-2021-25931 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25931
|
|
CVE-2021-25932 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25932
|
|
CVE-2021-25933 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25933
|
|
CVE-2021-25934 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25934
|
|
CVE-2021-25935 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25935
|
|
CVE-2021-25938 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25938
|
|
CVE-2021-25939 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25939
|
|
CVE-2021-25940 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25940
|
|
CVE-2021-25941 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25941
|
|
CVE-2021-25943 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25943
|
|
CVE-2021-25944 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25944
|
|
CVE-2021-25945 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25945
|
|
CVE-2021-25946 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25946
|
|
CVE-2021-25947 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25947
|
|
CVE-2021-25948 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25948
|
|
CVE-2021-25949 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25949
|
|
CVE-2021-25951 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25951
|
|
CVE-2021-25952 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25952
|
|
CVE-2021-25953 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25953
|
|
CVE-2021-25954 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25954
|
|
CVE-2021-25955 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25955
|
|
CVE-2021-25956 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25956
|
|
CVE-2021-25957 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25957
|
|
CVE-2021-25958 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25958
|
|
CVE-2021-25959 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25959
|
|
CVE-2021-25960 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25960
|
|
CVE-2021-25961 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25961
|
|
CVE-2021-25962 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25962
|
|
CVE-2021-25963 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25963
|
|
CVE-2021-25964 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25964
|
|
CVE-2021-25965 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25965
|
|
CVE-2021-25966 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25966
|
|
CVE-2021-25967 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25967
|
|
CVE-2021-25968 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25968
|
|
CVE-2021-25969 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969
|
|
CVE-2021-25970 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25970
|
|
CVE-2021-25971 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25971
|
|
CVE-2021-25972 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25972
|
|
CVE-2021-25973 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25973
|
|
CVE-2021-25974 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25974
|
|
CVE-2021-25975 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25974
|
|
CVE-2021-25976 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976
|
|
CVE-2021-25977 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25977
|
|
CVE-2021-25980 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25980
|
|
CVE-2021-25981 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25981
|
|
CVE-2021-25982 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25982
|
|
CVE-2021-25983 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25983
|
|
CVE-2021-25984 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25984
|
|
CVE-2021-25985 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985
|
|
CVE-2021-25986 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986
|
|
CVE-2021-25987 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25987
|
|
CVE-2021-25988 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25988
|
|
CVE-2021-25989 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25989
|
|
CVE-2021-25990 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25990
|
|
CVE-2021-25991 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25991
|
|
CVE-2021-25992 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25992
|
|
CVE-2021-25993 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25993
|
|
CVE-2021-25994 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25994
|
|
CVE-2021-26078 - http://packetstormsecurity.com/files/163289/Atlassian-Jira-Server-Data-Center-8.16.0-Cross-Site-Scripting.html
|
|
CVE-2021-26084 - http://packetstormsecurity.com/files/164013/Confluence-Server-7.12.4-OGNL-Injection-Remote-Code-Execution.html
|
|
CVE-2021-26084 - http://packetstormsecurity.com/files/164122/Atlassian-Confluence-WebWork-OGNL-Injection.html
|
|
CVE-2021-26084 - http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html
|
|
CVE-2021-26085 - http://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html
|
|
CVE-2021-26086 - http://packetstormsecurity.com/files/164405/Atlassian-Jira-Server-Data-Center-8.4.0-File-Read.html
|
|
CVE-2021-26104 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-f73m-fvj3-m2pm
|
|
CVE-2021-26117 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-26117 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-26117 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-26194 - https://github.com/jerryscript-project/jerryscript/issues/4445
|
|
CVE-2021-26200 - https://www.exploit-db.com/exploits/49462
|
|
CVE-2021-26201 - https://www.exploit-db.com/exploits/49463
|
|
CVE-2021-26215 - https://tuhin1729.medium.com/cve-2021-26215-7ce6800be822
|
|
CVE-2021-26216 - https://tuhin1729.medium.com/cve-2021-26216-ffb33321dc91
|
|
CVE-2021-26228 - https://github.com/BigTiger2020/CASAP-Automated-Enrollment-System/blob/main/README.md
|
|
CVE-2021-26233 - https://voidsec.com/advisories/cve-2021-26233-faststone-image-viewer-v-7-5-user-mode-write-access-violation/
|
|
CVE-2021-26234 - https://voidsec.com/advisories/cve-2021-26234-faststone-image-viewer-v-7-5-user-mode-write-access-violation/
|
|
CVE-2021-26235 - https://voidsec.com/advisories/cve-2021-26235-faststone-image-viewer-v-7-5-user-mode-write-access-violation/
|
|
CVE-2021-26236 - https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/
|
|
CVE-2021-26236 - https://voidsec.com/fuzzing-faststone-image-viewer-cve-2021-26236
|
|
CVE-2021-26236 - https://www.exploit-db.com/exploits/49660
|
|
CVE-2021-26237 - https://voidsec.com/advisories/cve-2021-26237-faststone-image-viewer-v-7-5-user-mode-write-access-violation/
|
|
CVE-2021-26259 - https://github.com/michaelrsweet/htmldoc/issues/417
|
|
CVE-2021-26260 - https://bugzilla.redhat.com/show_bug.cgi?id=1947582
|
|
CVE-2021-26271 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-26271 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-26272 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-26272 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-26272 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-26273 - https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-ninjarmm
|
|
CVE-2021-26274 - https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-ninjarmm
|
|
CVE-2021-26291 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-26291 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-26291 - https://www.whitesourcesoftware.com/resources/blog/maven-security-vulnerability-cve-2021-26291/
|
|
CVE-2021-26295 - http://packetstormsecurity.com/files/162104/Apache-OFBiz-SOAP-Java-Deserialization.html
|
|
CVE-2021-26296 - http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html
|
|
CVE-2021-26296 - http://seclists.org/fulldisclosure/2021/Feb/66
|
|
CVE-2021-26303 - https://packetstormsecurity.com/files/161114/Daily-Expense-Tracker-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-26304 - https://packetstormsecurity.com/files/161114/Daily-Expense-Tracker-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-26333 - http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.html
|
|
CVE-2021-26333 - http://seclists.org/fulldisclosure/2021/Sep/24
|
|
CVE-2021-26414 - http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html
|
|
CVE-2021-26419 - http://packetstormsecurity.com/files/162570/Internet-Explorer-jscript9.dll-Memory-Corruption.html
|
|
CVE-2021-26504 - https://github.com/Foddy/node-red-contrib-huemagic/issues/217
|
|
CVE-2021-26549 - http://packetstormsecurity.com/files/161335/SmartFoxServer-2X-2.17.0-God-Mode-Console-WebSocket-Cross-Site-Scripting.html
|
|
CVE-2021-26549 - https://www.zeroscience.mk/en/vulnerabilities/
|
|
CVE-2021-26549 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5626.php
|
|
CVE-2021-26550 - http://packetstormsecurity.com/files/161337/SmartFoxServer-2X-2.17.0-Credential-Disclosure.html
|
|
CVE-2021-26550 - https://www.zeroscience.mk/en/vulnerabilities/
|
|
CVE-2021-26550 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5627.php
|
|
CVE-2021-26551 - http://packetstormsecurity.com/files/161340/SmartFoxServer-2X-2.17.0-Remote-Code-Execution.html
|
|
CVE-2021-26551 - https://www.zeroscience.mk/en/vulnerabilities/
|
|
CVE-2021-26563 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1158
|
|
CVE-2021-26570 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us
|
|
CVE-2021-26571 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us
|
|
CVE-2021-26572 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us
|
|
CVE-2021-26573 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us
|
|
CVE-2021-26574 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us
|
|
CVE-2021-26575 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us
|
|
CVE-2021-26576 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us
|
|
CVE-2021-26577 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us
|
|
CVE-2021-26596 - https://www.gruppotim.it/redteam
|
|
CVE-2021-26597 - https://www.gruppotim.it/redteam
|
|
CVE-2021-26598 - https://packetstormsecurity.com/files/166403/ImpressCMS-1.4.2-Incorrect-Access-Control.html
|
|
CVE-2021-26599 - http://packetstormsecurity.com/files/166404/ImpressCMS-1.4.2-SQL-Injection.html
|
|
CVE-2021-26600 - http://packetstormsecurity.com/files/166393/ImpressCMS-1.4.2-Authentication-Bypass.html
|
|
CVE-2021-26600 - https://hackerone.com/reports/1081986
|
|
CVE-2021-26601 - http://packetstormsecurity.com/files/166402/ImpressCMS-1.4.2-Path-Traversal.html
|
|
CVE-2021-26690 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-26691 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-26691 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-26698 - http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html
|
|
CVE-2021-26698 - http://seclists.org/fulldisclosure/2021/Jul/33
|
|
CVE-2021-26699 - http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html
|
|
CVE-2021-26699 - http://seclists.org/fulldisclosure/2021/Jul/33
|
|
CVE-2021-26699 - https://seclists.org/fulldisclosure/2021/Jul/33
|
|
CVE-2021-26705 - https://www.exploit-db.com/exploits/49621
|
|
CVE-2021-26708 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.13
|
|
CVE-2021-26708 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c518adafa39f37858697ac9309c6cf1805581446
|
|
CVE-2021-26709 - http://packetstormsecurity.com/files/162133/D-Link-DSL-320B-D1-Pre-Authentication-Buffer-Overflow.html
|
|
CVE-2021-26712 - http://packetstormsecurity.com/files/161473/Asterisk-Project-Security-Advisory-AST-2021-003.html
|
|
CVE-2021-26716 - https://github.com/emoncms/emoncms/issues/1652
|
|
CVE-2021-26717 - http://packetstormsecurity.com/files/161471/Asterisk-Project-Security-Advisory-AST-2021-002.html
|
|
CVE-2021-26718 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310321
|
|
CVE-2021-26723 - http://packetstormsecurity.com/files/161303/Jenzabar-9.2.2-Cross-Site-Scripting.html
|
|
CVE-2021-26723 - https://y0ungdst.medium.com/xss-in-jenzabar-cve-2021-26723-a0749231328
|
|
CVE-2021-26751 - https://n4nj0.github.io/advisories/nedi-multiple-vulnerabilities-i/
|
|
CVE-2021-26752 - https://n4nj0.github.io/advisories/nedi-multiple-vulnerabilities-i/
|
|
CVE-2021-26753 - https://n4nj0.github.io/advisories/nedi-multiple-vulnerabilities-i/
|
|
CVE-2021-26754 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-i/
|
|
CVE-2021-26758 - https://docs.unsafe-inline.com/0day/openlitespeed-web-server-1.7.8-command-injection-to-privilege-escalation-cve-2021-26758
|
|
CVE-2021-26758 - https://github.com/litespeedtech/openlitespeed/issues/217
|
|
CVE-2021-26758 - https://www.exploit-db.com/exploits/49556
|
|
CVE-2021-26762 - https://phpgurukul.com/
|
|
CVE-2021-26762 - https://phpgurukul.com/wp-content/uploads/2019/05/schoolmanagement.zip
|
|
CVE-2021-26762 - https://www.exploit-db.com/exploits/49513
|
|
CVE-2021-26764 - https://packetstormsecurity.com/files/161237/Student-Record-System-4.0-SQL-Injection.html
|
|
CVE-2021-26764 - https://phpgurukul.com/
|
|
CVE-2021-26764 - https://phpgurukul.com/wp-content/uploads/2019/05/schoolmanagement.zip
|
|
CVE-2021-26765 - https://packetstormsecurity.com/files/161237/Student-Record-System-4.0-SQL-Injection.html
|
|
CVE-2021-26765 - https://phpgurukul.com/
|
|
CVE-2021-26765 - https://phpgurukul.com/wp-content/uploads/2019/05/schoolmanagement.zip
|
|
CVE-2021-26776 - https://github.com/cskaza/cszcms/issues/29
|
|
CVE-2021-26787 - http://genesys.com
|
|
CVE-2021-26787 - https://medium.com/@reliable_lait_mouse_975/cross-site-scripting-vulnerability-within-genesys-workforce-management-version-8-5-214-20-a68500cf5e18
|
|
CVE-2021-26795 - http://packetstormsecurity.com/files/164961/Talariax-sendQuick-Alertplus-Server-Admin-4.3-SQL-Injection.html
|
|
CVE-2021-26795 - http://seclists.org/fulldisclosure/2021/Nov/37
|
|
CVE-2021-26797 - https://le0nc.blogspot.com/2021/04/cve-2021-26797-access-control.html
|
|
CVE-2021-26799 - https://github.com/omeka/Omeka/issues/935
|
|
CVE-2021-26804 - https://medium.com/@pedro.ferreira.phf/vulnerability-affecting-some-versions-of-centreon-2b34bd6dc621
|
|
CVE-2021-26805 - https://github.com/justdan96/tsMuxer/issues/395
|
|
CVE-2021-26807 - https://illuminati.services/2021/04/29/cve-2021-26807-gog-galaxy-v2-0-35-dll-load-order-hijacking/
|
|
CVE-2021-26809 - https://packetstormsecurity.com/files/161267/Car-Rental-Project-2.0-Shell-Upload.html
|
|
CVE-2021-26809 - https://www.exploit-db.com/exploits/49520
|
|
CVE-2021-26810 - https://github.com/GD008/vuln/blob/main/DIR-816.md
|
|
CVE-2021-26810 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-26812 - https://github.com/udima-university/moodle-mod_jitsi/issues/67
|
|
CVE-2021-26822 - https://www.exploit-db.com/exploits/49562
|
|
CVE-2021-26824 - https://sites.google.com/view/boss-lab
|
|
CVE-2021-26825 - https://github.com/godotengine/godot/pull/45702
|
|
CVE-2021-26825 - https://github.com/godotengine/godot/pull/45702/files
|
|
CVE-2021-26826 - https://github.com/godotengine/godot/pull/45701
|
|
CVE-2021-26826 - https://github.com/godotengine/godot/pull/45701/commits/403e4fd08b0b212e96f53d926e6273e0745eaa5a
|
|
CVE-2021-26827 - https://github.com/GD008/vuln/blob/main/tplink_wr2041/tplink_WR2041pv1.md
|
|
CVE-2021-26828 - http://packetstormsecurity.com/files/162564/ScadaBR-1.0-1.1CE-Linux-Shell-Upload.html
|
|
CVE-2021-26828 - https://youtu.be/k1teIStQr1A
|
|
CVE-2021-26829 - https://youtu.be/Xh6LPCiLMa8
|
|
CVE-2021-26834 - https://github.com/alagrede/znote-app/issues/5
|
|
CVE-2021-26855 - http://packetstormsecurity.com/files/161846/Microsoft-Exchange-2019-SSRF-Arbitrary-File-Write.html
|
|
CVE-2021-26855 - http://packetstormsecurity.com/files/161938/Microsoft-Exchange-ProxyLogon-Remote-Code-Execution.html
|
|
CVE-2021-26855 - http://packetstormsecurity.com/files/162610/Microsoft-Exchange-2019-Unauthenticated-Email-Download.html
|
|
CVE-2021-26855 - http://packetstormsecurity.com/files/162736/Microsoft-Exchange-ProxyLogon-Collector.html
|
|
CVE-2021-26863 - http://packetstormsecurity.com/files/161768/Microsoft-Windows-Kernel-NtGdiGetDeviceCapsAll-Race-Condition-Use-After-Free.html
|
|
CVE-2021-26906 - http://packetstormsecurity.com/files/161477/Asterisk-Project-Security-Advisory-AST-2021-005.html
|
|
CVE-2021-26910 - http://www.openwall.com/lists/oss-security/2021/02/09/1
|
|
CVE-2021-26910 - https://github.com/netblue30/firejail/commit/97d8a03cad19501f017587cc4e47d8418273834b
|
|
CVE-2021-26910 - https://github.com/netblue30/firejail/releases/tag/0.9.64.4
|
|
CVE-2021-26910 - https://unparalleled.eu/publications/2021/advisory-unpar-2021-0.txt
|
|
CVE-2021-26912 - https://ssd-disclosure.com/?p=4676
|
|
CVE-2021-26912 - https://ssd-disclosure.com/ssd-advisory-netmotion-mobility-server-multiple-deserialization-of-untrusted-data-lead-to-rce/
|
|
CVE-2021-26912 - https://www.netmotionsoftware.com/security-advisories/security-vulnerability-in-mobility-web-server-november-19-2020
|
|
CVE-2021-26913 - https://ssd-disclosure.com/?p=4676
|
|
CVE-2021-26913 - https://ssd-disclosure.com/ssd-advisory-netmotion-mobility-server-multiple-deserialization-of-untrusted-data-lead-to-rce/
|
|
CVE-2021-26913 - https://www.netmotionsoftware.com/security-advisories/security-vulnerability-in-mobility-web-server-november-19-2020
|
|
CVE-2021-26914 - http://packetstormsecurity.com/files/162617/NetMotion-Mobility-Server-MvcUtil-Java-Deserialization.html
|
|
CVE-2021-26914 - https://ssd-disclosure.com/?p=4676
|
|
CVE-2021-26914 - https://ssd-disclosure.com/ssd-advisory-netmotion-mobility-server-multiple-deserialization-of-untrusted-data-lead-to-rce/
|
|
CVE-2021-26914 - https://www.netmotionsoftware.com/security-advisories/security-vulnerability-in-mobility-web-server-november-19-2020
|
|
CVE-2021-26915 - https://ssd-disclosure.com/?p=4676
|
|
CVE-2021-26915 - https://ssd-disclosure.com/ssd-advisory-netmotion-mobility-server-multiple-deserialization-of-untrusted-data-lead-to-rce/
|
|
CVE-2021-26915 - https://www.netmotionsoftware.com/security-advisories/security-vulnerability-in-mobility-web-server-november-19-2020
|
|
CVE-2021-26916 - https://github.com/nopSolutions/nopCommerce/issues/5322
|
|
CVE-2021-26918 - http://packetstormsecurity.com/files/161347/Discord-Probot-Arbitrary-File-Upload.html
|
|
CVE-2021-26918 - https://raw.githubusercontent.com/TheLastVvV/Vulnerability-Reports-and-CVE/main/Reports/Discord%20Probot%20-%20Unrestricted%20File%20Upload.txt
|
|
CVE-2021-26926 - https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b
|
|
CVE-2021-26926 - https://github.com/jasper-software/jasper/issues/264
|
|
CVE-2021-26927 - https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b
|
|
CVE-2021-26927 - https://github.com/jasper-software/jasper/issues/265
|
|
CVE-2021-26928 - https://www.cyberark.com/resources/threat-research-blog/attacking-kubernetes-clusters-through-your-network-plumbing-part-2
|
|
CVE-2021-26929 - http://packetstormsecurity.com/files/162187/Webmail-Edition-5.2.22-XSS-Remote-Code-Execution.html
|
|
CVE-2021-26929 - http://packetstormsecurity.com/files/162194/Horde-Groupware-Webmail-5.2.22-Cross-Site-Scripting.html
|
|
CVE-2021-26935 - https://www.exploit-db.com/exploits/49657
|
|
CVE-2021-26943 - https://www.youtube.com/watch?v=1H3AfaVyeuk
|
|
CVE-2021-27065 - http://packetstormsecurity.com/files/161938/Microsoft-Exchange-ProxyLogon-Remote-Code-Execution.html
|
|
CVE-2021-27065 - http://packetstormsecurity.com/files/162736/Microsoft-Exchange-ProxyLogon-Collector.html
|
|
CVE-2021-27086 - http://packetstormsecurity.com/files/162157/Microsoft-Windows-SCM-Remote-Access-Check-Limit-Bypass-Privilege-Escalation.html
|
|
CVE-2021-27097 - https://github.com/u-boot/u-boot/commit/b6f4c757959f8850e1299a77c8e5713da78e8ec0
|
|
CVE-2021-27113 - https://github.com/GD008/vuln/blob/main/DIR-816_2.md
|
|
CVE-2021-27113 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-27114 - https://github.com/GD008/vuln/blob/main/DIR-816_stackoverflow.md
|
|
CVE-2021-27114 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-27116 - https://github.com/beego/beego/issues/4484
|
|
CVE-2021-27117 - https://github.com/beego/beego/issues/4484
|
|
CVE-2021-27124 - http://packetstormsecurity.com/files/161342/Doctor-Appointment-System-1.0-SQL-Injection.html
|
|
CVE-2021-27124 - https://naku-ratti.medium.com/doctor-appointment-system-1-0-authenticated-sql-dios-7689b1d30f5f
|
|
CVE-2021-27129 - https://packetstormsecurity.com/files/161080/CASAP-Automated-Enrollment-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-27130 - https://packetstormsecurity.com/files/161219/Online-Reviewer-System-1.0-SQL-Injection-Shell-Upload.html
|
|
CVE-2021-27135 - http://seclists.org/fulldisclosure/2021/May/52
|
|
CVE-2021-27138 - https://github.com/u-boot/u-boot/commit/b6f4c757959f8850e1299a77c8e5713da78e8ec0
|
|
CVE-2021-27184 - https://github.com/vitorespf/Advisories/blob/master/Pelco_Digital_Sentry_Server.txt
|
|
CVE-2021-27185 - https://www.npmjs.com/package/samba-client
|
|
CVE-2021-27189 - http://packetstormsecurity.com/files/161507/CIRA-Canadian-Shield-Man-In-The-Middle.html
|
|
CVE-2021-27190 - https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611
|
|
CVE-2021-27190 - https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS
|
|
CVE-2021-27190 - https://github.com/vulf/Peel-Shopping-cart-9.4.0-Stored-XSS
|
|
CVE-2021-27190 - https://www.secuneus.com/cve-2021-27190-peel-shopping-ecommerce-shopping-cart-stored-cross-site-scripting-vulnerability-in-address/
|
|
CVE-2021-27192 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight
|
|
CVE-2021-27193 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight
|
|
CVE-2021-27194 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight
|
|
CVE-2021-27195 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight
|
|
CVE-2021-27197 - https://github.com/vitorespf/Advisories/blob/master/Pelco_Digital_Sentry_Server_AFW.txt
|
|
CVE-2021-27198 - http://packetstormsecurity.com/files/161571/VisualWare-MyConnection-Server-11.x-Remote-Code-Execution.html
|
|
CVE-2021-27198 - http://seclists.org/fulldisclosure/2021/Feb/81
|
|
CVE-2021-27198 - https://www.securifera.com/advisories/cve-2021-27198/
|
|
CVE-2021-27200 - https://www.exploit-db.com/exploits/49989
|
|
CVE-2021-27201 - https://github.com/MucahitSaratar/endian_firewall_authenticated_rce
|
|
CVE-2021-27201 - https://www.endian.com/company/news/endian-community-releases-new-version-332-148/
|
|
CVE-2021-27203 - https://www.rootshellsecurity.net/rootshell-discover-denial-of-service-flaw-dekart-private-disk-encryption-software/
|
|
CVE-2021-27204 - https://www.inputzero.io/2020/12/telegram-privacy-fails-again.html
|
|
CVE-2021-27204 - https://www.youtube.com/watch?v=zEt-_5b4OaA
|
|
CVE-2021-27205 - https://www.inputzero.io/2020/12/telegram-privacy-fails-again.html
|
|
CVE-2021-27205 - https://www.youtube.com/watch?v=Go-4srm_1fQ
|
|
CVE-2021-27211 - http://packetstormsecurity.com/files/165199/Steghide-Hidden-Data-Extraction.html
|
|
CVE-2021-27215 - https://sec-consult.com/vulnerability-lab/advisory/authentication-bypass-genua-genugate/
|
|
CVE-2021-27216 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt
|
|
CVE-2021-27217 - https://blog.inhq.net/posts/yubico-libyubihsm-vuln2
|
|
CVE-2021-27219 - https://gitlab.gnome.org/GNOME/glib/-/issues/2319
|
|
CVE-2021-27223 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310322_1
|
|
CVE-2021-27224 - http://packetstormsecurity.com/files/161449/IrfanView-4.57-Denial-Of-Service-Code-Execution.html
|
|
CVE-2021-27224 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-irfanview-wpg/
|
|
CVE-2021-27230 - http://packetstormsecurity.com/files/161805/ExpressionEngine-6.0.2-PHP-Code-Injection.html
|
|
CVE-2021-27231 - https://sick.codes/sick-2021-006
|
|
CVE-2021-27232 - https://github.com/vitorespf/Advisories/blob/master/Pelco_Digital_Sentry_Server-RSTPLive555%20Activex%20Buffer%20overflow.txt
|
|
CVE-2021-27237 - https://www.exploit-db.com/exploits/49565
|
|
CVE-2021-27251 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders
|
|
CVE-2021-27252 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders
|
|
CVE-2021-27253 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders
|
|
CVE-2021-27254 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders
|
|
CVE-2021-27255 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders
|
|
CVE-2021-27256 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders
|
|
CVE-2021-27257 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders
|
|
CVE-2021-27273 - https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559
|
|
CVE-2021-27275 - https://kb.netgear.com/000062687/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0561
|
|
CVE-2021-27276 - https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0500
|
|
CVE-2021-27290 - https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf
|
|
CVE-2021-27290 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-27306 - https://medium.com/@sew.campos/cve-2021-27306-access-an-authenticated-route-on-kong-api-gateway-6ae3d81968a3
|
|
CVE-2021-27308 - http://packetstormsecurity.com/files/162946/4Images-1.8-Cross-Site-Scripting.html
|
|
CVE-2021-27308 - https://github.com/4images/4images/issues/3
|
|
CVE-2021-27309 - https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22module%22%20xss.md
|
|
CVE-2021-27310 - https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22language%22%20xss.md
|
|
CVE-2021-27312 - https://gist.github.com/LioTree/8d10d123d31f50db05a25586e62a87ba
|
|
CVE-2021-27314 - https://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html
|
|
CVE-2021-27315 - http://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html
|
|
CVE-2021-27316 - http://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html
|
|
CVE-2021-27317 - http://packetstormsecurity.com/files/161574/Doctor-Appointment-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-27318 - http://packetstormsecurity.com/files/161574/Doctor-Appointment-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-27319 - http://packetstormsecurity.com/files/161642/Doctor-Appointment-System-1.0-Blind-SQL-Injection.html
|
|
CVE-2021-27320 - http://packetstormsecurity.com/files/161642/Doctor-Appointment-System-1.0-Blind-SQL-Injection.html
|
|
CVE-2021-27328 - http://packetstormsecurity.com/files/161560/Yeastar-TG400-GSM-Gateway-91.3.0.3-Path-Traversal.html
|
|
CVE-2021-27328 - https://github.com/SQSamir/CVE-2021-27328
|
|
CVE-2021-27330 - http://packetstormsecurity.com/files/161570/Triconsole-3.75-Cross-Site-Scripting.html
|
|
CVE-2021-27330 - https://www.exploit-db.com/exploits/49597
|
|
CVE-2021-27335 - https://hacked0x90.net/index.php/2021/02/15/kollectapp-insecure-java-deserialization/
|
|
CVE-2021-27340 - https://github.com/OS4ED/openSIS-Classic/issues/158
|
|
CVE-2021-27341 - https://github.com/OS4ED/openSIS-Classic/issues/158
|
|
CVE-2021-27345 - https://github.com/ckolivas/lrzip/issues/164
|
|
CVE-2021-27347 - https://github.com/ckolivas/lrzip/issues/165
|
|
CVE-2021-27351 - https://0ffsecninja.github.io/Telegram:CVE-2021-2735.html
|
|
CVE-2021-27352 - https://drive.google.com/file/d/1kSDlPASBCgJEINxTSIsjMWrU4u4T5XCc/view?usp=sharing
|
|
CVE-2021-27352 - https://github.com/xoffense/POC/blob/main/Ilch%202.1.42%20Open%20redirect
|
|
CVE-2021-27357 - https://github.com/RIOT-OS/RIOT/issues/16018
|
|
CVE-2021-27358 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md
|
|
CVE-2021-27358 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md#742-2021-02-17
|
|
CVE-2021-27362 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-irfanview-wpg/
|
|
CVE-2021-27363 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
|
|
CVE-2021-27363 - https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
|
|
CVE-2021-27363 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa
|
|
CVE-2021-27364 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
|
|
CVE-2021-27364 - https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
|
|
CVE-2021-27364 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa
|
|
CVE-2021-27364 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-27365 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
|
|
CVE-2021-27365 - https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
|
|
CVE-2021-27365 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec98ea7070e94cc25a422ec97d1421e28d97b7ee
|
|
CVE-2021-27365 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5
|
|
CVE-2021-27365 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-27368 - https://github.com/monicahq/monica/issues/4888
|
|
CVE-2021-27368 - https://github.com/monicahq/monica/pull/4543
|
|
CVE-2021-27369 - https://github.com/monicahq/monica/issues/4888
|
|
CVE-2021-27369 - https://github.com/monicahq/monica/pull/4543
|
|
CVE-2021-27370 - http://packetstormsecurity.com/files/161501/Monica-2.19.1-Cross-Site-Scripting.html
|
|
CVE-2021-27370 - https://github.com/monicahq/monica/issues/4888
|
|
CVE-2021-27370 - https://github.com/monicahq/monica/pull/4543
|
|
CVE-2021-27371 - https://github.com/monicahq/monica/issues/4888
|
|
CVE-2021-27371 - https://github.com/monicahq/monica/pull/4543
|
|
CVE-2021-27405 - https://github.com/progfay/scrapbox-parser/pull/519
|
|
CVE-2021-27405 - https://github.com/progfay/scrapbox-parser/pull/539
|
|
CVE-2021-27414 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107991A7777&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
CVE-2021-27416 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107991A7777&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
CVE-2021-27427 - https://github.com/RIOT-OS/RIOT
|
|
CVE-2021-27433 - https://github.com/ARMmbed/mbed-os/pull/14408
|
|
CVE-2021-27435 - https://github.com/ARMmbed/mbed-os/pull/14408
|
|
CVE-2021-27513 - https://github.com/ArianeBlow/exploit-eyesofnetwork5.3.10/blob/main/PoC-BruteForceID-arbitraty-file-upload-RCE-PrivEsc.py
|
|
CVE-2021-27514 - https://github.com/ArianeBlow/exploit-eyesofnetwork5.3.10/blob/main/PoC-BruteForceID-arbitraty-file-upload-RCE-PrivEsc.py
|
|
CVE-2021-27519 - http://packetstormsecurity.com/files/162942/FUDForum-3.1.0-Cross-Site-Scripting.html
|
|
CVE-2021-27519 - https://github.com/fudforum/FUDforum/issues/2
|
|
CVE-2021-27520 - http://packetstormsecurity.com/files/162942/FUDForum-3.1.0-Cross-Site-Scripting.html
|
|
CVE-2021-27520 - https://github.com/fudforum/FUDforum/issues/2
|
|
CVE-2021-27526 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20page%20parameter
|
|
CVE-2021-27527 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20valueID%20parameter
|
|
CVE-2021-27528 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20refID%20parameter
|
|
CVE-2021-27529 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20limit%20parameter
|
|
CVE-2021-27530 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20index.php%20URI
|
|
CVE-2021-27531 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20query%20parameter
|
|
CVE-2021-27544 - https://packetstormsecurity.com/files/161468/Beauty-Parlour-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-27545 - https://packetstormsecurity.com/files/161468/Beauty-Parlour-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-27545 - https://www.exploit-db.com/exploits/49580
|
|
CVE-2021-27549 - https://www.genymotion.com/download/
|
|
CVE-2021-27549 - https://www.youtube.com/watch?v=Tod8Q6sf0P8
|
|
CVE-2021-27550 - https://gist.github.com/sqrtrev/1f9986d4bdd1393832c60a97b56e170a
|
|
CVE-2021-27559 - https://github.com/monicahq/monica/issues/4888
|
|
CVE-2021-27559 - https://github.com/monicahq/monica/pull/4543
|
|
CVE-2021-27561 - https://ssd-disclosure.com/?p=4688
|
|
CVE-2021-27565 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
|
CVE-2021-27565 - https://www.kb.cert.org/vuls/id/608209
|
|
CVE-2021-27568 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-27568 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-27568 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-27597 - http://packetstormsecurity.com/files/164596/SAP-NetWeaver-ABAP-Gateway-Memory-Corruption.html
|
|
CVE-2021-27597 - https://launchpad.support.sap.com/#/notes/3020209
|
|
CVE-2021-27606 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html
|
|
CVE-2021-27607 - http://packetstormsecurity.com/files/164591/SAP-NetWeaver-ABAP-Dispatcher-Service-Memory-Corruption.html
|
|
CVE-2021-27620 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html
|
|
CVE-2021-27622 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html
|
|
CVE-2021-27624 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html
|
|
CVE-2021-27625 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html
|
|
CVE-2021-27626 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html
|
|
CVE-2021-27627 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html
|
|
CVE-2021-27628 - http://packetstormsecurity.com/files/164591/SAP-NetWeaver-ABAP-Dispatcher-Service-Memory-Corruption.html
|
|
CVE-2021-27629 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html
|
|
CVE-2021-27630 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html
|
|
CVE-2021-27631 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html
|
|
CVE-2021-27632 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html
|
|
CVE-2021-27633 - http://packetstormsecurity.com/files/164596/SAP-NetWeaver-ABAP-Gateway-Memory-Corruption.html
|
|
CVE-2021-27633 - https://launchpad.support.sap.com/#/notes/3020209
|
|
CVE-2021-27634 - http://packetstormsecurity.com/files/164596/SAP-NetWeaver-ABAP-Gateway-Memory-Corruption.html
|
|
CVE-2021-27634 - https://launchpad.support.sap.com/#/notes/3020209
|
|
CVE-2021-27635 - http://packetstormsecurity.com/files/164592/SAP-JAVA-NetWeaver-System-Connections-XML-Injection.html
|
|
CVE-2021-27673 - http://packetstormsecurity.com/files/163083/Zenario-CMS-8.8.52729-SQL-Injection.html
|
|
CVE-2021-27691 - https://hackmd.io/@aZYpdinUS2SD-yhAeHwOkw/rkhTCGzMd
|
|
CVE-2021-27692 - https://hackmd.io/@aZYpdinUS2SD-yhAeHwOkw/ry-t4QfMu
|
|
CVE-2021-27695 - https://www.exploit-db.com/exploits/49649
|
|
CVE-2021-27697 - https://github.com/RIOT-OS/RIOT/issues/16062
|
|
CVE-2021-27698 - https://github.com/RIOT-OS/RIOT/issues/16085
|
|
CVE-2021-27705 - https://hackmd.io/Zb7lfFaNR0ScpaTssECFbg
|
|
CVE-2021-27706 - https://hackmd.io/BhzJ4H20TjqKUiBrDOIKaw
|
|
CVE-2021-27707 - https://hackmd.io/U7OVgYIuRcOKV7SW5-euHw
|
|
CVE-2021-27708 - https://hackmd.io/7FtB06f-SJ-SCfkMYcXYxA
|
|
CVE-2021-27708 - https://hackmd.io/mDgIBvoxSPCZrZiZjfQGhw
|
|
CVE-2021-27710 - https://hackmd.io/Hy3oVgtcQiuqAtv9FdylHw
|
|
CVE-2021-27710 - https://hackmd.io/KjXzQdjDRjOuRjoZZXQo_A
|
|
CVE-2021-27722 - https://www.exploit-db.com/exploits/49590
|
|
CVE-2021-27722 - https://www.exploit-db.com/exploits/49638
|
|
CVE-2021-27804 - http://packetstormsecurity.com/files/161623/jpeg-xl-0.3.1-Memory-Corruption.html
|
|
CVE-2021-27804 - http://seclists.org/fulldisclosure/2021/Mar/2
|
|
CVE-2021-27807 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-27807 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-27807 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-27815 - https://github.com/libexif/exif/issues/4
|
|
CVE-2021-27822 - https://www.exploit-db.com/exploits/49595
|
|
CVE-2021-27825 - http://packetstormsecurity.com/files/171771/MAC-1200R-Directory-Traversal.html
|
|
CVE-2021-27828 - https://www.exploit-db.com/exploits/49884
|
|
CVE-2021-27836 - https://github.com/libxls/libxls/issues/94
|
|
CVE-2021-27853 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-VU855201-J3z8CKTX
|
|
CVE-2021-27855 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5685.php
|
|
CVE-2021-27856 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5684.php
|
|
CVE-2021-27857 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5683.php
|
|
CVE-2021-27858 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5682.php
|
|
CVE-2021-27859 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5681.php
|
|
CVE-2021-27876 - http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html
|
|
CVE-2021-27877 - http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html
|
|
CVE-2021-27878 - http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html
|
|
CVE-2021-27885 - http://packetstormsecurity.com/files/161651/e107-CMS-2.3.0-Cross-Site-Request-Forgery.html
|
|
CVE-2021-27886 - http://packetstormsecurity.com/files/163416/Docker-Dashboard-Remote-Command-Execution.html
|
|
CVE-2021-27889 - http://packetstormsecurity.com/files/161908/MyBB-1.8.25-Remote-Command-Execution.html
|
|
CVE-2021-27890 - http://packetstormsecurity.com/files/161908/MyBB-1.8.25-Remote-Command-Execution.html
|
|
CVE-2021-27906 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-27906 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-27906 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-27913 - https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3
|
|
CVE-2021-27918 - https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
|
|
CVE-2021-27919 - https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
|
|
CVE-2021-27928 - http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html
|
|
CVE-2021-27931 - https://github.com/sl4cky/LumisXP-XXE---POC/blob/main/poc.txt
|
|
CVE-2021-27932 - https://advisories.stormshield.eu/2021-004/
|
|
CVE-2021-27933 - http://seclists.org/fulldisclosure/2021/Apr/61
|
|
CVE-2021-27940 - https://www.youtube.com/watch?v=DOYm0DIS3Us
|
|
CVE-2021-27945 - https://squirro.atlassian.net/wiki/spaces/DOC/pages/2389672672/CVE-2021-27945+-+Cross-Site+Scripting
|
|
CVE-2021-27946 - http://packetstormsecurity.com/files/161918/MyBB-1.8.25-SQL-Injection.html
|
|
CVE-2021-27956 - https://raxis.com/blog/cve-2021-27956-manage-engine-xss
|
|
CVE-2021-27956 - https://www.manageengine.com
|
|
CVE-2021-27962 - https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724
|
|
CVE-2021-27962 - https://community.grafana.com/t/release-notes-v6-7-x/27119
|
|
CVE-2021-27963 - https://github.com/erberkan/SonLogger-vulns
|
|
CVE-2021-27964 - http://packetstormsecurity.com/files/161793/SonLogger-4.2.3.3-Shell-Upload.html
|
|
CVE-2021-27964 - https://github.com/erberkan/SonLogger-vulns
|
|
CVE-2021-27969 - https://www.exploit-db.com/exploits/49670
|
|
CVE-2021-27971 - http://packetstormsecurity.com/files/165690/Alps-Alpine-Touchpad-Driver-DLL-Injection.html
|
|
CVE-2021-27973 - http://packetstormsecurity.com/files/162404/Piwigo-11.3.0-SQL-Injection.html
|
|
CVE-2021-27983 - https://github.com/maxsite/cms/issues/430
|
|
CVE-2021-27984 - https://github.com/pluck-cms/pluck/issues/98
|
|
CVE-2021-27989 - https://github.com/syedsohaibkarim/PoC-StoredXSS-Appspace6.2.4
|
|
CVE-2021-27990 - https://github.com/syedsohaibkarim/PoC-BrokenAuth-AppSpace6.2.4
|
|
CVE-2021-27999 - https://medium.com/@tusharvaidya16/authenticated-blind-error-based-sql-injection-on-local-services-search-engine-management-system-3e99779f0850
|
|
CVE-2021-28000 - https://tusharvaidya16.medium.com/local-services-search-engine-management-system-project-lssmes-1-0-af2cae7cbbf
|
|
CVE-2021-28001 - https://www.exploit-db.com/exploits/49616
|
|
CVE-2021-28002 - https://www.exploit-db.com/exploits/49617
|
|
CVE-2021-28006 - https://www.exploit-db.com/exploits/49605
|
|
CVE-2021-28007 - https://www.exploit-db.com/exploits/49607
|
|
CVE-2021-28021 - https://github.com/nothings/stb/issues/1108
|
|
CVE-2021-28026 - https://gitlab.com/wg1/jpeg-xl/-/issues/163
|
|
CVE-2021-28040 - https://github.com/ossec/ossec-hids/issues/1953
|
|
CVE-2021-28041 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-28042 - https://herolab.usd.de/security-advisories/usd-2020-0028/
|
|
CVE-2021-28060 - https://fatihhcelik.github.io/posts/Group-Office-CRM-SSRF/
|
|
CVE-2021-28070 - https://github.com/PopojiCMS/PopojiCMS/issues/31
|
|
CVE-2021-28079 - https://github.com/theart42/cves/blob/master/CVE-2021-28079/CVE-2021-28079.md
|
|
CVE-2021-28088 - https://anotepad.com/note/read/s3kkk6h7
|
|
CVE-2021-28093 - http://packetstormsecurity.com/files/163569/OX-Documents-7.10.5-Improper-Authorization.html
|
|
CVE-2021-28094 - http://packetstormsecurity.com/files/163569/OX-Documents-7.10.5-Improper-Authorization.html
|
|
CVE-2021-28095 - http://packetstormsecurity.com/files/163569/OX-Documents-7.10.5-Improper-Authorization.html
|
|
CVE-2021-28113 - http://packetstormsecurity.com/files/163428/Okta-Access-Gateway-2020.5.5-Authenticated-Remote-Root.html
|
|
CVE-2021-28114 - https://labs.bishopfox.com/advisories
|
|
CVE-2021-28114 - https://labs.bishopfox.com/advisories/froala-editor-v3.2.6
|
|
CVE-2021-28115 - http://packetstormsecurity.com/files/161746/MyBB-OUGC-Feedback-1.8.22-Cross-Site-Scripting.html
|
|
CVE-2021-28127 - https://advisories.stormshield.eu
|
|
CVE-2021-28127 - https://advisories.stormshield.eu/2021-006
|
|
CVE-2021-28128 - https://github.com/strapi/strapi/releases
|
|
CVE-2021-28128 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt
|
|
CVE-2021-28132 - https://abuyv.com/cve/lucy-file-upload-RCE
|
|
CVE-2021-28133 - http://packetstormsecurity.com/files/161897/Zoom-5.4.3-54779.1115-5.5.4-13142.0301-Information-Disclosure.html
|
|
CVE-2021-28133 - http://seclists.org/fulldisclosure/2021/Mar/48
|
|
CVE-2021-28133 - https://thehackernews.com/2021/03/new-zoom-screen-sharing-bug-lets-other.html
|
|
CVE-2021-28133 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt
|
|
CVE-2021-28133 - https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133
|
|
CVE-2021-28133 - https://www.youtube.com/watch?v=SonmmgQlLzg
|
|
CVE-2021-28135 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-28136 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-28139 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-28142 - http://packetstormsecurity.com/files/162182/CITSmart-ITSM-9.1.2.27-SQL-Injection.html
|
|
CVE-2021-28143 - https://github.com/vitorespf/Advisories/blob/master/DLINK-DIR-841-command-injection.txt
|
|
CVE-2021-28144 - http://packetstormsecurity.com/files/161757/D-Link-DIR-3060-1.11b04-Command-Injection.html
|
|
CVE-2021-28144 - http://seclists.org/fulldisclosure/2021/Mar/23
|
|
CVE-2021-28146 - https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724
|
|
CVE-2021-28146 - https://community.grafana.com/t/release-notes-v6-7-x/27119
|
|
CVE-2021-28147 - https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724
|
|
CVE-2021-28147 - https://community.grafana.com/t/release-notes-v6-7-x/27119
|
|
CVE-2021-28148 - https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724
|
|
CVE-2021-28148 - https://community.grafana.com/t/release-notes-v6-7-x/27119
|
|
CVE-2021-28153 - https://gitlab.gnome.org/GNOME/glib/-/issues/2325
|
|
CVE-2021-28155 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-28160 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990
|
|
CVE-2021-28161 - https://github.com/eclipse-theia/theia/issues/8794
|
|
CVE-2021-28162 - https://github.com/eclipse-theia/theia/issues/7283
|
|
CVE-2021-28163 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-28163 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-28163 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-28164 - http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html
|
|
CVE-2021-28164 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-28164 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-28164 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-28165 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-28165 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-28165 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-28165 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-28168 - https://github.com/eclipse-ee4j/jersey/pull/4712
|
|
CVE-2021-28168 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-28169 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-28169 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-28169 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-28170 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-28211 - https://bugzilla.tianocore.org/show_bug.cgi?id=1816
|
|
CVE-2021-28233 - https://github.com/brackeen/ok-file-formats/issues/11
|
|
CVE-2021-28236 - https://github.com/LibreDWG/libredwg/issues/324
|
|
CVE-2021-28237 - https://github.com/LibreDWG/libredwg/issues/325
|
|
CVE-2021-28242 - http://packetstormsecurity.com/files/162489/b2evolution-7-2-2-SQL-Injection.html
|
|
CVE-2021-28242 - https://deadsh0t.medium.com/authenticated-boolean-based-blind-error-based-sql-injection-b752225f0644
|
|
CVE-2021-28246 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/
|
|
CVE-2021-28247 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/
|
|
CVE-2021-28248 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/
|
|
CVE-2021-28249 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/
|
|
CVE-2021-28250 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/
|
|
CVE-2021-28269 - https://www.exploit-db.com/exploits/49679
|
|
CVE-2021-28269 - https://www.zeroscience.mk/en/vulnerabilities
|
|
CVE-2021-28269 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5634.php
|
|
CVE-2021-28271 - https://www.exploit-db.com/exploits/49678
|
|
CVE-2021-28271 - https://www.zeroscience.mk/en/vulnerabilities
|
|
CVE-2021-28271 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5633.php
|
|
CVE-2021-28275 - https://github.com/Matthias-Wandel/jhead/issues/17
|
|
CVE-2021-28277 - https://github.com/Matthias-Wandel/jhead/issues/16
|
|
CVE-2021-28278 - https://github.com/Matthias-Wandel/jhead/issues/15
|
|
CVE-2021-28280 - https://anotepad.com/notes/2skndayt
|
|
CVE-2021-28293 - https://0xdb9.in/2021/06/07/cve-2021-28293.html
|
|
CVE-2021-28294 - https://www.exploit-db.com/exploits/49615
|
|
CVE-2021-28295 - https://www.exploit-db.com/exploits/49618
|
|
CVE-2021-28300 - https://github.com/gpac/gpac/issues/1702
|
|
CVE-2021-28302 - https://github.com/pupnp/pupnp/issues/249
|
|
CVE-2021-28313 - http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html
|
|
CVE-2021-28313 - http://seclists.org/fulldisclosure/2021/Apr/40
|
|
CVE-2021-28321 - http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html
|
|
CVE-2021-28321 - http://seclists.org/fulldisclosure/2021/Apr/40
|
|
CVE-2021-28322 - http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html
|
|
CVE-2021-28322 - http://seclists.org/fulldisclosure/2021/Apr/40
|
|
CVE-2021-28323 - http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html
|
|
CVE-2021-28323 - http://seclists.org/fulldisclosure/2021/Apr/40
|
|
CVE-2021-28363 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-28376 - https://herolab.usd.de/en/security-advisories/usd-2021-0006
|
|
CVE-2021-28377 - https://herolab.usd.de/en/security-advisories/usd-2021-0007/
|
|
CVE-2021-28378 - https://github.com/go-gitea/gitea/pull/14898
|
|
CVE-2021-28379 - http://packetstormsecurity.com/files/161836/VestaCP-0.9.8-Cross-Site-Request-Forgery.html
|
|
CVE-2021-28382 - https://raxis.com/blog/cve-2021-28382
|
|
CVE-2021-28417 - http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html
|
|
CVE-2021-28417 - https://github.com/seopanel/Seo-Panel/issues/208
|
|
CVE-2021-28418 - http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html
|
|
CVE-2021-28418 - https://github.com/seopanel/Seo-Panel/issues/207
|
|
CVE-2021-28419 - http://packetstormsecurity.com/files/162322/SEO-Panel-4.8.0-SQL-Injection.html
|
|
CVE-2021-28419 - https://github.com/seopanel/Seo-Panel/issues/209
|
|
CVE-2021-28420 - http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html
|
|
CVE-2021-28420 - https://github.com/seopanel/Seo-Panel/issues/206
|
|
CVE-2021-28423 - https://nhattruong.blog/2021/05/22/cve-2021-28423-teachers-record-management-system-1-0-searchdata-error-based-sql-injection-authenticated/
|
|
CVE-2021-28423 - https://packetstormsecurity.com/files/163172/Teachers-Record-Management-System-1.0-SQL-Injection.html
|
|
CVE-2021-28423 - https://www.exploit-db.com/exploits/50018
|
|
CVE-2021-28424 - https://nhattruong.blog/2021/05/22/cve-2021-28424-teachers-record-management-system-1-0-email-stored-cross-site-scripting-xss-vulnerability-authenticated/
|
|
CVE-2021-28424 - https://packetstormsecurity.com/files/163171/Teachers-Record-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-28424 - https://www.exploit-db.com/exploits/50019
|
|
CVE-2021-28429 - https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/c94875471e3ba3dc396c6919ff3ec9b14539cd71
|
|
CVE-2021-28459 - http://packetstormsecurity.com/files/162190/Microsoft-Azure-DevOps-Server-2020.0.1-Cross-Site-Scripting.html
|
|
CVE-2021-28459 - http://seclists.org/fulldisclosure/2021/Apr/25
|
|
CVE-2021-28476 - http://packetstormsecurity.com/files/163497/Microsoft-Hyper-V-vmswitch.sys-Proof-Of-Concept.html
|
|
CVE-2021-28485 - https://www.ericsson.com/en/about-us/security/psirt
|
|
CVE-2021-28485 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2021-28488 - https://www.ericsson.com
|
|
CVE-2021-28488 - https://www.ericsson.com/en/about-us/enterprise-security/psirt
|
|
CVE-2021-28488 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2021-28653 - https://www.westerndigital.com/support/productsecurity/wdc-21003-armorLock-insecure-key-storage-vulnerability
|
|
CVE-2021-28657 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-28657 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-28660 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=74b6b20df8cfe90ada777d621b54c32e69e27cd7
|
|
CVE-2021-28661 - https://github.com/silverstripe/silverstripe-graphql/releases
|
|
CVE-2021-28663 - https://github.com/lntrx/CVE-2021-28663
|
|
CVE-2021-28665 - https://advisories.stormshield.eu/
|
|
CVE-2021-28680 - https://labanskoller.se/blog/2021/03/23/the-devise-extension-that-peeled-off-one-layer-of-the-security-onion-cve-2021-28680/
|
|
CVE-2021-28684 - https://peterka.tech/blog/posts/cve-2021-28684/
|
|
CVE-2021-28807 - https://www.shielder.it/advisories/qnap-qcenter-post-auth-remote-code-execution-via-qpkg/
|
|
CVE-2021-28807 - https://www.shielder.it/advisories/qnap-qcenter-virtual-stored-xss/
|
|
CVE-2021-28838 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-28839 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-28840 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-28855 - https://fatihhcelik.github.io/posts/NULL-Pointer-Dereference-Deark/
|
|
CVE-2021-28856 - https://fatihhcelik.github.io/posts/Division-By-Zero-Deark/
|
|
CVE-2021-28857 - https://yunus-shn.medium.com/tp-links-tl-wpa4220-v4-0-cleartext-credentials-in-cookie-7516a2649394
|
|
CVE-2021-28858 - https://yunus-shn.medium.com/tp-links-tl-wpa4220-v4-0-cleartext-transmission-of-sensitive-information-40357c778b84
|
|
CVE-2021-28861 - https://bugs.python.org/issue43223
|
|
CVE-2021-28903 - https://github.com/CESNET/libyang/issues/1453
|
|
CVE-2021-28918 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md
|
|
CVE-2021-28918 - https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/
|
|
CVE-2021-28927 - http://libretro.com
|
|
CVE-2021-28927 - https://labs.bishopfox.com/advisories/retroarch-for-windows-version-1.9.0
|
|
CVE-2021-28935 - http://packetstormsecurity.com/files/162287/CMS-Made-Simple-2.2.15-Cross-Site-Scripting.html
|
|
CVE-2021-28936 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990
|
|
CVE-2021-28937 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990
|
|
CVE-2021-28940 - https://www.exploit-db.com/exploits/49643
|
|
CVE-2021-28950 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8
|
|
CVE-2021-28950 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=775c5033a0d164622d9d10dd0f0a5531639ed3ed
|
|
CVE-2021-28957 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-28958 - https://blog.stmcyber.com/vulns/cve-2021-28958/
|
|
CVE-2021-28958 - https://www.manageengine.com
|
|
CVE-2021-28959 - https://www.manageengine.com
|
|
CVE-2021-28960 - https://www.manageengine.com
|
|
CVE-2021-28962 - https://advisories.stormshield.eu/
|
|
CVE-2021-28963 - https://issues.shibboleth.net/jira/browse/SSPCPP-922
|
|
CVE-2021-28964 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5
|
|
CVE-2021-28969 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-005.txt
|
|
CVE-2021-28970 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-006.txt
|
|
CVE-2021-28971 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea
|
|
CVE-2021-28972 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678
|
|
CVE-2021-28975 - https://www.compass-security.com/fileadmin/Research/Advisories/2021-18_CSNC-2021-018-WPMailster_XSS_CSRF.txt
|
|
CVE-2021-28979 - https://www.gruppotim.it/redteam
|
|
CVE-2021-28998 - https://github.com/beerpwn/CVE/blob/master/cms_made_simple_2021/file_upload_RCE/File_upload_to_RCE.md
|
|
CVE-2021-28998 - https://seclists.org/fulldisclosure/2021/Mar/50
|
|
CVE-2021-28999 - https://github.com/beerpwn/CVE/blob/master/cms_made_simple_2021/sqli_order_by/CMS-MS-SQLi-report.md
|
|
CVE-2021-28999 - https://seclists.org/fulldisclosure/2021/Mar/49
|
|
CVE-2021-29002 - https://github.com/plone/Products.CMFPlone/issues/3255
|
|
CVE-2021-29002 - https://www.exploit-db.com/exploits/49668
|
|
CVE-2021-29003 - http://packetstormsecurity.com/files/162174/Genexis-PLATINUM-4410-2.1-P4410-V2-1.28-Remote-Command-Execution.html
|
|
CVE-2021-29004 - https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29004-POC-req.txt
|
|
CVE-2021-29004 - https://github.com/mrojz/rconfig-exploit/blob/main/README.md
|
|
CVE-2021-29005 - https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29005-POC.sh
|
|
CVE-2021-29006 - https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29006-POC.py
|
|
CVE-2021-29008 - https://github.com/seopanel/Seo-Panel/issues/211
|
|
CVE-2021-29009 - https://github.com/seopanel/Seo-Panel/issues/210
|
|
CVE-2021-29010 - https://github.com/seopanel/Seo-Panel/issues/212
|
|
CVE-2021-29011 - http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-Session-Management-Cross-Site-Scripting.html
|
|
CVE-2021-29011 - https://github.com/1d8/publications/tree/main/cve-2021-29011
|
|
CVE-2021-29012 - http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-Session-Management-Cross-Site-Scripting.html
|
|
CVE-2021-29012 - https://github.com/1d8/publications/tree/main/cve-2021-29012
|
|
CVE-2021-29022 - https://notnnor.github.io/research/2021/03/17/full-path-discloure-in-invoiceplane.html
|
|
CVE-2021-29023 - https://notnnor.github.io/research/2021/03/16/weak-password-recovery-mechanism-in-invoiceplane.html
|
|
CVE-2021-29025 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md
|
|
CVE-2021-29026 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md
|
|
CVE-2021-29027 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md
|
|
CVE-2021-29028 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md
|
|
CVE-2021-29029 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md
|
|
CVE-2021-29030 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md
|
|
CVE-2021-29031 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md
|
|
CVE-2021-29032 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md
|
|
CVE-2021-29033 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md
|
|
CVE-2021-29041 - https://issues.liferay.com/browse/LPE-17131
|
|
CVE-2021-29049 - https://issues.liferay.com/browse/LPE-17211
|
|
CVE-2021-29054 - https://packetstormsecurity.com/files/162077/Papoo-CMS-Cross-Site-Request-Forgery.html
|
|
CVE-2021-29055 - https://packetstormsecurity.com/files/161394/School-File-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-29056 - https://github.com/pixelimity/pixelimity/issues/21
|
|
CVE-2021-29059 - https://github.com/yetingli/PoCs/blob/main/CVE-2021-29059/IS-SVG.md
|
|
CVE-2021-29060 - https://github.com/yetingli/PoCs/blob/main/CVE-2021-29060/Color-String.md
|
|
CVE-2021-29061 - https://github.com/yetingli/PoCs/blob/main/CVE-2021-29061/Vfsjfilechooser2.md
|
|
CVE-2021-29061 - https://github.com/yetingli/SaveResults/blob/main/md/vfsjfilechooser2.md
|
|
CVE-2021-29063 - https://github.com/yetingli/PoCs/blob/main/CVE-2021-29063/Mpmath.md
|
|
CVE-2021-29067 - https://kb.netgear.com/000063017/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0492
|
|
CVE-2021-29068 - https://kb.netgear.com/000063021/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0155
|
|
CVE-2021-29070 - https://kb.netgear.com/000063019/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Routers-PSV-2020-0530
|
|
CVE-2021-29072 - https://kb.netgear.com/000063018/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0493
|
|
CVE-2021-29075 - https://kb.netgear.com/000063010/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-WiFi-Systems-PSV-2020-0466
|
|
CVE-2021-29099 - https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/security-advisory-e21-03-server-sql/
|
|
CVE-2021-29100 - https://www.esri.com/arcgis-blog/products/arcgis-earth/administration/arcgis-earth-security-update
|
|
CVE-2021-29154 - http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html
|
|
CVE-2021-29154 - https://news.ycombinator.com/item?id=26757760
|
|
CVE-2021-29154 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-29155 - https://www.kernel.org
|
|
CVE-2021-29155 - https://www.openwall.com/lists/oss-security/2021/04/18/4
|
|
CVE-2021-29158 - https://support.sonatype.com/hc/en-us/articles/1500006126462
|
|
CVE-2021-29158 - https://support.sonatype.com/hc/en-us/categories/201980768-Welcome-to-the-Sonatype-Support-Knowledge-Base
|
|
CVE-2021-29159 - https://support.sonatype.com/hc/en-us/articles/1500005031082
|
|
CVE-2021-29159 - https://support.sonatype.com/hc/en-us/categories/201980768-Welcome-to-the-Sonatype-Support-Knowledge-Base
|
|
CVE-2021-29252 - https://www.rsa.com/en-us/company/vulnerability-response-policy
|
|
CVE-2021-29253 - https://www.rsa.com/en-us/company/vulnerability-response-policy
|
|
CVE-2021-29265 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7
|
|
CVE-2021-29266 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.9
|
|
CVE-2021-29267 - https://github.com/Security-AVS/CVE-2021-29267
|
|
CVE-2021-29281 - https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload
|
|
CVE-2021-29281 - https://www.exploit-db.com/exploits/50181
|
|
CVE-2021-29294 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-29295 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-29296 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-29302 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-29302
|
|
CVE-2021-29323 - https://github.com/Moddable-OpenSource/moddable/issues/5
|
|
CVE-2021-29324 - https://github.com/Moddable-OpenSource/moddable/issues/586
|
|
CVE-2021-29325 - https://github.com/Moddable-OpenSource/moddable/issues/582
|
|
CVE-2021-29326 - https://github.com/Moddable-OpenSource/moddable/issues/583
|
|
CVE-2021-29327 - https://github.com/Moddable-OpenSource/moddable/issues/580
|
|
CVE-2021-29328 - https://github.com/Moddable-OpenSource/moddable/issues/585
|
|
CVE-2021-29329 - https://github.com/Moddable-OpenSource/moddable/issues/587
|
|
CVE-2021-29337 - https://github.com/rjt-gupta/CVE-2021-29337
|
|
CVE-2021-29338 - https://github.com/uclouvain/openjpeg/issues/1338
|
|
CVE-2021-29343 - https://www.exploit-db.com/exploits/49707
|
|
CVE-2021-29349 - https://github.com/0xBaz/CVE-2021-29349/issues/1
|
|
CVE-2021-29369 - https://www.npmjs.com/package/@rkesters/gnuplot
|
|
CVE-2021-29370 - https://medium.com/@kunal94/indirect-uxss-issues-on-a-private-integrated-browser-219f6b809b6c
|
|
CVE-2021-29376 - https://www.openwall.com/lists/oss-security/2021/03/24/2
|
|
CVE-2021-29378 - https://gitee.com/pear-admin/Pear-Admin-Think/issues/I3DIEC
|
|
CVE-2021-29379 - https://cool-y.github.io/2021/03/02/DIR-802-OS-Command-Injection
|
|
CVE-2021-29379 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-29387 - https://www.exploit-db.com/exploits/49722
|
|
CVE-2021-29388 - https://www.exploit-db.com/exploits/49723
|
|
CVE-2021-29390 - https://bugzilla.redhat.com/show_bug.cgi?id=1943797
|
|
CVE-2021-29393 - https://ardent-security.com
|
|
CVE-2021-29393 - https://ardent-security.com/en/advisory/asa-2021-01/
|
|
CVE-2021-29394 - https://ardent-security.com
|
|
CVE-2021-29394 - https://ardent-security.com/en/advisory/asa-2021-02/
|
|
CVE-2021-29395 - https://ardent-security.com/en/advisory/asa-2021-03/
|
|
CVE-2021-29396 - https://ardent-security.com/en/advisory/asa-2021-04/
|
|
CVE-2021-29397 - https://ardent-security.com/en/advisory/asa-2021-05/
|
|
CVE-2021-29398 - https://ardent-security.com/en/advisory/asa-2021-06/
|
|
CVE-2021-29414 - https://eprint.iacr.org/2021/640
|
|
CVE-2021-29415 - https://eprint.iacr.org/2021/640
|
|
CVE-2021-29425 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-29425 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-29425 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-29425 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-29439 - https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities
|
|
CVE-2021-29440 - http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html
|
|
CVE-2021-29440 - https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities
|
|
CVE-2021-29442 - https://github.com/alibaba/nacos/issues/4463
|
|
CVE-2021-29447 - http://packetstormsecurity.com/files/163148/XML-External-Entity-Via-MP3-File-Upload-On-WordPress.html
|
|
CVE-2021-29447 - http://packetstormsecurity.com/files/164198/WordPress-5.7-Media-Library-XML-Injection.html
|
|
CVE-2021-29447 - https://blog.sonarsource.com/wordpress-xxe-security-vulnerability/
|
|
CVE-2021-29449 - http://packetstormsecurity.com/files/163715/Pi-Hole-Remove-Commands-Linux-Privilege-Escalation.html
|
|
CVE-2021-29458 - https://github.com/Exiv2/exiv2/pull/1536
|
|
CVE-2021-29460 - http://packetstormsecurity.com/files/162359/Kirby-CMS-3.5.3.1-Cross-Site-Scripting.html
|
|
CVE-2021-29473 - https://github.com/Exiv2/exiv2/security/policy
|
|
CVE-2021-29474 - https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-p528-555r-pf87
|
|
CVE-2021-29475 - https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-pxxg-px9v-6qf3
|
|
CVE-2021-29484 - https://blog.sonarsource.com/ghost-admin-takeover
|
|
CVE-2021-29486 - https://www.npmjs.com/package/cumulative-distribution-function
|
|
CVE-2021-29505 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-29505 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-29505 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-29505 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-29623 - https://github.com/Exiv2/exiv2/pull/1627
|
|
CVE-2021-29624 - https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
|
|
CVE-2021-29641 - http://packetstormsecurity.com/files/162118/Monospace-Directus-Headless-CMS-File-Upload-Rule-Bypass.html
|
|
CVE-2021-29641 - http://seclists.org/fulldisclosure/2021/Apr/14
|
|
CVE-2021-29641 - https://sec-consult.com/vulnerability-lab/advisory/arbitrary-file-upload-and-bypassing-htaccess-rules-in-monospace-directus-headless-cms/
|
|
CVE-2021-29643 - https://raxis.com/blog/prtg-network-monitor-cve-2021-29643
|
|
CVE-2021-29646 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11
|
|
CVE-2021-29646 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0217ed2848e8538bcf9172d97ed2eeb4a26041bb
|
|
CVE-2021-29647 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11
|
|
CVE-2021-29647 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50535249f624d0072cd885bcdce4e4b6fb770160
|
|
CVE-2021-29648 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11
|
|
CVE-2021-29648 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef
|
|
CVE-2021-29649 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11
|
|
CVE-2021-29649 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f60a85cad677c4f9bb4cadd764f1d106c38c7cf8
|
|
CVE-2021-29650 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11
|
|
CVE-2021-29650 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=175e476b8cdf2a4de7432583b49c871345e4f8a1
|
|
CVE-2021-29657 - http://packetstormsecurity.com/files/163324/KVM-nested_svm_vmrun-Double-Fetch.html
|
|
CVE-2021-29657 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.12
|
|
CVE-2021-29657 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a58d9166a756a0f4a6618e4f593232593d6df134
|
|
CVE-2021-29660 - https://www.gruppotim.it/redteam
|
|
CVE-2021-29661 - https://www.gruppotim.it/redteam
|
|
CVE-2021-29662 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md
|
|
CVE-2021-29662 - https://sick.codes/sick-2021-018/
|
|
CVE-2021-29663 - http://sourceforge.net/projects/coursems
|
|
CVE-2021-29700 - https://www.ibm.com/support/pages/node/6496749
|
|
CVE-2021-29921 - https://github.com/python/cpython/pull/12577
|
|
CVE-2021-29921 - https://github.com/python/cpython/pull/25099
|
|
CVE-2021-29921 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
|
|
CVE-2021-29921 - https://sick.codes/sick-2021-014
|
|
CVE-2021-29921 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-29921 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-29921 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-29921 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-29921 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-29922 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md
|
|
CVE-2021-29923 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md
|
|
CVE-2021-29923 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-29944 - https://bugzilla.mozilla.org/show_bug.cgi?id=1697604
|
|
CVE-2021-29951 - https://bugzilla.mozilla.org/show_bug.cgi?id=1690062
|
|
CVE-2021-29953 - https://bugzilla.mozilla.org/show_bug.cgi?id=1701684
|
|
CVE-2021-29955 - https://bugzilla.mozilla.org/show_bug.cgi?id=1692972
|
|
CVE-2021-29957 - https://bugzilla.mozilla.org/show_bug.cgi?id=1673241
|
|
CVE-2021-29962 - https://bugzilla.mozilla.org/show_bug.cgi?id=1701673
|
|
CVE-2021-29964 - https://bugzilla.mozilla.org/show_bug.cgi?id=1706501
|
|
CVE-2021-29965 - https://bugzilla.mozilla.org/show_bug.cgi?id=1709257
|
|
CVE-2021-29983 - https://bugzilla.mozilla.org/show_bug.cgi?id=1719088
|
|
CVE-2021-29985 - https://bugzilla.mozilla.org/show_bug.cgi?id=1722083
|
|
CVE-2021-29995 - http://packetstormsecurity.com/files/163697/CloverDX-5.9.0-Code-Execution-Cross-Site-Request-Forgery.html
|
|
CVE-2021-29995 - https://support1.cloverdx.com/hc/en-us/articles/360021006520
|
|
CVE-2021-29996 - https://github.com/marktext/marktext/issues/2548
|
|
CVE-2021-30002 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3
|
|
CVE-2021-30002 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899
|
|
CVE-2021-3002 - http://www.cinquino.eu/SeoPanelReflect.htm
|
|
CVE-2021-3002 - https://github.com/seopanel/Seo-Panel/issues/202
|
|
CVE-2021-30028 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990
|
|
CVE-2021-3003 - https://fibonhack.github.io/2021/desktop-telematico-mitm-to-rce
|
|
CVE-2021-30030 - http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html
|
|
CVE-2021-30034 - http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html
|
|
CVE-2021-30039 - http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html
|
|
CVE-2021-30042 - http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html
|
|
CVE-2021-30044 - http://packetstormsecurity.com/files/162262/RemoteClinic-2-Cross-Site-Scripting.html
|
|
CVE-2021-30046 - https://github.com/ukoethe/vigra/issues/494
|
|
CVE-2021-30047 - https://www.exploit-db.com/exploits/49719
|
|
CVE-2021-30048 - https://github.com/201206030/novel-plus/issues/39
|
|
CVE-2021-30048 - https://www.exploit-db.com/exploits/49724
|
|
CVE-2021-30055 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/SQLi-KnowageSuite.md
|
|
CVE-2021-30056 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSS-KnowageSuite.md
|
|
CVE-2021-30057 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/HTLM-Injection-KnowageSuite.md
|
|
CVE-2021-30058 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSSI-KnowageSuite.md
|
|
CVE-2021-3007 - https://github.com/Ling-Yizhou/zendframework3-/blob/main/zend%20framework3%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%20rce.md
|
|
CVE-2021-30072 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-30083 - https://github.com/WebFairyNet/Mediat/issues/3
|
|
CVE-2021-3010 - https://www.exploit-db.com/exploits/49578
|
|
CVE-2021-30108 - https://github.com/liufee/cms/issues/57
|
|
CVE-2021-30109 - https://github.com/Hackdwerg/CVE-2021-30109/blob/main/README.md
|
|
CVE-2021-30110 - https://blog.grimm-co.com/2021/04/time-for-upgrade.html
|
|
CVE-2021-30111 - https://github.com/0xrayan/CVEs/issues/4
|
|
CVE-2021-30112 - https://github.com/0xrayan/CVEs/issues/3
|
|
CVE-2021-30113 - https://github.com/0xrayan/CVEs/issues/1
|
|
CVE-2021-30114 - https://github.com/0xrayan/CVEs/issues/2
|
|
CVE-2021-30117 - https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021
|
|
CVE-2021-30123 - https://trac.ffmpeg.org/ticket/8863
|
|
CVE-2021-30129 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-30129 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-30133 - https://support1.cloverdx.com/hc/en-us/articles/360021006520
|
|
CVE-2021-30134 - https://wpscan.com/vulnerability/0b547728-27d2-402e-ae17-90d539344ec7
|
|
CVE-2021-3014 - https://github.com/M4DM0e/m4dm0e.github.io/blob/gh-pages/_posts/2021-01-04-mikrotik-xss-reflected.md
|
|
CVE-2021-3014 - https://m4dm0e.github.io/2021/01/04/mikrotik-xss-reflected.html
|
|
CVE-2021-30140 - http://packetstormsecurity.com/files/167228/LiquidFiles-3.4.15-Cross-Site-Scripting.html
|
|
CVE-2021-30145 - https://devel0pment.de/?p=2217
|
|
CVE-2021-30146 - https://github.com/Security-AVS/CVE-2021-30146
|
|
CVE-2021-30147 - http://packetstormsecurity.com/files/162136/DMA-Radius-Manager-4.4.0-Cross-Site-Request-Forgery.html
|
|
CVE-2021-30149 - http://packetstormsecurity.com/files/162128/Composr-10.0.36-Shell-Upload.html
|
|
CVE-2021-30150 - http://packetstormsecurity.com/files/162111/Composr-CMS-10.0.36-Cross-Site-Scripting.html
|
|
CVE-2021-30151 - https://github.com/mperham/sidekiq/issues/4852
|
|
CVE-2021-30178 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=919f4ebc598701670e80e31573a58f1f2d2bf918
|
|
CVE-2021-3018 - http://packetstormsecurity.com/files/160815/IPeakCMS-3.5-SQL-Injection.html
|
|
CVE-2021-3018 - https://github.com/M4DM0e/m4dm0e.github.io/blob/gh-pages/_posts/2020-12-07-ipeak-cms-sqli.md
|
|
CVE-2021-3018 - https://m4dm0e.github.io/2020/12/07/ipeak-cms-sqli.html
|
|
CVE-2021-30201 - https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021
|
|
CVE-2021-30203 - https://github.com/zyx0814/dzzoffice/issues/183
|
|
CVE-2021-30211 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/Stored-XSS-KnowageSuite7-3-surname.md
|
|
CVE-2021-30212 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/Stored-XSS-KnowageSuite7-3-notes.md
|
|
CVE-2021-30213 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSS-KnowageSuite7-3_unauth.md
|
|
CVE-2021-30214 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/CSTI-KnowageSuite7-3.md
|
|
CVE-2021-30224 - https://forum.rukovoditel.net/viewtopic.php?f=19&t=2760
|
|
CVE-2021-3025 - http://packetstormsecurity.com/files/160830/IPS-Community-Suite-4.5.4-SQL-Injection.html
|
|
CVE-2021-30254 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-30255 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-30256 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30257 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30258 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30259 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-30260 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-30261 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin
|
|
CVE-2021-30262 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30263 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-30264 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-30265 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-30266 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-30267 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30268 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30269 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30270 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30271 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30272 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30273 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30274 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30275 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30276 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30278 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30279 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30282 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30283 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30284 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-30285 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin
|
|
CVE-2021-30287 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin
|
|
CVE-2021-30288 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30289 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30290 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-30291 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30292 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30293 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30294 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-30295 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
|
|
CVE-2021-30297 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30298 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30300 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin
|
|
CVE-2021-30301 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin
|
|
CVE-2021-30302 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30303 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30304 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30305 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30306 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30307 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin
|
|
CVE-2021-30308 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin
|
|
CVE-2021-30309 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin
|
|
CVE-2021-30310 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30311 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin
|
|
CVE-2021-30312 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30313 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin
|
|
CVE-2021-30314 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin
|
|
CVE-2021-30315 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30316 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
|
|
CVE-2021-30317 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin
|
|
CVE-2021-30318 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin
|
|
CVE-2021-30319 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin
|
|
CVE-2021-30321 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
|
|
CVE-2021-30322 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin
|
|
CVE-2021-30323 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin
|
|
CVE-2021-30324 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin
|
|
CVE-2021-30325 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin
|
|
CVE-2021-30326 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin
|
|
CVE-2021-30328 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-30329 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-30330 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin
|
|
CVE-2021-30331 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-30332 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-30333 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-30335 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30336 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30337 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30348 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30351 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-30353 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin
|
|
CVE-2021-30468 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-30468 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-30480 - https://www.securityweek.com/200000-awarded-zero-click-zoom-exploit-pwn2own
|
|
CVE-2021-30481 - https://news.ycombinator.com/item?id=26762170
|
|
CVE-2021-30481 - https://www.youtube.com/watch?v=rNQn--9xR1Q
|
|
CVE-2021-30493 - https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/
|
|
CVE-2021-30493 - https://versprite.com/security-resources/
|
|
CVE-2021-30494 - https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/
|
|
CVE-2021-30494 - https://versprite.com/security-resources/
|
|
CVE-2021-30496 - https://t.me/joinchat/bJ9cnUosVh03ZTI0
|
|
CVE-2021-30498 - https://github.com/cacalabs/libcaca/issues/53
|
|
CVE-2021-30499 - https://github.com/cacalabs/libcaca/issues/54
|
|
CVE-2021-30500 - https://github.com/upx/upx/issues/485
|
|
CVE-2021-30501 - https://github.com/upx/upx/issues/486
|
|
CVE-2021-30522 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1251
|
|
CVE-2021-30528 - http://packetstormsecurity.com/files/172844/Chrome-Sandbox-Escape.html
|
|
CVE-2021-30561 - http://packetstormsecurity.com/files/163835/Chrome-JS-WasmJs-InstallConditionalFeatures-Object-Corruption.html
|
|
CVE-2021-3060 - https://security.paloaltonetworks.com/CVE-2021-3060
|
|
CVE-2021-30602 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1348
|
|
CVE-2021-30603 - http://packetstormsecurity.com/files/164259/Chrome-HRTFDatabaseLoader-WaitForLoaderThreadCompletion-Data-Race.html
|
|
CVE-2021-30625 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1352
|
|
CVE-2021-30632 - http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html
|
|
CVE-2021-30635 - https://support.sonatype.com/hc/en-us/articles/1500006879561
|
|
CVE-2021-30637 - http://packetstormsecurity.com/files/162195/htmly-2.8.0-Cross-Site-Scripting.html
|
|
CVE-2021-30639 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366
|
|
CVE-2021-30639 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-30640 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-30640 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-30640 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-30641 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/25
|
|
CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/27
|
|
CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/29
|
|
CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/38
|
|
CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/39
|
|
CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/25
|
|
CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/26
|
|
CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/27
|
|
CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/28
|
|
CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/38
|
|
CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/39
|
|
CVE-2021-30917 - http://packetstormsecurity.com/files/165075/Apple-ColorSync-CMMNDimLinear-Interpolate-Uninitialized-Memory.html
|
|
CVE-2021-30934 - http://www.openwall.com/lists/oss-security/2022/01/21/2
|
|
CVE-2021-30936 - http://www.openwall.com/lists/oss-security/2022/01/21/2
|
|
CVE-2021-30937 - http://packetstormsecurity.com/files/165475/XNU-inm_merge-Heap-Use-After-Free.html
|
|
CVE-2021-30939 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1414
|
|
CVE-2021-30942 - http://packetstormsecurity.com/files/165559/Apple-ColorSync-Out-Of-Bounds-Read.html
|
|
CVE-2021-30949 - http://packetstormsecurity.com/files/165670/XNU-Kernel-mach_msg-Use-After-Free.html
|
|
CVE-2021-30951 - http://www.openwall.com/lists/oss-security/2022/01/21/2
|
|
CVE-2021-30952 - http://www.openwall.com/lists/oss-security/2022/01/21/2
|
|
CVE-2021-30953 - http://www.openwall.com/lists/oss-security/2022/01/21/2
|
|
CVE-2021-30954 - http://www.openwall.com/lists/oss-security/2022/01/21/2
|
|
CVE-2021-30984 - http://www.openwall.com/lists/oss-security/2022/01/21/2
|
|
CVE-2021-3100 - https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities
|
|
CVE-2021-3101 - https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities
|
|
CVE-2021-3110 - https://medium.com/@gondaliyajaimin797/cve-2021-3110-75a24943ca5e
|
|
CVE-2021-3110 - https://www.exploit-db.com/exploits/49410
|
|
CVE-2021-3111 - http://packetstormsecurity.com/files/161600/Concrete5-8.5.4-Cross-Site-Scripting.html
|
|
CVE-2021-3111 - http://packetstormsecurity.com/files/161997/Concrete5-8.5.4-Cross-Site-Scripting.html
|
|
CVE-2021-3113 - https://www.exploit-db.com/exploits/49435
|
|
CVE-2021-3113 - https://www.netsia.com/#netsiaseba
|
|
CVE-2021-3113 - https://www.pentest.com.tr/exploits/Netsia-SEBA-0-16-1-Authentication-Bypass-Add-Root-User-Metasploit.html
|
|
CVE-2021-31152 - http://packetstormsecurity.com/files/162258/Multilaser-Router-RE018-AC1200-Cross-Site-Request-Forgery.html
|
|
CVE-2021-31152 - https://www.youtube.com/watch?v=zN3DVrcu6Eg
|
|
CVE-2021-31156 - https://gist.github.com/NitescuLucian/69cf22d17bf190325118304be04828e8
|
|
CVE-2021-31159 - http://packetstormsecurity.com/files/163192/Zoho-ManageEngine-ServiceDesk-Plus-9.4-User-Enumeration.html
|
|
CVE-2021-31159 - https://www.manageengine.com
|
|
CVE-2021-31159 - https://www.manageengine.com/products/service-desk-msp/readme.html#10519
|
|
CVE-2021-3116 - https://cardaci.xyz/advisories/2021/01/10/proxy.py-2.3.0-broken-basic-authentication/
|
|
CVE-2021-31160 - https://www.manageengine.com/products/service-desk-msp/readme.html#10521
|
|
CVE-2021-31162 - https://github.com/rust-lang/rust/issues/83618
|
|
CVE-2021-31165 - http://packetstormsecurity.com/files/162555/Windows-Container-Manager-Service-CmsRpcSrv_CreateContainer-Privilege-Escalation.html
|
|
CVE-2021-31166 - http://packetstormsecurity.com/files/162722/Microsoft-HTTP-Protocol-Stack-Remote-Code-Execution.html
|
|
CVE-2021-31167 - http://packetstormsecurity.com/files/162559/Windows-Container-Manager-Service-CmsRpcSrv_MapNamedPipeToContainer-Privilege-Escalation.html
|
|
CVE-2021-31168 - http://packetstormsecurity.com/files/162556/Windows-Container-Manager-Service-CmsRpcSrv_MapVirtualDiskToContainer-Privilege-Escalation.html
|
|
CVE-2021-31169 - http://packetstormsecurity.com/files/162557/Windows-Container-Manager-Service-Arbitrary-Object-Directory-Creation-Privilege-Escalation.html
|
|
CVE-2021-3118 - https://www.exploit-db.com/exploits/49392
|
|
CVE-2021-31181 - http://packetstormsecurity.com/files/163208/Microsoft-SharePoint-Unsafe-Control-And-ViewState-Remote-Code-Execution.html
|
|
CVE-2021-3120 - https://github.com/guy-liu/yith-giftdrop
|
|
CVE-2021-31207 - http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Remote-Code-Execution.html
|
|
CVE-2021-3122 - https://github.com/roughb8722/CVE-2021-3122-Details/blob/main/CVE-2021-3122
|
|
CVE-2021-3122 - https://www.tetradefense.com/incident-response-services/active-exploit-a-remote-code-execution-rce-vulnerability-for-ncr-aloha-point-of-sale/
|
|
CVE-2021-31220 - https://advisories.stormshield.eu
|
|
CVE-2021-31220 - https://advisories.stormshield.eu/2021-022/
|
|
CVE-2021-31221 - https://advisories.stormshield.eu
|
|
CVE-2021-31221 - https://advisories.stormshield.eu/2021-023/
|
|
CVE-2021-31222 - https://advisories.stormshield.eu
|
|
CVE-2021-31222 - https://advisories.stormshield.eu/2021-024/
|
|
CVE-2021-31223 - https://advisories.stormshield.eu
|
|
CVE-2021-31223 - https://advisories.stormshield.eu/2021-025/
|
|
CVE-2021-31224 - https://advisories.stormshield.eu
|
|
CVE-2021-31224 - https://advisories.stormshield.eu/2021-026/
|
|
CVE-2021-31225 - https://advisories.stormshield.eu
|
|
CVE-2021-31225 - https://advisories.stormshield.eu/2021-027/
|
|
CVE-2021-31226 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
|
CVE-2021-31226 - https://www.kb.cert.org/vuls/id/608209
|
|
CVE-2021-31227 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
|
CVE-2021-31227 - https://www.kb.cert.org/vuls/id/608209
|
|
CVE-2021-31228 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
|
CVE-2021-31228 - https://www.kb.cert.org/vuls/id/608209
|
|
CVE-2021-31239 - https://github.com/Tsiming/Vulnerabilities/blob/main/SQLite/CVE-2021-31239
|
|
CVE-2021-31239 - https://www.sqlite.org/forum/forumpost/d9fce1a89b
|
|
CVE-2021-3124 - https://www.exploit-db.com/exploits/49406
|
|
CVE-2021-31240 - https://github.com/libming/libming/issues/218
|
|
CVE-2021-31245 - https://medium.com/d3crypt/timing-attack-on-openmptcprouter-vps-admin-authentication-cve-2021-31245-12dd92303e1
|
|
CVE-2021-31249 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31249
|
|
CVE-2021-31250 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31250
|
|
CVE-2021-31251 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31251
|
|
CVE-2021-31252 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31252
|
|
CVE-2021-31254 - https://github.com/gpac/gpac/issues/1703
|
|
CVE-2021-31255 - https://github.com/gpac/gpac/issues/1733
|
|
CVE-2021-31256 - https://github.com/gpac/gpac/issues/1705
|
|
CVE-2021-31257 - https://github.com/gpac/gpac/issues/1734
|
|
CVE-2021-31258 - https://github.com/gpac/gpac/issues/1706
|
|
CVE-2021-31259 - https://github.com/gpac/gpac/issues/1735
|
|
CVE-2021-31260 - https://github.com/gpac/gpac/issues/1736
|
|
CVE-2021-31261 - https://github.com/gpac/gpac/issues/1737
|
|
CVE-2021-31262 - https://github.com/gpac/gpac/issues/1738
|
|
CVE-2021-31280 - https://github.com/fmsdwifull/tp5cms/issues/8
|
|
CVE-2021-3129 - http://packetstormsecurity.com/files/162094/Ignition-2.5.1-Remote-Code-Execution.html
|
|
CVE-2021-3129 - http://packetstormsecurity.com/files/165999/Ignition-Remote-Code-Execution.html
|
|
CVE-2021-31315 - https://www.shielder.it/advisories/telegram-rlottie-blit-stack-buffer-overflow/
|
|
CVE-2021-31316 - https://www.shielder.it/advisories/centos-web-panel-idsession-root-rce/
|
|
CVE-2021-31317 - https://www.shielder.it/advisories/telegram-rlottie-vdasher-vdasher-type-confusion/
|
|
CVE-2021-31318 - https://www.shielder.it/advisories/telegram-rlottie-lotcomplayeritem-lotcomplayeritem-type-confusion/
|
|
CVE-2021-31319 - https://www.shielder.it/advisories/telegram-rlottie-lotgradient-populate-integer-overflow/
|
|
CVE-2021-31320 - https://www.shielder.it/advisories/telegram-rlottie-vgradientcache-generategradientcolortable-heap-buffer-overflow/
|
|
CVE-2021-31321 - https://www.shielder.it/advisories/telegram-rlottie-gray_split_cubic-stack-buffer-overflow/
|
|
CVE-2021-31322 - https://www.shielder.it/advisories/telegram-rlottie-lotgradient-populate-heap-buffer-overflow/
|
|
CVE-2021-31323 - https://www.shielder.it/advisories/telegram-rlottie-lottieparserimpl-parsedashproperty-heap-buffer-overflow/
|
|
CVE-2021-31324 - https://www.shielder.it/advisories/centos-web-panel-idsession-root-rce/
|
|
CVE-2021-31326 - https://github.com/GD008/vuln/blob/main/DIR-816_reset.md
|
|
CVE-2021-31326 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-31329 - https://github.com/remoteclinic/RemoteClinic/issues/16
|
|
CVE-2021-31330 - https://mattschmidt.net/2021/04/14/review-board-xss-discovered/
|
|
CVE-2021-3137 - https://www.exploit-db.com/exploits/49437
|
|
CVE-2021-3138 - http://packetstormsecurity.com/files/162256/Discourse-2.7.0-2FA-Bypass.html
|
|
CVE-2021-3138 - https://github.com/Mesh3l911/Disource
|
|
CVE-2021-31384 - https://kb.juniper.net/
|
|
CVE-2021-31400 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
|
CVE-2021-31400 - https://www.kb.cert.org/vuls/id/608209
|
|
CVE-2021-31401 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
|
CVE-2021-31401 - https://www.kb.cert.org/vuls/id/608209
|
|
CVE-2021-31408 - https://github.com/vaadin/flow/pull/10577
|
|
CVE-2021-3144 - https://github.com/saltstack/salt/releases
|
|
CVE-2021-31440 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36
|
|
CVE-2021-3145 - http://packetstormsecurity.com/files/164085/Ionic-Identity-Vault-4.7-Android-Biometric-Authentication-Bypass.html
|
|
CVE-2021-31476 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-3148 - https://github.com/saltstack/salt/releases
|
|
CVE-2021-3149 - https://kc.mcafee.com/corporate/index?page=content&id=SB10356
|
|
CVE-2021-3150 - https://kc.mcafee.com/corporate/index?page=content&id=SB10356
|
|
CVE-2021-31505 - https://kb.arlo.com/000062592/Security-Advisory-for-Arlo-Q-Plus-SSH-Use-of-Hard-coded-Credentials-Allowing-Privilege-Escalation
|
|
CVE-2021-3151 - http://packetstormsecurity.com/files/162815/i-doit-1.15.2-Cross-Site-Scripting.html
|
|
CVE-2021-3151 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-056
|
|
CVE-2021-31530 - https://www.manageengine.com/products/service-desk-msp/readme.html#10522
|
|
CVE-2021-31531 - https://www.manageengine.com/products/service-desk-msp/readme.html#10521
|
|
CVE-2021-31532 - https://oxide.computer/blog/lpc55/
|
|
CVE-2021-31535 - http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html
|
|
CVE-2021-31535 - http://seclists.org/fulldisclosure/2021/May/52
|
|
CVE-2021-31535 - https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/
|
|
CVE-2021-31535 - https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt
|
|
CVE-2021-31537 - http://seclists.org/fulldisclosure/2021/May/20
|
|
CVE-2021-31538 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-010.txt
|
|
CVE-2021-31539 - https://www.gruppotim.it/redteam
|
|
CVE-2021-31540 - https://www.gruppotim.it/redteam
|
|
CVE-2021-31552 - https://phabricator.wikimedia.org/T152394
|
|
CVE-2021-3156 - http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html
|
|
CVE-2021-3156 - http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Escalation.html
|
|
CVE-2021-3156 - http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html
|
|
CVE-2021-3156 - http://packetstormsecurity.com/files/161293/Sudo-1.8.31p2-1.9.5p1-Buffer-Overflow.html
|
|
CVE-2021-3156 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
|
|
CVE-2021-3156 - http://seclists.org/fulldisclosure/2024/Feb/3
|
|
CVE-2021-3156 - http://www.openwall.com/lists/oss-security/2024/01/30/6
|
|
CVE-2021-3156 - http://www.openwall.com/lists/oss-security/2024/01/30/8
|
|
CVE-2021-3156 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-3156 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-3156 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-31583 - http://packetstormsecurity.com/files/162316/Sipwise-C5-NGCP-CSC-Cross-Site-Scripting.html
|
|
CVE-2021-31583 - https://www.zeroscience.mk/en/vulnerabilities
|
|
CVE-2021-31583 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5648.php
|
|
CVE-2021-31584 - http://packetstormsecurity.com/files/162318/Sipwise-C5-NGCP-CSC-Cross-Site-Request-Forgery.html
|
|
CVE-2021-31584 - https://www.zeroscience.mk/en/vulnerabilities
|
|
CVE-2021-31584 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5649.php
|
|
CVE-2021-31589 - http://packetstormsecurity.com/files/165408/BeyondTrust-Remote-Support-6.0-Cross-Site-Scripting.html
|
|
CVE-2021-31589 - https://cxsecurity.com/issue/WLB-2022010013
|
|
CVE-2021-31599 - http://packetstormsecurity.com/files/164772/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Remote-Code-Execution.html
|
|
CVE-2021-31600 - http://packetstormsecurity.com/files/164787/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-User-Enumeration.html
|
|
CVE-2021-31601 - http://packetstormsecurity.com/files/164779/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Insufficient-Access-Control.html
|
|
CVE-2021-31602 - http://packetstormsecurity.com/files/164784/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Authentication-Bypass.html
|
|
CVE-2021-31604 - http://packetstormsecurity.com/files/164281/OpenVPN-Monitor-1.1.3-Cross-Site-Request-Forgery.html
|
|
CVE-2021-31605 - http://packetstormsecurity.com/files/164278/OpenVPN-Monitor-1.1.3-Command-Injection.html
|
|
CVE-2021-31606 - http://packetstormsecurity.com/files/164274/OpenVPN-Monitor-1.1.3-Authorization-Bypass-Denial-Of-Service.html
|
|
CVE-2021-31607 - https://sec.stealthcopter.com/saltstack-snapper-minion-privledge-escaltion/
|
|
CVE-2021-31609 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-31610 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-31611 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-31612 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-31613 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-31616 - https://blog.inhq.net/posts/keepkey-CVE-2021-31616/
|
|
CVE-2021-31617 - https://advisories.stormshield.eu/
|
|
CVE-2021-31617 - https://advisories.stormshield.eu/2021-020/
|
|
CVE-2021-31618 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-31624 - https://github.com/Lyc-heng/routers/blob/main/routers/stack2.md
|
|
CVE-2021-31627 - https://github.com/Lyc-heng/routers/blob/main/routers/stack3.md
|
|
CVE-2021-3163 - https://github.com/quilljs/quill/issues/3364
|
|
CVE-2021-31630 - https://packetstormsecurity.com/files/162563/OpenPLC-WebServer-3-Remote-Code-Execution.html
|
|
CVE-2021-31630 - https://www.youtube.com/watch?v=l08DHB08Gow
|
|
CVE-2021-3164 - https://github.com/rmccarth/cve-2021-3164
|
|
CVE-2021-31641 - http://packetstormsecurity.com/files/162887/CHIYU-IoT-Cross-Site-Scripting.html
|
|
CVE-2021-31641 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31641
|
|
CVE-2021-31642 - http://packetstormsecurity.com/files/162934/CHIYU-IoT-Denial-Of-Service.html
|
|
CVE-2021-31642 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31642
|
|
CVE-2021-31643 - http://packetstormsecurity.com/files/162887/CHIYU-IoT-Cross-Site-Scripting.html
|
|
CVE-2021-31643 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31643
|
|
CVE-2021-31645 - https://www.exploit-db.com/exploits/49773
|
|
CVE-2021-3165 - https://packetstormsecurity.com/files/160906/SmartAgent-3.1.0-Privilege-Escalation.html
|
|
CVE-2021-31650 - https://www.exploit-db.com/exploits/49493
|
|
CVE-2021-31655 - https://github.com/yinfeidi/Vuls/blob/main/TRENDnet%20TV-IP110WN/CVE-2021-31655.md
|
|
CVE-2021-31658 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-31658
|
|
CVE-2021-31659 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-31659
|
|
CVE-2021-3166 - https://github.com/kaisersource/kaisersource.github.io/blob/main/_posts/2021-01-17-dsl-n14u.md
|
|
CVE-2021-3166 - https://kaisersource.github.io/dsl-n14u
|
|
CVE-2021-31660 - https://github.com/RIOT-OS/RIOT/commit/85da504d2dc30188b89f44c3276fc5a25b31251f
|
|
CVE-2021-31660 - https://github.com/RIOT-OS/RIOT/pull/15947
|
|
CVE-2021-31661 - https://github.com/RIOT-OS/RIOT/commit/609c9ada34da5546cffb632a98b7ba157c112658
|
|
CVE-2021-31661 - https://github.com/RIOT-OS/RIOT/pull/15945
|
|
CVE-2021-31662 - https://github.com/RIOT-OS/RIOT/commit/07f1254d8537497552e7dce80364aaead9266bbe
|
|
CVE-2021-31662 - https://github.com/RIOT-OS/RIOT/pull/15930
|
|
CVE-2021-31663 - https://github.com/RIOT-OS/RIOT/commit/bc59d60be60dfc0a05def57d74985371e4f22d79
|
|
CVE-2021-31663 - https://github.com/RIOT-OS/RIOT/issues/15927
|
|
CVE-2021-31663 - https://github.com/RIOT-OS/RIOT/pull/15929
|
|
CVE-2021-31664 - https://github.com/RIOT-OS/RIOT/commit/44741ff99f7a71df45420635b238b9c22093647a
|
|
CVE-2021-31664 - https://github.com/RIOT-OS/RIOT/pull/15345
|
|
CVE-2021-31673 - http://packetstormsecurity.com/files/167040/Cyclos-4.14.7-Cross-Site-Scripting.html
|
|
CVE-2021-31674 - https://www.exploit-db.com/exploits/50908
|
|
CVE-2021-31676 - https://github.com/RO6OTXX/pescms_vulnerability
|
|
CVE-2021-31676 - https://github.com/lazyphp/PESCMS-TEAM/issues/7
|
|
CVE-2021-31676 - https://github.com/two-kisses/pescms_vulnerability,
|
|
CVE-2021-31677 - https://github.com/RO6OTXX/pescms_vulnerability
|
|
CVE-2021-31677 - https://github.com/lazyphp/PESCMS-TEAM/issues/7,
|
|
CVE-2021-31677 - https://github.com/two-kisses/pescms_vulnerability,
|
|
CVE-2021-31678 - https://github.com/RO6OTXX/pescms_vulnerability
|
|
CVE-2021-31678 - https://github.com/lazyphp/PESCMS-TEAM/issues/7
|
|
CVE-2021-31678 - https://github.com/two-kisses/pescms_vulnerability
|
|
CVE-2021-31679 - https://github.com/RO6OTXX/pescms_vulnerability
|
|
CVE-2021-31679 - https://github.com/lazyphp/PESCMS-TEAM/issues/7
|
|
CVE-2021-31679 - https://github.com/two-kisses/pescms_vulnerability,
|
|
CVE-2021-31680 - https://huntr.dev/bounties/1-other-yolov5/
|
|
CVE-2021-31681 - https://huntr.dev/bounties/1-other-yolov3/
|
|
CVE-2021-31682 - http://packetstormsecurity.com/files/164707/WebCTRL-OEM-6.5-Cross-Site-Scripting.html
|
|
CVE-2021-31684 - https://github.com/netplex/json-smart-v2/issues/67
|
|
CVE-2021-31684 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-31684 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-3169 - https://mp.weixin.qq.com/s/5tgcaIrnDnGP-LvWPw9YCg
|
|
CVE-2021-31693 - https://packetstormsecurity.com/files/162227/WordPress-Photo-Gallery-1.5.69-Cross-Site-Scripting.html
|
|
CVE-2021-31721 - http://packetstormsecurity.com/files/164183/Cloudron-6.2-Cross-Site-Scripting.html
|
|
CVE-2021-31721 - https://www.exploit-db.com/exploits/49859
|
|
CVE-2021-31727 - https://github.com/irql0/CVE-2021-31728/blob/master/CVE-2021-31727.md
|
|
CVE-2021-31728 - https://github.com/irql0/CVE-2021-31728/blob/master/CVE-2021-31728.md
|
|
CVE-2021-31738 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-024.txt
|
|
CVE-2021-31755 - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_3
|
|
CVE-2021-31756 - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_1
|
|
CVE-2021-31757 - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_4
|
|
CVE-2021-31758 - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_2
|
|
CVE-2021-31760 - https://github.com/Mesh3l911/CVE-2021-31760
|
|
CVE-2021-31760 - https://github.com/electronicbots/CVE-2021-31760
|
|
CVE-2021-31760 - https://youtu.be/D45FN8QrzDo
|
|
CVE-2021-31761 - http://packetstormsecurity.com/files/163559/Webmin-1.973-Cross-Site-Request-Forgery.html
|
|
CVE-2021-31761 - https://github.com/Mesh3l911/CVE-2021-31761
|
|
CVE-2021-31761 - https://github.com/electronicbots/CVE-2021-31761
|
|
CVE-2021-31762 - http://packetstormsecurity.com/files/163492/Webmin-1.973-Cross-Site-Request-Forgery.html
|
|
CVE-2021-31762 - https://github.com/Mesh3l911/CVE-2021-31762
|
|
CVE-2021-31762 - https://github.com/electronicbots/CVE-2021-31762
|
|
CVE-2021-31762 - https://youtu.be/qCvEXwyaF5U
|
|
CVE-2021-31769 - https://gist.github.com/bc0d3/6d55866a78f66569383241406e18794f
|
|
CVE-2021-3177 - https://bugs.python.org/issue42938
|
|
CVE-2021-3177 - https://news.ycombinator.com/item?id=26185005
|
|
CVE-2021-3177 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-3177 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-3177 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-3177 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-31777 - http://packetstormsecurity.com/files/162429/TYPO3-6.2.1-SQL-Injection.html
|
|
CVE-2021-31777 - https://excellium-services.com/cert-xlm-advisory/
|
|
CVE-2021-3178 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51b2ee7d006a736a9126e8111d1f24e4fd0afaa6
|
|
CVE-2021-31785 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-31786 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-31787 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-3179 - https://medium.com/@ksteo11/yet-another-password-manager-app-how-to-better-secure-it-8e9df2ce35c8
|
|
CVE-2021-31793 - https://gist.github.com/tj-oconnor/16a4116050bbcb4717315f519b944f1f
|
|
CVE-2021-31795 - https://mcyoloswagham.github.io/linux/
|
|
CVE-2021-31796 - http://packetstormsecurity.com/files/164023/CyberArk-Credential-File-Insufficient-Effective-Key-Space.html
|
|
CVE-2021-31796 - http://seclists.org/fulldisclosure/2021/Sep/1
|
|
CVE-2021-31796 - https://korelogic.com/Resources/Advisories/KL-001-2021-008.txt
|
|
CVE-2021-31797 - http://packetstormsecurity.com/files/164033/CyberArk-Credential-Provider-Race-Condition-Authorization-Bypass.html
|
|
CVE-2021-31797 - http://seclists.org/fulldisclosure/2021/Sep/2
|
|
CVE-2021-31797 - https://korelogic.com/Resources/Advisories/KL-001-2021-009.txt
|
|
CVE-2021-31798 - http://packetstormsecurity.com/files/164035/CyberArk-Credential-Provider-Local-Cache-Decryption.html
|
|
CVE-2021-31798 - http://seclists.org/fulldisclosure/2021/Sep/3
|
|
CVE-2021-31798 - https://korelogic.com/Resources/Advisories/KL-001-2021-010.txt
|
|
CVE-2021-31799 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-31800 - https://github.com/SecureAuthCorp/impacket/releases
|
|
CVE-2021-31805 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-31810 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-31811 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-31811 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-31811 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-31811 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-31811 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-31812 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-31812 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-31812 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-31812 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-31813 - https://raxis.com/blog/cve-2021-31813
|
|
CVE-2021-31814 - https://advisories.stormshield.eu/
|
|
CVE-2021-31814 - https://advisories.stormshield.eu/2021-019/
|
|
CVE-2021-31815 - https://themarkup.org/privacy/2021/04/27/google-promised-its-contact-tracing-app-was-completely-private-but-it-wasnt
|
|
CVE-2021-31826 - https://issues.shibboleth.net/jira/browse/SSPCPP-927
|
|
CVE-2021-31829 - http://www.openwall.com/lists/oss-security/2021/05/04/4
|
|
CVE-2021-3183 - https://seclists.org/fulldisclosure/2021/Jan/20
|
|
CVE-2021-31830 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359
|
|
CVE-2021-31831 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359
|
|
CVE-2021-31832 - https://kc.mcafee.com/corporate/index?page=content&id=SB10360
|
|
CVE-2021-31833 - https://kc.mcafee.com/corporate/index?page=content&id=SB10370
|
|
CVE-2021-31834 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366
|
|
CVE-2021-31835 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366
|
|
CVE-2021-31836 - https://kc.mcafee.com/corporate/index?page=content&id=SB10369
|
|
CVE-2021-31837 - https://kc.mcafee.com/corporate/index?page=content&id=SB10363
|
|
CVE-2021-31838 - https://kc.mcafee.com/corporate/index?page=content&id=SB10342
|
|
CVE-2021-31839 - https://kc.mcafee.com/corporate/index?page=content&id=SB10362
|
|
CVE-2021-31840 - https://kc.mcafee.com/corporate/index?page=content&id=SB10362
|
|
CVE-2021-31841 - https://kc.mcafee.com/corporate/index?page=content&id=SB10369
|
|
CVE-2021-31842 - https://kc.mcafee.com/corporate/index?page=content&id=SB10367
|
|
CVE-2021-31843 - https://kc.mcafee.com/corporate/index?page=content&id=SB10367
|
|
CVE-2021-31844 - https://kc.mcafee.com/corporate/index?page=content&id=SB10368
|
|
CVE-2021-31845 - https://kc.mcafee.com/corporate/index?page=content&id=SB10368
|
|
CVE-2021-31847 - https://kc.mcafee.com/corporate/index?page=content&id=SB10369
|
|
CVE-2021-31848 - https://kc.mcafee.com/corporate/index?page=content&id=SB10371
|
|
CVE-2021-31849 - https://kc.mcafee.com/corporate/index?page=content&id=SB10371
|
|
CVE-2021-31850 - https://kc.mcafee.com/corporate/index?page=content&id=SB10358
|
|
CVE-2021-31851 - https://kc.mcafee.com/corporate/index?page=content&id=SB10372
|
|
CVE-2021-31852 - https://kc.mcafee.com/corporate/index?page=content&id=SB10372
|
|
CVE-2021-31853 - https://kc.mcafee.com/corporate/index?page=content&id=SB10374
|
|
CVE-2021-31854 - https://kc.mcafee.com/corporate/index?page=content&id=SB10378
|
|
CVE-2021-31857 - https://www.manageengine.com
|
|
CVE-2021-31859 - https://www.ysoft.com/en
|
|
CVE-2021-31859 - https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler
|
|
CVE-2021-3186 - http://packetstormsecurity.com/files/161119/Tenda-AC5-AC1200-Wireless-Cross-Site-Scripting.html
|
|
CVE-2021-31862 - https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md
|
|
CVE-2021-31867 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/
|
|
CVE-2021-31869 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/
|
|
CVE-2021-31874 - https://blog.stmcyber.com/vulns/cve-2021-31874/
|
|
CVE-2021-31876 - https://github.com/bitcoin/bitcoin
|
|
CVE-2021-31878 - http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html
|
|
CVE-2021-3188 - https://wehackmx.com/security-research/WeHackMX-2021-001/
|
|
CVE-2021-31916 - https://seclists.org/oss-sec/2021/q1/268
|
|
CVE-2021-31923 - https://docs.pingidentity.com/bundle/pingaccess-53/page/wco1629833104567.html
|
|
CVE-2021-31932 - http://packetstormsecurity.com/files/165964/Nokia-Transport-Module-Authentication-Bypass.html
|
|
CVE-2021-31933 - http://packetstormsecurity.com/files/162572/Chamilo-LMS-1.11.14-Remote-Code-Execution.html
|
|
CVE-2021-31934 - https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html
|
|
CVE-2021-31935 - https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html
|
|
CVE-2021-3195 - https://github.com/bitcoin/bitcoin/issues/20866
|
|
CVE-2021-31950 - http://packetstormsecurity.com/files/163080/Microsoft-SharePoint-Server-16.0.10372.20060-Server-Side-Request-Forgery.html
|
|
CVE-2021-31959 - http://packetstormsecurity.com/files/163056/Internet-Explorer-jscript9.dll-Memory-Corruption.html
|
|
CVE-2021-31962 - http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html
|
|
CVE-2021-3197 - https://github.com/saltstack/salt/releases
|
|
CVE-2021-31970 - http://packetstormsecurity.com/files/163256/Microsoft-Windows-Filtering-Platform-Token-Access-Check-Privilege-Escalation.html
|
|
CVE-2021-3198 - https://www.rapid7.com/blog/post/2021/06/02/untitled-cve-2021-3198-and-cve-2021-3540-mobileiron-shell-escape-privilege-escalation-vulnerabilities/
|
|
CVE-2021-31985 - http://packetstormsecurity.com/files/163443/MpEngine-ASProtect-Embedded-Runtime-DLL-Memory-Corruption.html
|
|
CVE-2021-31987 - https://www.axis.com/files/tech_notes/CVE-2021-31987.pdf
|
|
CVE-2021-3199 - https://github.com/moehw/poc_exploits/tree/master/CVE-2021-3199/poc_uploadImageFile.py
|
|
CVE-2021-3199 - https://github.com/nola-milkin/poc_exploits/blob/master/CVE-2021-3199/poc_uploadImageFile.py
|
|
CVE-2021-3200 - https://github.com/openSUSE/libsolv/issues/416
|
|
CVE-2021-3200 - https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/PoC-testcase_read-2334
|
|
CVE-2021-3200 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-32002 - https://www.secomea.com/support/cybersecurity-advisory
|
|
CVE-2021-32003 - https://www.secomea.com/support/cybersecurity-advisory
|
|
CVE-2021-32004 - https://www.secomea.com/support/cybersecurity-advisory/#4578
|
|
CVE-2021-32005 - https://www.secomea.com/support/cybersecurity-advisory/#5017
|
|
CVE-2021-32006 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2021-32008 - https://www.secomea.com/support/cybersecurity-advisory
|
|
CVE-2021-32009 - https://www.secomea.com/support/cybersecurity-advisory
|
|
CVE-2021-32010 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2021-32012 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-32013 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-32014 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-32021 - https://support.blackberry.com/kb/articleDetail?articleNumber=000088685
|
|
CVE-2021-32022 - https://support.blackberry.com/kb/articleDetail?articleNumber=000088685
|
|
CVE-2021-32023 - https://support.blackberry.com/kb/articleDetail?articleNumber=000088685
|
|
CVE-2021-32033 - http://packetstormsecurity.com/files/163223/Protectimus-SLIM-NFC-Time-Manipulation.html
|
|
CVE-2021-32033 - http://seclists.org/fulldisclosure/2021/Jun/39
|
|
CVE-2021-32033 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-007.txt
|
|
CVE-2021-32051 - http://packetstormsecurity.com/files/162534/Hexagon-G-nius-Auskunftsportal-SQL-Injection.html
|
|
CVE-2021-32051 - https://gist.githubusercontent.com/mke1985/a21a71098f48829916dfec74eff1e24a/raw/f635b060ad03e23fd887de48a79b70040daadadb/CVE-2021-32051
|
|
CVE-2021-32066 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-32089 - https://www.securifera.com/advisories/cve-2021-32089/
|
|
CVE-2021-32089 - https://www.zebra.com/us/en/support-downloads/rfid/rfid-readers/fx9500.html
|
|
CVE-2021-32098 - https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack
|
|
CVE-2021-32099 - https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack
|
|
CVE-2021-3210 - https://github.com/BloodHoundAD/BloodHound/issues/338
|
|
CVE-2021-32100 - https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack
|
|
CVE-2021-32132 - https://github.com/gpac/gpac/issues/1753
|
|
CVE-2021-32134 - https://github.com/gpac/gpac/issues/1756
|
|
CVE-2021-32135 - https://github.com/gpac/gpac/issues/1757
|
|
CVE-2021-32136 - https://github.com/gpac/gpac/issues/1765
|
|
CVE-2021-32137 - https://github.com/gpac/gpac/issues/1766
|
|
CVE-2021-32138 - https://github.com/gpac/gpac/issues/1767
|
|
CVE-2021-32139 - https://github.com/gpac/gpac/issues/1768
|
|
CVE-2021-32142 - https://github.com/LibRaw/LibRaw/issues/400
|
|
CVE-2021-32156 - https://github.com/Mesh3l911/CVE-2021-32156
|
|
CVE-2021-32157 - https://github.com/Mesh3l911/CVE-2021-32157
|
|
CVE-2021-32158 - https://github.com/Mesh3l911/CVE-2021-32158
|
|
CVE-2021-32159 - https://github.com/Mesh3l911/CVE-2021-32159
|
|
CVE-2021-32160 - https://github.com/Mesh3l911/CVE-2021-32160
|
|
CVE-2021-32161 - https://github.com/Mesh3l911/CVE-2021-32161
|
|
CVE-2021-32162 - https://github.com/Mesh3l911/CVE-2021-32162
|
|
CVE-2021-32172 - http://packetstormsecurity.com/files/164445/Maian-Cart-3.8-Remote-Code-Execution.html
|
|
CVE-2021-32172 - https://dreyand.github.io/maian-cart-rce/
|
|
CVE-2021-32172 - https://github.com/DreyAnd/maian-cart-rce
|
|
CVE-2021-32238 - https://www.zeroscience.mk/en/vulnerabilities/
|
|
CVE-2021-32238 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5651.php
|
|
CVE-2021-3224 - https://github.com/cskaza/cszcms/issues/28
|
|
CVE-2021-32256 - https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1927070
|
|
CVE-2021-32263 - https://github.com/brackeen/ok-file-formats/issues/13
|
|
CVE-2021-32265 - https://github.com/axiomatic-systems/Bento4/issues/545
|
|
CVE-2021-32268 - https://github.com/gpac/gpac/issues/1587
|
|
CVE-2021-32269 - https://github.com/gpac/gpac/issues/1574
|
|
CVE-2021-32270 - https://github.com/gpac/gpac/issues/1586
|
|
CVE-2021-32271 - https://github.com/gpac/gpac/issues/1575
|
|
CVE-2021-32272 - https://github.com/knik0/faad2/issues/57
|
|
CVE-2021-32273 - https://github.com/knik0/faad2/issues/56
|
|
CVE-2021-32274 - https://github.com/knik0/faad2/issues/60
|
|
CVE-2021-32275 - https://github.com/grame-cncm/faust/issues/482
|
|
CVE-2021-32276 - https://github.com/knik0/faad2/issues/58
|
|
CVE-2021-32277 - https://github.com/knik0/faad2/issues/59
|
|
CVE-2021-32278 - https://github.com/knik0/faad2/issues/62
|
|
CVE-2021-32281 - https://github.com/marcobambini/gravity/issues/313
|
|
CVE-2021-32282 - https://github.com/marcobambini/gravity/issues/315
|
|
CVE-2021-32283 - https://github.com/marcobambini/gravity/issues/314
|
|
CVE-2021-32284 - https://github.com/marcobambini/gravity/issues/321
|
|
CVE-2021-32285 - https://github.com/marcobambini/gravity/issues/319
|
|
CVE-2021-32286 - https://github.com/ZerBea/hcxtools/issues/155
|
|
CVE-2021-32287 - https://github.com/nokiatech/heif/issues/86
|
|
CVE-2021-32288 - https://github.com/nokiatech/heif/issues/87
|
|
CVE-2021-32289 - https://github.com/nokiatech/heif/issues/85
|
|
CVE-2021-32292 - https://github.com/json-c/json-c/issues/654
|
|
CVE-2021-32294 - https://github.com/drbye78/libgig/issues/1
|
|
CVE-2021-32297 - https://github.com/lief-project/LIEF/issues/449
|
|
CVE-2021-32298 - https://github.com/svanderburg/libiff/issues/10
|
|
CVE-2021-32299 - https://github.com/mmp/pbrt-v3/issues/296
|
|
CVE-2021-32305 - http://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html
|
|
CVE-2021-3236 - https://github.com/vim/vim/issues/7674
|
|
CVE-2021-3239 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-101821
|
|
CVE-2021-3239 - https://packetstormsecurity.com/files/160966/E-Learning-System-1.0-SQL-Injection-Shell-Upload.html
|
|
CVE-2021-3239 - https://www.exploit-db.com/exploits/49434
|
|
CVE-2021-32399 - http://www.openwall.com/lists/oss-security/2021/05/11/2
|
|
CVE-2021-32403 - http://packetstormsecurity.com/files/163023/Intelbras-Router-RF-301K-Cross-Site-Request-Forgery.html
|
|
CVE-2021-32403 - https://www.youtube.com/watch?v=1Ed-2xBFG3M
|
|
CVE-2021-32415 - https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-ninjarmm
|
|
CVE-2021-32426 - https://github.com/Galapag0s/Trendnet_TW100-S4W1CA/blob/main/writeup_XSS.txt
|
|
CVE-2021-3243 - https://drivertom.blogspot.com/2021/01/wfilter-icf-0day-rce.html
|
|
CVE-2021-32434 - https://github.com/leesavide/abcm2ps/issues/83
|
|
CVE-2021-32435 - https://github.com/leesavide/abcm2ps/issues/84
|
|
CVE-2021-32436 - https://github.com/leesavide/abcm2ps/issues/85
|
|
CVE-2021-32437 - https://github.com/gpac/gpac/issues/1770
|
|
CVE-2021-32438 - https://github.com/gpac/gpac/issues/1769
|
|
CVE-2021-32439 - https://github.com/gpac/gpac/issues/1774
|
|
CVE-2021-32440 - https://github.com/gpac/gpac/issues/1772
|
|
CVE-2021-32457 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1230
|
|
CVE-2021-32458 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1231
|
|
CVE-2021-32459 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1241
|
|
CVE-2021-3246 - https://github.com/libsndfile/libsndfile/issues/687
|
|
CVE-2021-32467 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-32468 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-32469 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-32489 - https://blog.inhq.net/posts/yubico-libyubihsm-vuln2/#second-attack-variant-cve-pending
|
|
CVE-2021-3252 - https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-15-224-01
|
|
CVE-2021-32537 - http://packetstormsecurity.com/files/163498/Realtek-RTKVHD64.sys-Out-Of-Bounds-Access.html
|
|
CVE-2021-3254 - https://kaisersource.github.io/dsl-n14u-syn
|
|
CVE-2021-32547 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904
|
|
CVE-2021-32548 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904
|
|
CVE-2021-32549 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904
|
|
CVE-2021-32550 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904
|
|
CVE-2021-32551 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904
|
|
CVE-2021-32552 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904
|
|
CVE-2021-32553 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904
|
|
CVE-2021-32554 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904
|
|
CVE-2021-32555 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904
|
|
CVE-2021-32556 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904
|
|
CVE-2021-32557 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904
|
|
CVE-2021-32558 - http://packetstormsecurity.com/files/163639/Asterisk-Project-Security-Advisory-AST-2021-008.html
|
|
CVE-2021-3256 - https://github.com/poropro/kuaifan/issues/3
|
|
CVE-2021-32563 - http://www.openwall.com/lists/oss-security/2023/01/05/1
|
|
CVE-2021-32563 - http://www.openwall.com/lists/oss-security/2023/01/05/2
|
|
CVE-2021-32568 - https://huntr.dev/bounties/04fc04b3-2dc1-4cad-a090-e403cd66b5ad
|
|
CVE-2021-32569 - https://www.gruppotim.it/it/innovazione/servizi-digitali/cybersecurity/red-team.html
|
|
CVE-2021-32570 - https://www.ericsson.com
|
|
CVE-2021-32570 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2021-32571 - https://www.gruppotim.it/it/innovazione/servizi-digitali/cybersecurity/red-team.html
|
|
CVE-2021-32604 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29000
|
|
CVE-2021-32605 - https://srcincite.io/advisories/src-2021-0015/
|
|
CVE-2021-32612 - http://seclists.org/fulldisclosure/2021/Jun/45
|
|
CVE-2021-32612 - https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt
|
|
CVE-2021-32612 - https://trovent.io/security-advisory-2105-01
|
|
CVE-2021-32617 - https://github.com/Exiv2/exiv2/pull/1657
|
|
CVE-2021-32618 - https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-6qmf-fj6m-686c
|
|
CVE-2021-3262 - https://susos.co/blog/f/cve-disclosureuncovered-sql-injection-in-tripspark-veo-transport
|
|
CVE-2021-32626 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-32627 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-32628 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-32633 - https://cyllective.com/blog/post/plone-authenticated-rce-cve-2021-32633/
|
|
CVE-2021-32640 - https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff
|
|
CVE-2021-32640 - https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693
|
|
CVE-2021-32672 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-32675 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-32682 - http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html
|
|
CVE-2021-32687 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-32695 - https://hackerone.com/reports/1142918
|
|
CVE-2021-32706 - https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-5cm9-6p3m-v259
|
|
CVE-2021-3271 - https://www.gosecure.net/blog/2021/02/16/cve-2021-3271-pressbooks-stored-cross-site-scripting-proof-of-concept/
|
|
CVE-2021-32718 - http://seclists.org/fulldisclosure/2021/Dec/3
|
|
CVE-2021-32719 - https://herolab.usd.de/security-advisories/usd-2021-0011/
|
|
CVE-2021-3272 - https://github.com/jasper-software/jasper/issues/259
|
|
CVE-2021-32723 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-32749 - https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm
|
|
CVE-2021-3275 - http://packetstormsecurity.com/files/161989/TP-Link-Cross-Site-Scripting.html
|
|
CVE-2021-3275 - https://github.com/smriti548/CVE/blob/main/CVE-2021-3275
|
|
CVE-2021-3275 - https://seclists.org/fulldisclosure/2021/Mar/67
|
|
CVE-2021-32751 - https://medium.com/dot-debug/the-perils-of-bash-eval-cc5f9e309cae
|
|
CVE-2021-32762 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-3278 - http://packetstormsecurity.com/files/162919/Local-Service-Search-Engine-Management-System-1.0-SQL-Injection.html
|
|
CVE-2021-3278 - https://www.exploit-db.com/exploits/49163
|
|
CVE-2021-32785 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-32786 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-3279 - https://borrachariadofael.sz.chat/webchat/conversation/6009c625415e206dc77172d3
|
|
CVE-2021-32791 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-32792 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-32803 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-32804 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-32808 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-32808 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-32809 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-32809 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-32816 - https://securitylab.github.com/advisories/GHSL-2021-027-redos-ProtonMail/
|
|
CVE-2021-32817 - https://securitylab.github.com/advisories/GHSL-2021-019-express-hbs/
|
|
CVE-2021-32818 - https://securitylab.github.com/advisories/GHSL-2021-025-haml-coffee/
|
|
CVE-2021-32819 - https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/
|
|
CVE-2021-32820 - https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/
|
|
CVE-2021-32821 - https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/
|
|
CVE-2021-32822 - https://securitylab.github.com/advisories/GHSL-2021-020-pillarjs-hbs/
|
|
CVE-2021-32824 - https://securitylab.github.com/advisories/GHSL-2021-034_043-apache-dubbo/
|
|
CVE-2021-32825 - https://securitylab.github.com/advisories/GHSL-2020-258-zipslip-bblfshd/
|
|
CVE-2021-32826 - https://securitylab.github.com/advisories/GHSL-2021-053-proxyee-down/
|
|
CVE-2021-32827 - https://securitylab.github.com/advisories/GHSL-2021-059-mockserver/
|
|
CVE-2021-32827 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-32829 - https://blog.orange.tw/2019/02/abusing-meta-programming-for-unauthenticated-rce.html
|
|
CVE-2021-32829 - https://securitylab.github.com/advisories/GHSL-2021-065-zstack/
|
|
CVE-2021-32830 - https://securitylab.github.com/advisories/GHSL-2021-061-diez-generation-cmd-injection/
|
|
CVE-2021-32831 - https://securitylab.github.com/advisories/GHSL-2021-066-totaljs-totaljs/
|
|
CVE-2021-32833 - https://securitylab.github.com/advisories/GHSL-2021-051-emby/
|
|
CVE-2021-32834 - https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/
|
|
CVE-2021-32835 - https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/
|
|
CVE-2021-32843 - https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/
|
|
CVE-2021-32844 - https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/
|
|
CVE-2021-32845 - https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/
|
|
CVE-2021-32846 - https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/
|
|
CVE-2021-32847 - https://securitylab.github.com/advisories/GHSL-2021-058-moby-hyperkit/
|
|
CVE-2021-32850 - https://securitylab.github.com/advisories/GHSL-2021-1045_jQuery_MiniColors_Plugin/
|
|
CVE-2021-32851 - https://securitylab.github.com/advisories/GHSL-2021-1047_Mind-elixir/
|
|
CVE-2021-32854 - https://securitylab.github.com/advisories/GHSL-2021-1001-textAngular/
|
|
CVE-2021-32855 - https://securitylab.github.com/advisories/GHSL-2021-1006-vditor/
|
|
CVE-2021-32856 - https://securitylab.github.com/advisories/GHSL-2021-1005-Microweber/
|
|
CVE-2021-32857 - https://securitylab.github.com/advisories/GHSL-2021-1035_Cockpit_Next/
|
|
CVE-2021-32858 - https://securitylab.github.com/advisories/GHSL-2021-1034_esdoc-publish-html-plugin/
|
|
CVE-2021-32859 - https://securitylab.github.com/advisories/GHSL-2021-1042_Baremetrics_Date_Range_Picker/
|
|
CVE-2021-32860 - https://securitylab.github.com/advisories/GHSL-2021-1044_iziModal/
|
|
CVE-2021-32862 - https://github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq
|
|
CVE-2021-3287 - http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html
|
|
CVE-2021-3291 - http://packetstormsecurity.com/files/161613/Zen-Cart-1.5.7b-Remote-Code-Execution.html
|
|
CVE-2021-3291 - https://github.com/MucahitSaratar/zencart_auth_rce_poc
|
|
CVE-2021-32917 - http://www.openwall.com/lists/oss-security/2021/05/13/1
|
|
CVE-2021-32917 - http://www.openwall.com/lists/oss-security/2021/05/14/2
|
|
CVE-2021-32918 - http://www.openwall.com/lists/oss-security/2021/05/13/1
|
|
CVE-2021-32918 - http://www.openwall.com/lists/oss-security/2021/05/14/2
|
|
CVE-2021-32919 - http://www.openwall.com/lists/oss-security/2021/05/13/1
|
|
CVE-2021-32919 - http://www.openwall.com/lists/oss-security/2021/05/14/2
|
|
CVE-2021-32920 - http://www.openwall.com/lists/oss-security/2021/05/13/1
|
|
CVE-2021-32920 - http://www.openwall.com/lists/oss-security/2021/05/14/2
|
|
CVE-2021-32921 - http://www.openwall.com/lists/oss-security/2021/05/13/1
|
|
CVE-2021-32921 - http://www.openwall.com/lists/oss-security/2021/05/14/2
|
|
CVE-2021-32924 - http://packetstormsecurity.com/files/162868/IPS-Community-Suite-4.5.4.2-PHP-Code-Injection.html
|
|
CVE-2021-32924 - http://seclists.org/fulldisclosure/2021/May/80
|
|
CVE-2021-3293 - https://github.com/thinkgad/Bugs/blob/main/emlog%20v5.3.1%20has%20Full%20Path%20Disclosure%20vulnerability.md
|
|
CVE-2021-3294 - http://packetstormsecurity.com/files/161421/CASAP-Automated-Enrollment-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-3294 - https://www.exploit-db.com/exploits/49469
|
|
CVE-2021-32942 - https://www.aveva.com/en/support/cyber-security-updates/
|
|
CVE-2021-3298 - https://www.exploit-db.com/exploits/49468
|
|
CVE-2021-33032 - https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/
|
|
CVE-2021-33032 - https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf
|
|
CVE-2021-33033 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.14
|
|
CVE-2021-33033 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7
|
|
CVE-2021-33033 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8
|
|
CVE-2021-33033 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad5d07f4a9cd671233ae20983848874731102c08
|
|
CVE-2021-33034 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4
|
|
CVE-2021-33034 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3
|
|
CVE-2021-33037 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366
|
|
CVE-2021-33037 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-33037 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-33037 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-33037 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-33041 - https://github.com/yoshuawuyts/vmd/issues/137
|
|
CVE-2021-33044 - http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html
|
|
CVE-2021-33044 - http://seclists.org/fulldisclosure/2021/Oct/13
|
|
CVE-2021-33045 - http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html
|
|
CVE-2021-33045 - http://seclists.org/fulldisclosure/2021/Oct/13
|
|
CVE-2021-3305 - https://github.com/liong007/Feishu/issues/1
|
|
CVE-2021-33055 - https://blog.stmcyber.com/vulns/cve-2021-33055/
|
|
CVE-2021-33057 - https://arxiv.org/pdf/2205.15202.pdf
|
|
CVE-2021-3310 - https://www.westerndigital.com/support/productsecurity/wdc-21002-my-cloud-firmware-version-5-10-122
|
|
CVE-2021-3313 - https://www.compass-security.com/fileadmin/Research/Advisories/2021-07_CSNC-2021-013_XSS_in_Plone_CMS.txt
|
|
CVE-2021-3314 - https://n4nj0.github.io/advisories/oracle-glassfish-reflected-xss/
|
|
CVE-2021-3314 - https://www.gruppotim.it/redteam
|
|
CVE-2021-3317 - http://packetstormsecurity.com/files/161208/Klog-Server-2.4.1-Command-Injection.html
|
|
CVE-2021-3318 - http://packetstormsecurity.com/files/162314/DzzOffice-2.02.1-Cross-Site-Scripting.html
|
|
CVE-2021-33183 - https://www.synology.com/security/advisory/Synology_SA_21_08
|
|
CVE-2021-33193 - https://portswigger.net/research/http2
|
|
CVE-2021-33193 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-33193 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-33205 - https://www.westerndigital.com/support/productsecurity/wdc-21007-edgerover-windows-app-ver-0-25
|
|
CVE-2021-33207 - https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33207
|
|
CVE-2021-33208 - https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33208
|
|
CVE-2021-3321 - http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-w44j-66g7-xw99
|
|
CVE-2021-33211 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-021.txt
|
|
CVE-2021-33211 - https://www.syss.de/pentest-blog/
|
|
CVE-2021-33212 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-020.txt
|
|
CVE-2021-33212 - https://www.syss.de/pentest-blog/
|
|
CVE-2021-33213 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-027.txt
|
|
CVE-2021-33213 - https://www.syss.de/pentest-blog/
|
|
CVE-2021-33214 - https://labs.bishopfox.com/advisories
|
|
CVE-2021-33214 - https://labs.bishopfox.com/advisories/ecatcher-desktop-version-6.6.4
|
|
CVE-2021-33215 - http://seclists.org/fulldisclosure/2021/May/76
|
|
CVE-2021-33216 - http://seclists.org/fulldisclosure/2021/May/78
|
|
CVE-2021-33217 - http://seclists.org/fulldisclosure/2021/May/77
|
|
CVE-2021-33218 - https://seclists.org/fulldisclosure/2021/May/74
|
|
CVE-2021-33219 - https://seclists.org/fulldisclosure/2021/May/75
|
|
CVE-2021-33220 - http://seclists.org/fulldisclosure/2021/May/73
|
|
CVE-2021-33221 - http://seclists.org/fulldisclosure/2021/May/72
|
|
CVE-2021-33235 - https://github.com/michaelrsweet/htmldoc/issues/426
|
|
CVE-2021-33236 - https://github.com/michaelrsweet/htmldoc/issues/425
|
|
CVE-2021-3325 - https://github.com/mikaku/Monitorix/issues/309
|
|
CVE-2021-33254 - https://awxylitol.github.io/2021/05/09/embedthis-appweb-npd-bug.html
|
|
CVE-2021-33256 - https://docs.unsafe-inline.com/0day/manageengine-adselfservice-plus-6.1-csv-injection
|
|
CVE-2021-33259 - https://github.com/jayus0821/uai-poc/blob/main/D-Link/DIR-868L/webaccess_UAI.md
|
|
CVE-2021-33259 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-3326 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-3326 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-33265 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln05
|
|
CVE-2021-33265 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-33266 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln04
|
|
CVE-2021-33266 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-33267 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln02
|
|
CVE-2021-33267 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-33268 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln03
|
|
CVE-2021-33268 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-33269 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln01
|
|
CVE-2021-33269 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-33270 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln06
|
|
CVE-2021-33270 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-33271 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln11
|
|
CVE-2021-33271 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-33274 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln07
|
|
CVE-2021-33274 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-3328 - https://jankopecky.net/index.php/2021/04/08/cve-2021-3328-abyss-web-server-remote-dos/
|
|
CVE-2021-3329 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-117
|
|
CVE-2021-33293 - https://groups.google.com/u/1/g/hugin-ptx/c/gLtz2vweD74
|
|
CVE-2021-33294 - https://sourceware.org/bugzilla/show_bug.cgi?id=27501
|
|
CVE-2021-33295 - https://github.com/laurent22/joplin/commit/9c20d5947d1fa4678a8b640792ff3d31224f0adf
|
|
CVE-2021-33295 - https://github.com/laurent22/joplin/releases/tag/v1.8.5
|
|
CVE-2021-33295 - https://the-it-wonders.blogspot.com/2021/05/joplin-app-desktop-version-vulnerable.html
|
|
CVE-2021-33318 - https://github.com/kaoudis/advisories/blob/main/0-2021.md
|
|
CVE-2021-33320 - https://issues.liferay.com/browse/LPE-17007
|
|
CVE-2021-33321 - https://help.liferay.com/hc/en-us/articles/360050785632
|
|
CVE-2021-33322 - https://issues.liferay.com/browse/LPE-16981
|
|
CVE-2021-33323 - https://issues.liferay.com/browse/LPE-17049
|
|
CVE-2021-33324 - https://issues.liferay.com/browse/LPE-17001
|
|
CVE-2021-33325 - https://issues.liferay.com/browse/LPE-17042
|
|
CVE-2021-33326 - https://issues.liferay.com/browse/LPE-17093
|
|
CVE-2021-33327 - https://issues.liferay.com/browse/LPE-17075
|
|
CVE-2021-33328 - https://issues.liferay.com/browse/LPE-17100
|
|
CVE-2021-33330 - https://issues.liferay.com/browse/LPE-17127
|
|
CVE-2021-33331 - https://issues.liferay.com/browse/LPE-17022
|
|
CVE-2021-33332 - https://issues.liferay.com/browse/LPE-17053
|
|
CVE-2021-33333 - https://issues.liferay.com/browse/LPE-17032
|
|
CVE-2021-33334 - https://issues.liferay.com/browse/LPE-17039
|
|
CVE-2021-33335 - https://issues.liferay.com/browse/LPE-17103
|
|
CVE-2021-33336 - https://issues.liferay.com/browse/LPE-17078
|
|
CVE-2021-33337 - https://issues.liferay.com/browse/LPE-17101
|
|
CVE-2021-33338 - https://issues.liferay.com/browse/LPE-17030
|
|
CVE-2021-33339 - https://issues.liferay.com/browse/LPE-17102
|
|
CVE-2021-33346 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-33351 - https://www.exploit-db.com/exploits/50113
|
|
CVE-2021-33352 - https://www.exploit-db.com/exploits/50113
|
|
CVE-2021-33353 - https://www.exploit-db.com/exploits/50113
|
|
CVE-2021-33354 - https://github.com/danpros/htmly/issues/462
|
|
CVE-2021-33361 - https://github.com/gpac/gpac/issues/1782
|
|
CVE-2021-33362 - https://github.com/gpac/gpac/issues/1780
|
|
CVE-2021-33363 - https://github.com/gpac/gpac/issues/1786
|
|
CVE-2021-33364 - https://github.com/gpac/gpac/issues/1783
|
|
CVE-2021-33365 - https://github.com/gpac/gpac/issues/1784
|
|
CVE-2021-33366 - https://github.com/gpac/gpac/issues/1785
|
|
CVE-2021-3337 - http://packetstormsecurity.com/files/161185/MyBB-Hide-Thread-Content-1.0-Information-Disclosure.html
|
|
CVE-2021-33371 - https://www.exploit-db.com/exploits/49865
|
|
CVE-2021-3339 - https://appsource.microsoft.com/en-us/product/web-apps/acctech-systems-pty-ltd.modernflow-saas?tab=overview
|
|
CVE-2021-33393 - http://packetstormsecurity.com/files/163158/IPFire-2.25-Remote-Code-Execution.html
|
|
CVE-2021-33394 - https://github.com/xoffense/POC/blob/main/Session%20Fixation%20in%20Cubecart%206.4.2.md
|
|
CVE-2021-33396 - https://github.com/baijiacms/baijiacmsV4/issues/7
|
|
CVE-2021-33403 - https://cn.etherscan.com/address/0x63e634330a20150dbb61b15648bc73855d6ccf07#code
|
|
CVE-2021-33408 - https://www.abinitio.com/en/security-advisories/ab-2021-001/
|
|
CVE-2021-33436 - https://github.com/active-labs/Advisories/blob/master/2021/ACTIVE-2021-001.md
|
|
CVE-2021-33437 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33437 - https://github.com/cesanta/mjs/issues/160
|
|
CVE-2021-33438 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33438 - https://github.com/cesanta/mjs/issues/158
|
|
CVE-2021-33439 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33439 - https://github.com/cesanta/mjs/issues/159
|
|
CVE-2021-33440 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33440 - https://github.com/cesanta/mjs/issues/163
|
|
CVE-2021-33441 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33441 - https://github.com/cesanta/mjs/issues/165
|
|
CVE-2021-33442 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33442 - https://github.com/cesanta/mjs/issues/161
|
|
CVE-2021-33443 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33443 - https://github.com/cesanta/mjs/issues/167
|
|
CVE-2021-33444 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33444 - https://github.com/cesanta/mjs/issues/166
|
|
CVE-2021-33445 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33445 - https://github.com/cesanta/mjs/issues/169
|
|
CVE-2021-33446 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33446 - https://github.com/cesanta/mjs/issues/168
|
|
CVE-2021-33447 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33447 - https://github.com/cesanta/mjs/issues/164
|
|
CVE-2021-33448 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33448 - https://github.com/cesanta/mjs/issues/170
|
|
CVE-2021-33449 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33449 - https://github.com/cesanta/mjs/issues/162
|
|
CVE-2021-3345 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-33450 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33451 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33451 - https://github.com/ckolivas/lrzip/issues/198
|
|
CVE-2021-33452 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33453 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33453 - https://github.com/ckolivas/lrzip/issues/199
|
|
CVE-2021-33454 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33454 - https://github.com/yasm/yasm/issues/166
|
|
CVE-2021-33455 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33455 - https://github.com/yasm/yasm/issues/169
|
|
CVE-2021-33456 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33456 - https://github.com/yasm/yasm/issues/175
|
|
CVE-2021-33457 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33457 - https://github.com/yasm/yasm/issues/171
|
|
CVE-2021-33458 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33458 - https://github.com/yasm/yasm/issues/170
|
|
CVE-2021-33459 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33459 - https://github.com/yasm/yasm/issues/167
|
|
CVE-2021-3346 - https://gitlab.nic.cz/turris/foris/foris/-/issues/201
|
|
CVE-2021-33460 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33460 - https://github.com/yasm/yasm/issues/168
|
|
CVE-2021-33461 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33461 - https://github.com/yasm/yasm/issues/161
|
|
CVE-2021-33462 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33462 - https://github.com/yasm/yasm/issues/165
|
|
CVE-2021-33463 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33463 - https://github.com/yasm/yasm/issues/174
|
|
CVE-2021-33464 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33464 - https://github.com/yasm/yasm/issues/164
|
|
CVE-2021-33465 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33465 - https://github.com/yasm/yasm/issues/173
|
|
CVE-2021-33466 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33466 - https://github.com/yasm/yasm/issues/172
|
|
CVE-2021-33467 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33467 - https://github.com/yasm/yasm/issues/163
|
|
CVE-2021-33468 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d
|
|
CVE-2021-33468 - https://github.com/yasm/yasm/issues/162
|
|
CVE-2021-33469 - https://phpgurukul.com/
|
|
CVE-2021-33469 - https://www.exploit-db.com/exploits/49887
|
|
CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307
|
|
CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9
|
|
CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697
|
|
CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a
|
|
CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d
|
|
CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7
|
|
CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c64396cc36c6e60704ab06c1fb1c4a46179c9120
|
|
CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2
|
|
CVE-2021-33470 - http://packetstormsecurity.com/files/163014/COVID-19-Testing-Management-System-1.0-SQL-Injection.html
|
|
CVE-2021-33470 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-04
|
|
CVE-2021-33470 - https://phpgurukul.com/
|
|
CVE-2021-33470 - https://www.exploit-db.com/exploits/49886
|
|
CVE-2021-33477 - https://packetstormsecurity.com/files/162621/rxvt-2.7.0-rxvt-unicode-9.22-Code-Execution.html
|
|
CVE-2021-33477 - https://www.openwall.com/lists/oss-security/2021/05/17/1
|
|
CVE-2021-3348 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258
|
|
CVE-2021-33483 - https://burninatorsec.blogspot.com/2021/07/onyaktech-comments-pro-broken.html
|
|
CVE-2021-33484 - https://burninatorsec.blogspot.com/2021/07/onyaktech-comments-pro-broken.html
|
|
CVE-2021-33488 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html
|
|
CVE-2021-33488 - http://seclists.org/fulldisclosure/2021/Nov/42
|
|
CVE-2021-33489 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html
|
|
CVE-2021-33489 - http://seclists.org/fulldisclosure/2021/Nov/42
|
|
CVE-2021-33490 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html
|
|
CVE-2021-33490 - https://seclists.org/fulldisclosure/2021/Nov/42
|
|
CVE-2021-33491 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html
|
|
CVE-2021-33491 - https://seclists.org/fulldisclosure/2021/Nov/42
|
|
CVE-2021-33492 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html
|
|
CVE-2021-33492 - https://seclists.org/fulldisclosure/2021/Nov/42
|
|
CVE-2021-33493 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html
|
|
CVE-2021-33493 - https://seclists.org/fulldisclosure/2021/Nov/42
|
|
CVE-2021-33494 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html
|
|
CVE-2021-33494 - https://seclists.org/fulldisclosure/2021/Nov/42
|
|
CVE-2021-33495 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html
|
|
CVE-2021-33495 - https://seclists.org/fulldisclosure/2021/Nov/42
|
|
CVE-2021-33501 - https://github.com/swordbytes/Advisories/blob/master/2021/Advisory_CVE-2021-33501.pdf
|
|
CVE-2021-33501 - https://swordbytes.com/blog/security-advisory-overwolf-1-click-remote-code-execution-cve-2021-33501/
|
|
CVE-2021-33503 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-33514 - https://gynvael.coldwind.pl/?lang=en&id=733
|
|
CVE-2021-33514 - https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071
|
|
CVE-2021-33515 - https://www.openwall.com/lists/oss-security/2021/06/28/2
|
|
CVE-2021-33516 - https://discourse.gnome.org/t/security-relevant-releases-for-gupnp-issue-cve-2021-33516/6536
|
|
CVE-2021-33523 - https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33523
|
|
CVE-2021-33528 - https://cert.vde.com/en-us/advisories/vde-2021-026
|
|
CVE-2021-33529 - https://cert.vde.com/en-us/advisories/vde-2021-026
|
|
CVE-2021-33530 - https://cert.vde.com/en-us/advisories/vde-2021-026
|
|
CVE-2021-33531 - https://cert.vde.com/en-us/advisories/vde-2021-026
|
|
CVE-2021-33532 - https://cert.vde.com/en-us/advisories/vde-2021-026
|
|
CVE-2021-33533 - https://cert.vde.com/en-us/advisories/vde-2021-026
|
|
CVE-2021-33534 - https://cert.vde.com/en-us/advisories/vde-2021-026
|
|
CVE-2021-33535 - https://cert.vde.com/en-us/advisories/vde-2021-026
|
|
CVE-2021-33536 - https://cert.vde.com/en-us/advisories/vde-2021-026
|
|
CVE-2021-33537 - https://cert.vde.com/en-us/advisories/vde-2021-026
|
|
CVE-2021-33538 - https://cert.vde.com/en-us/advisories/vde-2021-026
|
|
CVE-2021-33539 - https://cert.vde.com/en-us/advisories/vde-2021-026
|
|
CVE-2021-33540 - https://cert.vde.com/en-us/advisories/vde-2021-021
|
|
CVE-2021-33541 - https://cert.vde.com/en-us/advisories/vde-2021-019
|
|
CVE-2021-33542 - https://cert.vde.com/en-us/advisories/vde-2021-020
|
|
CVE-2021-33543 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
|
|
CVE-2021-33544 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
|
|
CVE-2021-33545 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
|
|
CVE-2021-33546 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
|
|
CVE-2021-33547 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
|
|
CVE-2021-33548 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
|
|
CVE-2021-33549 - http://packetstormsecurity.com/files/164191/Geutebruck-instantrec-Remote-Command-Execution.html
|
|
CVE-2021-33549 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
|
|
CVE-2021-3355 - http://packetstormsecurity.com/files/161562/LightCMS-1.3.4-Cross-Site-Scripting.html
|
|
CVE-2021-3355 - https://www.exploit-db.com/exploits/49598
|
|
CVE-2021-33550 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
|
|
CVE-2021-33551 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
|
|
CVE-2021-33552 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
|
|
CVE-2021-33553 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
|
|
CVE-2021-33554 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
|
|
CVE-2021-33555 - https://cert.vde.com/en-us/advisories/vde-2021-027
|
|
CVE-2021-33558 - https://github.com/mdanzaruddin/CVE-2021-33558.
|
|
CVE-2021-33558 - https://github.com/mdanzaruddin/CVE-2021-33558./issues/1
|
|
CVE-2021-33560 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-33560 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-33560 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-33560 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-33561 - https://www.exploit-db.com/exploits/49901
|
|
CVE-2021-33562 - https://www.exploit-db.com/exploits/49901
|
|
CVE-2021-33563 - https://huntr.dev/bounties/1-other-koel/koel/
|
|
CVE-2021-33564 - https://github.com/mlr0p/CVE-2021-33564
|
|
CVE-2021-33564 - https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/
|
|
CVE-2021-33570 - http://packetstormsecurity.com/files/162831/Postbird-0.8.4-Cross-Site-Scripting-Local-File-Inclusion.html
|
|
CVE-2021-33570 - http://packetstormsecurity.com/files/162872/Postbird-0.8.4-XSS-LFI-Insecure-Data-Storage.html
|
|
CVE-2021-33570 - https://github.com/Paxa/postbird/issues/132
|
|
CVE-2021-33570 - https://github.com/Paxa/postbird/issues/133
|
|
CVE-2021-33570 - https://github.com/Paxa/postbird/issues/134
|
|
CVE-2021-33570 - https://tridentsec.io/blogs/postbird-cve-2021-33570/
|
|
CVE-2021-33570 - https://www.exploit-db.com/exploits/49910
|
|
CVE-2021-33571 - https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo
|
|
CVE-2021-33572 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories
|
|
CVE-2021-33575 - https://github.com/PixarAnimationStudios/ruby-jss/blob/e6d48dd8c77f9275c76787d60d3472615fcd9b77/CHANGES.md#160---2021-05-24
|
|
CVE-2021-33581 - https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33581
|
|
CVE-2021-33582 - https://github.com/cyrusimap/cyrus-imapd/commits/master
|
|
CVE-2021-33594 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories
|
|
CVE-2021-33595 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories
|
|
CVE-2021-33596 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories
|
|
CVE-2021-33597 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories
|
|
CVE-2021-33598 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories
|
|
CVE-2021-33600 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33600
|
|
CVE-2021-33601 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33601
|
|
CVE-2021-33602 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories
|
|
CVE-2021-33616 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
|
|
CVE-2021-33617 - https://herolab.usd.de/security-advisories/usd-2021-0015/
|
|
CVE-2021-33617 - https://www.manageengine.com
|
|
CVE-2021-33618 - http://seclists.org/fulldisclosure/2021/Nov/38
|
|
CVE-2021-33618 - https://trovent.github.io/security-advisories/TRSA-2105-02/TRSA-2105-02.txt
|
|
CVE-2021-33618 - https://trovent.io/security-advisory-2105-02
|
|
CVE-2021-33655 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4
|
|
CVE-2021-33670 - http://packetstormsecurity.com/files/166965/SAP-NetWeaver-Java-Denial-Of-Service.html
|
|
CVE-2021-33678 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html
|
|
CVE-2021-33678 - http://seclists.org/fulldisclosure/2022/May/42
|
|
CVE-2021-33687 - http://packetstormsecurity.com/files/164600/SAP-Enterprise-Portal-Sensitive-Data-Disclosure.html
|
|
CVE-2021-3370 - https://github.com/congcong9184-123/congcong9184-123.github.io/blob/master/douphp_xss.docx
|
|
CVE-2021-33701 - http://packetstormsecurity.com/files/165303/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-SQL-Injection.html
|
|
CVE-2021-33701 - http://packetstormsecurity.com/files/165304/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-ABAP-Code-Injection.html
|
|
CVE-2021-33701 - http://seclists.org/fulldisclosure/2021/Dec/35
|
|
CVE-2021-33701 - http://seclists.org/fulldisclosure/2021/Dec/36
|
|
CVE-2021-33702 - http://packetstormsecurity.com/files/165737/SAP-Enterprise-Portal-NavigationReporter-Cross-Site-Scripting.html
|
|
CVE-2021-33703 - http://packetstormsecurity.com/files/165740/SAP-Enterprise-Portal-RunContentCreation-Cross-Site-Scripting.html
|
|
CVE-2021-33705 - http://packetstormsecurity.com/files/165743/SAP-Enterprise-Portal-iviewCatcherEditor-Server-Side-Request-Forgery.html
|
|
CVE-2021-33707 - http://packetstormsecurity.com/files/165748/SAP-Enterprise-Portal-Open-Redirect.html
|
|
CVE-2021-3375 - https://code610.blogspot.com/2021/01/crashing-activepresenter.html
|
|
CVE-2021-3376 - https://github.com/CuppaCMS/CuppaCMS/issues/12
|
|
CVE-2021-3378 - http://packetstormsecurity.com/files/161601/FortiLogger-4.4.2.2-Arbitrary-File-Upload.html
|
|
CVE-2021-3378 - http://packetstormsecurity.com/files/161974/FortiLogger-Arbitrary-File-Upload.html
|
|
CVE-2021-3378 - https://github.com/erberkan/fortilogger_arbitrary_fileupload
|
|
CVE-2021-33797 - https://github.com/ccxvii/mujs/issues/148
|
|
CVE-2021-33798 - https://groups.google.com/u/1/g/hugin-ptx/c/gLtz2vweD74
|
|
CVE-2021-3380 - https://www.exploit-db.com/exploits/49508
|
|
CVE-2021-33813 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-33813 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-33816 - http://seclists.org/fulldisclosure/2021/Nov/39
|
|
CVE-2021-33816 - https://trovent.github.io/security-advisories/TRSA-2106-01/TRSA-2106-01.txt
|
|
CVE-2021-33816 - https://trovent.io/security-advisory-2106-01
|
|
CVE-2021-33818 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33818.md
|
|
CVE-2021-33820 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33820.md
|
|
CVE-2021-33822 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33822.md
|
|
CVE-2021-33823 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33823.md
|
|
CVE-2021-33824 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33824.md
|
|
CVE-2021-33829 - https://www.drupal.org/sa-core-2021-003
|
|
CVE-2021-33833 - http://www.openwall.com/lists/oss-security/2021/06/09/1
|
|
CVE-2021-33839 - https://youtu.be/jWyDfEB0m08
|
|
CVE-2021-33840 - https://gitlab.com/lucaapp/web/-/issues/1#note_560963608
|
|
CVE-2021-33849 - https://cybersecurityworks.com/zerodays/cve-2020-29322-telnet-hardcoded-credentials.html
|
|
CVE-2021-33849 - https://cybersecurityworks.com/zerodays/cve-2021-33849-stored-cross-site-scripting-xss-in-wordpress-plugin-zoho-crm-lead-magnet-version-1-7-2-4.html
|
|
CVE-2021-33850 - https://cybersecurityworks.com/zerodays/cve-2021-33850-stored-cross-site-scripting-xss-in-wordpress-microsoft-clarity-plugin.html
|
|
CVE-2021-33851 - https://cybersecurityworks.com/zerodays/cve-2021-33851-stored-cross-site-scripting-in-wordpress-customize-login-image.html
|
|
CVE-2021-33852 - https://cybersecurityworks.com/zerodays/cve-2021-33852-stored-cross-site-scripting-in-wordpress-post-duplicator-plugin-2-23.html
|
|
CVE-2021-33853 - https://cybersecurityworks.com/zerodays/cve-2021-33853-stored-cross-site-scripting-in-x2crm.html
|
|
CVE-2021-33880 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-33880 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-33887 - https://youtu.be/RLjXfvb0ADw
|
|
CVE-2021-33904 - http://packetstormsecurity.com/files/163093/Accela-Civic-Platorm-21.1-Cross-Site-Scripting.html
|
|
CVE-2021-33909 - http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
|
|
CVE-2021-33909 - http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html
|
|
CVE-2021-33909 - http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html
|
|
CVE-2021-33909 - http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
|
|
CVE-2021-33909 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
|
|
CVE-2021-33909 - https://www.openwall.com/lists/oss-security/2021/07/20/1
|
|
CVE-2021-33909 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-33910 - http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
|
|
CVE-2021-33910 - https://www.openwall.com/lists/oss-security/2021/07/20/2
|
|
CVE-2021-33923 - https://confluent.io
|
|
CVE-2021-33923 - https://www.detack.de/en/cve-2021-33923
|
|
CVE-2021-33924 - https://confluent.io
|
|
CVE-2021-33924 - https://www.detack.de/en/cve-2021-33924
|
|
CVE-2021-33925 - https://github.com/nitinp1232/cms-corephp/issues/1
|
|
CVE-2021-33928 - https://github.com/openSUSE/libsolv/issues/417
|
|
CVE-2021-33929 - https://github.com/openSUSE/libsolv/issues/417
|
|
CVE-2021-33930 - https://github.com/openSUSE/libsolv/issues/417
|
|
CVE-2021-33938 - https://github.com/openSUSE/libsolv/issues/420
|
|
CVE-2021-3394 - http://packetstormsecurity.com/files/161334/Millewin-13.39.028-Unquoted-Service-Path-Insecure-Permissions.html
|
|
CVE-2021-3394 - https://www.exploit-db.com/exploits/49530
|
|
CVE-2021-33945 - https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1
|
|
CVE-2021-33966 - https://packetstormsecurity.com/files/162731/Spotweb-Develop-1.4.9-Cross-Site-Scripting.html
|
|
CVE-2021-33970 - https://pastebin.com/Qug7tquW
|
|
CVE-2021-33971 - https://pastebin.com/31v5JMcG
|
|
CVE-2021-33972 - https://pastebin.com/qDedtZf3
|
|
CVE-2021-33973 - https://pastebin.com/fsLDebg5
|
|
CVE-2021-33974 - https://pastebin.com/ms1ivjYe
|
|
CVE-2021-33975 - https://pastebin.com/ivNL7s0n
|
|
CVE-2021-33983 - https://github.com/dvidelabs/flatcc/issues/188
|
|
CVE-2021-33988 - https://github.com/nck0099/osTicket/issues/2
|
|
CVE-2021-33990 - http://packetstormsecurity.com/files/171701/Liferay-Portal-6.2.5-Insecure-Permissions.html
|
|
CVE-2021-33990 - https://github.com/fu2x2000/Liferay_exploit_Poc
|
|
CVE-2021-3401 - https://github.com/bitcoin/bitcoin/pull/16578
|
|
CVE-2021-3402 - https://www.openwall.com/lists/oss-security/2021/01/29/2
|
|
CVE-2021-3402 - https://www.x41-dsec.de/lab/advisories/x41-2021-001-yara/
|
|
CVE-2021-3405 - https://github.com/Matroska-Org/libebml/issues/74
|
|
CVE-2021-34055 - https://github.com/Matthias-Wandel/jhead/issues/36
|
|
CVE-2021-34066 - https://github.com/EdgeGallery/developer-be/issues/1
|
|
CVE-2021-34067 - https://github.com/justdan96/tsMuxer/issues/424
|
|
CVE-2021-34068 - https://github.com/justdan96/tsMuxer/issues/427
|
|
CVE-2021-34069 - https://github.com/justdan96/tsMuxer/issues/428
|
|
CVE-2021-34070 - https://github.com/justdan96/tsMuxer/issues/426
|
|
CVE-2021-34071 - https://github.com/justdan96/tsMuxer/issues/423
|
|
CVE-2021-34073 - https://www.exploit-db.com/exploits/49904
|
|
CVE-2021-34076 - https://github.com/HolaAsuka/CVE/issues/1
|
|
CVE-2021-34085 - https://drive.google.com/drive/folders/1epm65c4_iC0zE5V_leoet4Jyk1Prz2p5?usp=sharing
|
|
CVE-2021-3410 - https://bugzilla.redhat.com/show_bug.cgi?id=1928437
|
|
CVE-2021-34110 - https://packetstormsecurity.com/files/163335/WinWaste.NET-1.0.6183.16475-Local-Privilege-Escalation.html
|
|
CVE-2021-34110 - https://www.exploit-db.com/exploits/50083
|
|
CVE-2021-34119 - https://github.com/michaelrsweet/htmldoc/issues/431
|
|
CVE-2021-34121 - https://github.com/michaelrsweet/htmldoc/issues/433
|
|
CVE-2021-34122 - https://github.com/rockcarry/ffjpeg/issues/36
|
|
CVE-2021-34125 - https://gist.github.com/swkim101/f473b9a60e6d4635268402a2cd2025ac
|
|
CVE-2021-34125 - https://github.com/PX4/PX4-Autopilot/issues/17062
|
|
CVE-2021-34125 - https://www.st.com/resource/en/application_note/dm00493651-introduction-to-stm32-microcontrollers-security-stmicroelectronics.pdf
|
|
CVE-2021-34128 - https://github.com/bettershop/LaikeTui/issues/8
|
|
CVE-2021-34141 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-34143 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-34144 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-34145 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-34146 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-34147 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-34148 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-34149 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-34150 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
CVE-2021-34164 - https://github.com/lizhipay/faka/issues/22
|
|
CVE-2021-34165 - https://www.exploit-db.com/exploits/49741
|
|
CVE-2021-34166 - https://www.exploit-db.com/exploits/49740
|
|
CVE-2021-34167 - https://github.com/taogogo/taocms/issues/6
|
|
CVE-2021-34170 - https://www.reddit.com/r/darksouls3/comments/n1235k/potential_pc_security_exploit_spreading/
|
|
CVE-2021-34173 - https://github.com/E7mer/OWFuzz
|
|
CVE-2021-34174 - https://github.com/E7mer/OWFuzz
|
|
CVE-2021-34187 - https://murat.one/?p=118
|
|
CVE-2021-34190 - https://www.youtube.com/watch?v=apJH_D68lZI
|
|
CVE-2021-34201 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34201
|
|
CVE-2021-34201 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-34202 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34202
|
|
CVE-2021-34202 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-34203 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34203
|
|
CVE-2021-34203 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-34204 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-34235 - http://packetstormsecurity.com/files/165944/Tokheim-Profleet-DiaLOG-Fuel-Management-System-11.005.02-SQL-Injection-Code-Execution.html
|
|
CVE-2021-34243 - https://github.com/xoffense/POC/blob/main/Stored%20XSS%20via%20malicious%20file%20upload%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md
|
|
CVE-2021-34244 - https://github.com/xoffense/POC/blob/main/Account%20takeover%20using%20CSRF%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md
|
|
CVE-2021-34248 - https://packetstormsecurity.com/files/159132/Mobile-Shop-System-1.0-SQL-Injection.html
|
|
CVE-2021-34248 - https://www.exploit-db.com/exploits/48916
|
|
CVE-2021-34249 - https://packetstormsecurity.com/files/159000/Online-Book-Store-1.0-SQL-Injection.html
|
|
CVE-2021-34249 - https://www.exploit-db.com/exploits/48775
|
|
CVE-2021-34250 - https://github.com/baijiacms/baijiacmsV4/issues/7
|
|
CVE-2021-34257 - https://github.com/Sentinal920/WPanel4-Authenticated-RCE
|
|
CVE-2021-34257 - https://latestpcsolution.wordpress.com/2021/06/05/wpanel4-cms-authenticated-rce/
|
|
CVE-2021-3426 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-3426 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-3427 - https://groups.google.com/g/deluge-dev/c/e5zh7wT0rEg
|
|
CVE-2021-3428 - https://ubuntu.com/security/CVE-2021-3428
|
|
CVE-2021-34338 - https://github.com/libming/libming/issues/201
|
|
CVE-2021-34339 - https://github.com/libming/libming/issues/202
|
|
CVE-2021-34340 - https://github.com/libming/libming/issues/203
|
|
CVE-2021-34341 - https://github.com/libming/libming/issues/204
|
|
CVE-2021-34342 - https://github.com/libming/libming/issues/205
|
|
CVE-2021-34369 - http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html
|
|
CVE-2021-34370 - http://packetstormsecurity.com/files/163115/Accela-Civic-Platform-21.1-Cross-Site-Scripting-Open-Redirection.html
|
|
CVE-2021-34371 - https://www.exploit-db.com/exploits/50170
|
|
CVE-2021-34372 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34373 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34374 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34375 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34376 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34377 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34378 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34379 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34380 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34381 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34382 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34383 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34384 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34385 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34386 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34387 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34388 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34389 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34390 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34391 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34392 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34393 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34394 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34395 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34396 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34397 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205
|
|
CVE-2021-34420 - https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e
|
|
CVE-2021-34423 - http://packetstormsecurity.com/files/165417/Zoom-Chat-Message-Processing-Buffer-Overflow.html
|
|
CVE-2021-34424 - http://packetstormsecurity.com/files/165419/Zoom-MMR-Server-Information-Leak.html
|
|
CVE-2021-34427 - http://packetstormsecurity.com/files/170326/Eclipse-Business-Intelligence-Reporting-Tool-4.11.0-Remote-Code-Execution.html
|
|
CVE-2021-34427 - http://seclists.org/fulldisclosure/2022/Dec/30
|
|
CVE-2021-34427 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142
|
|
CVE-2021-34428 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-34428 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-34428 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-34429 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-34429 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-34429 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-34430 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=568803
|
|
CVE-2021-34435 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=568018
|
|
CVE-2021-3444 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
|
|
CVE-2021-3444 - http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
|
|
CVE-2021-3444 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9b00f1b78809
|
|
CVE-2021-34470 - http://packetstormsecurity.com/files/163706/Microsoft-Exchange-AD-Schema-Misconfiguration-Privilege-Escalation.html
|
|
CVE-2021-34473 - http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Remote-Code-Execution.html
|
|
CVE-2021-3448 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-34480 - http://packetstormsecurity.com/files/164121/Internet-Explorer-JIT-Optimization-Memory-Corruption.html
|
|
CVE-2021-3449 - https://kc.mcafee.com/corporate/index?page=content&id=SB10356
|
|
CVE-2021-3449 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd
|
|
CVE-2021-3449 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-3449 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-3449 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-3449 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-3449 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-3449 - https://www.tenable.com/security/tns-2021-05
|
|
CVE-2021-3449 - https://www.tenable.com/security/tns-2021-06
|
|
CVE-2021-3449 - https://www.tenable.com/security/tns-2021-09
|
|
CVE-2021-3449 - https://www.tenable.com/security/tns-2021-10
|
|
CVE-2021-3450 - https://kc.mcafee.com/corporate/index?page=content&id=SB10356
|
|
CVE-2021-3450 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd
|
|
CVE-2021-3450 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-3450 - https://www.oracle.com/security-alerts/cpuApr2021.html
|
|
CVE-2021-3450 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-3450 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-3450 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-3450 - https://www.tenable.com/security/tns-2021-05
|
|
CVE-2021-3450 - https://www.tenable.com/security/tns-2021-09
|
|
CVE-2021-34523 - http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Remote-Code-Execution.html
|
|
CVE-2021-34527 - http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html
|
|
CVE-2021-34543 - https://drive.google.com/file/d/1z1TaANlDyX4SOP2vjNzkPQI3nETL9kZM/view?usp=sharing
|
|
CVE-2021-34543 - https://www.exploit-db.com/exploits/49986
|
|
CVE-2021-34544 - https://drive.google.com/file/d/1N8Ch1UGNcoocUaPhOe_1mAECOe5kr4pt/view?usp=sharing
|
|
CVE-2021-34544 - https://www.exploit-db.com/exploits/49987
|
|
CVE-2021-34546 - http://packetstormsecurity.com/files/163097/NetSetManPro-4.7.2-Privilege-Escalation.html
|
|
CVE-2021-34548 - http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html
|
|
CVE-2021-34553 - https://support.sonatype.com/hc/en-us/articles/4402433828371
|
|
CVE-2021-34558 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-34558 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-34559 - https://cert.vde.com/en-us/advisories/vde-2021-027
|
|
CVE-2021-34560 - https://cert.vde.com/en-us/advisories/vde-2021-027
|
|
CVE-2021-34561 - https://cert.vde.com/en-us/advisories/vde-2021-027
|
|
CVE-2021-34562 - https://cert.vde.com/en-us/advisories/vde-2021-027
|
|
CVE-2021-34563 - https://cert.vde.com/en-us/advisories/vde-2021-027
|
|
CVE-2021-34564 - https://cert.vde.com/en-us/advisories/vde-2021-027
|
|
CVE-2021-34565 - https://cert.vde.com/en-us/advisories/vde-2021-027
|
|
CVE-2021-34578 - https://cert.vde.com/en-us/advisories/vde-2020-044
|
|
CVE-2021-34581 - https://cert.vde.com/en-us/advisories/vde-2021-038
|
|
CVE-2021-34587 - https://cert.vde.com/en/advisories/VDE-2021-047
|
|
CVE-2021-34588 - https://cert.vde.com/en/advisories/VDE-2021-047
|
|
CVE-2021-34589 - https://cert.vde.com/en/advisories/VDE-2021-047
|
|
CVE-2021-34590 - https://cert.vde.com/en/advisories/VDE-2021-047
|
|
CVE-2021-34591 - https://cert.vde.com/en/advisories/VDE-2021-047
|
|
CVE-2021-34592 - https://cert.vde.com/en/advisories/VDE-2021-047
|
|
CVE-2021-34593 - http://packetstormsecurity.com/files/164716/CODESYS-2.4.7.0-Denial-Of-Service.html
|
|
CVE-2021-34593 - http://packetstormsecurity.com/files/165874/WAGO-750-8xxx-PLC-Denial-Of-Service-User-Enumeration.html
|
|
CVE-2021-34593 - http://seclists.org/fulldisclosure/2021/Oct/64
|
|
CVE-2021-34600 - https://www.x41-dsec.de/lab/advisories/x41-2021-003-telenot-complex-insecure-keygen/
|
|
CVE-2021-34601 - https://cert.vde.com/en/advisories/VDE-2021-047
|
|
CVE-2021-34602 - https://cert.vde.com/en/advisories/VDE-2021-047
|
|
CVE-2021-34605 - https://claroty.com/2022/05/11/blog-research-from-project-file-to-code-execution-exploiting-vulnerabilities-in-xinje-plc-program-tool/
|
|
CVE-2021-34606 - https://claroty.com/2022/05/11/blog-research-from-project-file-to-code-execution-exploiting-vulnerabilities-in-xinje-plc-program-tool/
|
|
CVE-2021-34621 - http://packetstormsecurity.com/files/163973/WordPress-ProfilePress-3.1.3-Privilege-Escalation.html
|
|
CVE-2021-34657 - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34657
|
|
CVE-2021-3466 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4334XJNDJPYQNFE6S3S2KUJJ7TMHYCWL/
|
|
CVE-2021-34675 - https://github.com/rauschecker/CVEs/tree/main/CVE-2021-34675
|
|
CVE-2021-34676 - https://github.com/rauschecker/CVEs/tree/main/CVE-2021-34676
|
|
CVE-2021-34682 - https://www.youtube.com/watch?v=vClCaAAfzGg
|
|
CVE-2021-34684 - http://packetstormsecurity.com/files/164791/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-SQL-Injection.html
|
|
CVE-2021-34685 - http://packetstormsecurity.com/files/164775/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Filename-Bypass.html
|
|
CVE-2021-34693 - http://www.openwall.com/lists/oss-security/2021/06/15/1
|
|
CVE-2021-34746 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-g2DMVVh
|
|
CVE-2021-34749 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sni-data-exfil-mFgzXqLN
|
|
CVE-2021-34759 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-4HnZFewr
|
|
CVE-2021-34784 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-xss-U2JK537j
|
|
CVE-2021-34790 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-natalg-bypass-cpKGqkng
|
|
CVE-2021-34791 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-natalg-bypass-cpKGqkng
|
|
CVE-2021-34798 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-34798 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-34805 - http://packetstormsecurity.com/files/165701/FAUST-iServer-9.0.018.018.4-Local-File-Inclusion.html
|
|
CVE-2021-34805 - https://sec-consult.com/vulnerability-lab/
|
|
CVE-2021-34816 - https://github.com/ether/etherpad-lite/releases
|
|
CVE-2021-34817 - https://github.com/ether/etherpad-lite/releases/tag/1.8.14
|
|
CVE-2021-34820 - http://packetstormsecurity.com/files/163453/Novus-Management-System-Directory-Traversal-Cross-Site-Scripting.html
|
|
CVE-2021-34823 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/
|
|
CVE-2021-34823 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29105
|
|
CVE-2021-34831 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34832 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34833 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34834 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34835 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34836 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34837 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34838 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34839 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34840 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34841 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34842 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34843 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34844 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34845 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34846 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34847 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34848 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34849 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-3485 - https://herolab.usd.de/security-advisories/usd-2021-0014/
|
|
CVE-2021-34850 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34851 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34852 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34853 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-34870 - https://kb.netgear.com/000063967/Security-Advisory-for-a-Security-Misconfiguration-Vulnerability-on-the-XR1000-PSV-2021-0101
|
|
CVE-2021-34874 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-34875 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-34876 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34877 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34878 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34880 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-34885 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34888 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34889 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-34890 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34891 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34892 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34894 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-34895 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-34898 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34899 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-3490 - http://packetstormsecurity.com/files/164015/Linux-eBPF-ALU32-32-bit-Invalid-Bounds-Tracking-Local-Privilege-Escalation.html
|
|
CVE-2021-34901 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-34909 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-3491 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1f82808877bb10d3deee7cf3374a4eb3fb582db
|
|
CVE-2021-34911 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-34912 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34913 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-3492 - http://packetstormsecurity.com/files/162614/Kernel-Live-Patch-Security-Notice-LSN-0077-1.html
|
|
CVE-2021-34920 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34921 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34922 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34923 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34924 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34925 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34926 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34927 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34928 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34929 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-3493 - http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html
|
|
CVE-2021-3493 - http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html
|
|
CVE-2021-3493 - http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html
|
|
CVE-2021-3493 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52
|
|
CVE-2021-34930 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34931 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34932 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34933 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34934 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34935 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34936 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34937 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34938 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34939 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34940 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34941 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34942 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34943 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34944 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34945 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-34946 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-3496 - https://github.com/Matthias-Wandel/jhead/issues/33
|
|
CVE-2021-34978 - https://kb.netgear.com/000064258/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Routers-DSL-Modem-Routers-and-Access-Points-PSV-2021-0151-and-PSV-2021-0170?article=000064258
|
|
CVE-2021-3498 - http://packetstormsecurity.com/files/162952/Gstreamer-Matroska-Demuxing-Use-After-Free.html
|
|
CVE-2021-34980 - https://kb.netgear.com/000064262/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Routers-PSV-2021-0150?article=000064262
|
|
CVE-2021-34991 - https://kb.netgear.com/000064361/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Multiple-Products-PSV-2021-0168
|
|
CVE-2021-3501 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a
|
|
CVE-2021-35039 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.14
|
|
CVE-2021-35039 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c18f29aae7ce3dadd26d8ee3505d07cc982df75
|
|
CVE-2021-35043 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-35043 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-35043 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-35043 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35045 - https://github.com/xoffense/POC/blob/main/Account%20takeover%20(Chaining%20session%20fixation%20%2B%20reflected%20Cross%20Site%20Scripting)%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md
|
|
CVE-2021-35046 - https://github.com/xoffense/POC/blob/main/Account%20takeover%20(Chaining%20session%20fixation%20%2B%20reflected%20Cross%20Site%20Scripting)%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md
|
|
CVE-2021-35052 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#221121
|
|
CVE-2021-35053 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#01112021
|
|
CVE-2021-35055 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-35061 - https://github.com/sthierolf/security/blob/main/CVE-2021-35061.md
|
|
CVE-2021-35062 - https://github.com/sthierolf/security/blob/main/CVE-2021-35062.md
|
|
CVE-2021-35064 - http://packetstormsecurity.com/files/166623/Kramer-VIAware-Remote-Code-Execution.html
|
|
CVE-2021-35065 - https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294
|
|
CVE-2021-35068 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin
|
|
CVE-2021-35069 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin
|
|
CVE-2021-35074 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin
|
|
CVE-2021-35075 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin
|
|
CVE-2021-35077 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin
|
|
CVE-2021-3508 - https://github.com/enferex/pdfresurrect/issues/17
|
|
CVE-2021-35088 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-35089 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-3509 - https://bugzilla.redhat.com/show_bug.cgi?id=1950116
|
|
CVE-2021-35093 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
|
|
CVE-2021-35103 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-35105 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-35106 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-35110 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-35115 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-35117 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
|
|
CVE-2021-3516 - https://gitlab.gnome.org/GNOME/libxml2/-/issues/230
|
|
CVE-2021-3516 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-3517 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-3517 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-3517 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-3517 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-3518 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-3518 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-3518 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35193 - https://github.com/jshafer817/Eaglesoft
|
|
CVE-2021-35196 - https://www.pizzapower.me/2021/06/20/arbitrary-code-execution-in-manuskript-0-12/
|
|
CVE-2021-3520 - https://www.oracle.com//security-alerts/cpujul2021.html
|
|
CVE-2021-3520 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-3520 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35211 - https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211
|
|
CVE-2021-3522 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35296 - https://github.com/afaq1337/CVE-2021-35296
|
|
CVE-2021-35306 - https://github.com/axiomatic-systems/Bento4/issues/615
|
|
CVE-2021-35307 - https://github.com/axiomatic-systems/Bento4/issues/616
|
|
CVE-2021-35312 - http://packetstormsecurity.com/files/163744/Amica-Prodigy-1.7-Privilege-Escalation.html
|
|
CVE-2021-35312 - https://packetstormsecurity.com/files/163744/Amica-Prodigy-1.7-Privilege-Escalation.html
|
|
CVE-2021-35323 - http://packetstormsecurity.com/files/164990/Bludit-3.13.1-Cross-Site-Scripting.html
|
|
CVE-2021-35323 - https://github.com/bludit/bludit/issues/1327
|
|
CVE-2021-35324 - https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_login_bypass.md
|
|
CVE-2021-35325 - https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_cookie_overflow.md
|
|
CVE-2021-35326 - https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_leak_config_file.md
|
|
CVE-2021-35327 - https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_default_telnet_info.md
|
|
CVE-2021-35336 - https://pratikkhalane91.medium.com/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-tieline-c1ffe3b3757c
|
|
CVE-2021-35337 - https://www.exploit-db.com/exploits/50050
|
|
CVE-2021-35343 - https://medium.com/@cyberdivision/cve-2021-35343-c5c298cbb2d4
|
|
CVE-2021-35344 - https://github.com/justdan96/tsMuxer/issues/432
|
|
CVE-2021-35346 - https://github.com/justdan96/tsMuxer/issues/436
|
|
CVE-2021-3537 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-3537 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-3537 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35380 - https://www.exploit-db.com/exploits/50638
|
|
CVE-2021-35380 - https://www.swascan.com/solari-di-udine/
|
|
CVE-2021-3539 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/
|
|
CVE-2021-35391 - https://sayaanalam.github.io/CVE-2021-35391.html
|
|
CVE-2021-35392 - https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain
|
|
CVE-2021-35393 - https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain
|
|
CVE-2021-35394 - https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain
|
|
CVE-2021-35395 - https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain
|
|
CVE-2021-3540 - https://www.rapid7.com/blog/post/2021/06/02/untitled-cve-2021-3198-and-cve-2021-3540-mobileiron-shell-escape-privilege-escalation-vulnerabilities/
|
|
CVE-2021-3541 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-35438 - https://github.com/phpipam/phpipam/issues/3351
|
|
CVE-2021-35448 - https://www.exploit-db.com/exploits/50047
|
|
CVE-2021-35449 - http://packetstormsecurity.com/files/163811/Lexmark-Driver-Privilege-Escalation.html
|
|
CVE-2021-35450 - https://www.swascan.com/entando/
|
|
CVE-2021-35452 - https://github.com/strukturag/libde265/issues/298
|
|
CVE-2021-35456 - https://packetstormsecurity.com/files/163282/Online-Pet-Shop-We-App-1.0-SQL-Injection-Shell-Upload.html
|
|
CVE-2021-35458 - http://packetstormsecurity.com/files/163282/Online-Pet-Shop-We-App-1.0-SQL-Injection-Shell-Upload.html
|
|
CVE-2021-35458 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-35458
|
|
CVE-2021-35464 - http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html
|
|
CVE-2021-35464 - http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html
|
|
CVE-2021-35475 - http://packetstormsecurity.com/files/163294/SAS-Environment-Manager-2.5-Cross-Site-Scripting.html
|
|
CVE-2021-35475 - https://github.com/saitamang/CVE-2021-35475/blob/main/README.md
|
|
CVE-2021-35478 - https://research.nccgroup.com/2021/07/22/technical-advisory-stored-and-reflected-xss-vulnerability-in-nagios-log-server-cve-2021-35478cve-2021-35479/
|
|
CVE-2021-35478 - https://research.nccgroup.com/?research=Technical%20advisories
|
|
CVE-2021-35479 - https://research.nccgroup.com/2021/07/22/technical-advisory-stored-and-reflected-xss-vulnerability-in-nagios-log-server-cve-2021-35478cve-2021-35479/
|
|
CVE-2021-35479 - https://research.nccgroup.com/?research=Technical%20advisories
|
|
CVE-2021-35487 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2021-35488 - https://www.gruppotim.it/redteam
|
|
CVE-2021-35489 - https://www.gruppotim.it/redteam
|
|
CVE-2021-35490 - https://www.gruppotim.it/redteam
|
|
CVE-2021-35491 - https://n4nj0.github.io/advisories/wowza-streaming-engine-i/
|
|
CVE-2021-35491 - https://www.gruppotim.it/redteam
|
|
CVE-2021-35492 - https://n4nj0.github.io/advisories/wowza-streaming-engine-i/
|
|
CVE-2021-35492 - https://www.gruppotim.it/redteam
|
|
CVE-2021-35501 - http://packetstormsecurity.com/files/163466/Pandora-FMS-7.54-Cross-Site-Scripting.html
|
|
CVE-2021-35503 - https://syntegris-sec.github.io/filerun-advisory
|
|
CVE-2021-35504 - https://syntegris-sec.github.io/filerun-advisory
|
|
CVE-2021-35505 - https://syntegris-sec.github.io/filerun-advisory
|
|
CVE-2021-35506 - https://syntegris-sec.github.io/filerun-advisory
|
|
CVE-2021-35508 - https://www.linkedin.com/pulse/cve-2021-35508-privilege-escalation-via-weak-windows-marshall-mba
|
|
CVE-2021-35512 - https://www.esecforte.com/server-side-request-forgery-india-ssrf-rvd-manage-engine/
|
|
CVE-2021-35515 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-35515 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-35515 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-35515 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35516 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-35516 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-35516 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-35516 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35517 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-35517 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-35517 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-35517 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35523 - http://packetstormsecurity.com/files/163320/Securepoint-SSL-VPN-Client-2.0.30-Local-Privilege-Escalation.html
|
|
CVE-2021-35528 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000068&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
CVE-2021-35536 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35537 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35538 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35539 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35540 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35541 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35542 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35543 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35545 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35546 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35549 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-3555 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-eufy2k-indoor-camera/
|
|
CVE-2021-35550 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35551 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35552 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35553 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35554 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35556 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35557 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35558 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35559 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35560 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35561 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35562 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35563 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35564 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35565 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35566 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35567 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35568 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35569 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35570 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35571 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35572 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35573 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35574 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-35574 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35575 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35576 - http://packetstormsecurity.com/files/170354/Oracle-Unified-Audit-Policy-Bypass.html
|
|
CVE-2021-35576 - http://packetstormsecurity.com/files/170373/Oracle-Database-Vault-Metadata-Exposure.html
|
|
CVE-2021-35576 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35577 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35578 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35580 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35581 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35582 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35583 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35584 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35585 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35586 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35587 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-35588 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35589 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35590 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35591 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35592 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35593 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35594 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35595 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35596 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35597 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35598 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35599 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-3560 - http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html
|
|
CVE-2021-3560 - https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/
|
|
CVE-2021-35601 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35602 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35603 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35604 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35606 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35607 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35608 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35609 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35610 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35611 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35612 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35613 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35616 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35617 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35618 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35619 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35620 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35621 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35622 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35623 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35624 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35625 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35626 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35627 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35628 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35629 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35630 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35631 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35632 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35633 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35634 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35635 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35636 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35637 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35638 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35639 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-3564 - http://www.openwall.com/lists/oss-security/2021/05/25/1
|
|
CVE-2021-3564 - http://www.openwall.com/lists/oss-security/2021/06/01/2
|
|
CVE-2021-3564 - https://www.openwall.com/lists/oss-security/2021/05/25/1
|
|
CVE-2021-35640 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35641 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35642 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35643 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35644 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35645 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35646 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35647 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35648 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35649 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35650 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35651 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35652 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35653 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35654 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35655 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35656 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35657 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35658 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35659 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35660 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35661 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35662 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35665 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35666 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-35683 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-35686 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-35687 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-3572 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-3572 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-3573 - http://www.openwall.com/lists/oss-security/2023/07/02/1
|
|
CVE-2021-3573 - https://www.openwall.com/lists/oss-security/2021/06/08/2
|
|
CVE-2021-3574 - https://github.com/ImageMagick/ImageMagick/issues/3540
|
|
CVE-2021-3575 - https://github.com/uclouvain/openjpeg/issues/1347
|
|
CVE-2021-3578 - https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/
|
|
CVE-2021-35940 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-35941 - https://www.westerndigital.com/support/productsecurity/wdc-21008-recommended-security-measures-wd-mybooklive-wd-mybookliveduo
|
|
CVE-2021-35956 - http://packetstormsecurity.com/files/163343/AKCP-sensorProbe-SPX476-Cross-Site-Scripting.html
|
|
CVE-2021-35956 - https://tbutler.org/2021/06/28/cve-2021-35956
|
|
CVE-2021-35957 - https://advisories.stormshield.eu
|
|
CVE-2021-3596 - https://github.com/ImageMagick/ImageMagick/issues/2624
|
|
CVE-2021-35973 - https://gynvael.coldwind.pl/?lang=en&id=736
|
|
CVE-2021-35975 - https://github.com/fbkcs/CVE-2021-35975
|
|
CVE-2021-35978 - https://digi.com
|
|
CVE-2021-3603 - https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/
|
|
CVE-2021-36088 - https://github.com/fluent/fluent-bit/pull/3453
|
|
CVE-2021-3609 - https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md
|
|
CVE-2021-36090 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-36090 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-36090 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-36090 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-3612 - https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/
|
|
CVE-2021-3612 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-36146 - https://github.com/projectacrn/acrn-hypervisor/pull/6173/commits/330359921e2e4c2f3f3a10b5bab86942d63c4428
|
|
CVE-2021-36150 - https://github.com/silverstripe/silverstripe-framework/releases
|
|
CVE-2021-36159 - https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749
|
|
CVE-2021-36160 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-36160 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-36221 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-36222 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-36224 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/weekend_destroyer/weekend_destroyer.md
|
|
CVE-2021-36224 - https://www.youtube.com/watch?v=vsg9YgvGBec
|
|
CVE-2021-36225 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/weekend_destroyer/weekend_destroyer.md
|
|
CVE-2021-36225 - https://www.youtube.com/watch?v=vsg9YgvGBec
|
|
CVE-2021-36226 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/weekend_destroyer/weekend_destroyer.md
|
|
CVE-2021-36226 - https://www.youtube.com/watch?v=vsg9YgvGBec
|
|
CVE-2021-36231 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-035.txt
|
|
CVE-2021-36232 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-036.txt
|
|
CVE-2021-36233 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-037.txt
|
|
CVE-2021-36234 - https://www.syss.de
|
|
CVE-2021-36234 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-039.txt
|
|
CVE-2021-36260 - http://packetstormsecurity.com/files/164603/Hikvision-Web-Server-Build-210702-Command-Injection.html
|
|
CVE-2021-36260 - http://packetstormsecurity.com/files/166167/Hikvision-IP-Camera-Unauthenticated-Command-Injection.html
|
|
CVE-2021-36278 - https://www.dell.com/support/kbdoc/000190408
|
|
CVE-2021-36279 - https://www.dell.com/support/kbdoc/000190408
|
|
CVE-2021-36280 - https://www.dell.com/support/kbdoc/000190408
|
|
CVE-2021-36281 - https://www.dell.com/support/kbdoc/000190408
|
|
CVE-2021-36282 - https://www.dell.com/support/kbdoc/000190408
|
|
CVE-2021-3634 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-36351 - https://www.exploit-db.com/exploits/50165
|
|
CVE-2021-36352 - https://www.exploit-db.com/exploits/50197
|
|
CVE-2021-36356 - http://packetstormsecurity.com/files/166623/Kramer-VIAware-Remote-Code-Execution.html
|
|
CVE-2021-36359 - http://packetstormsecurity.com/files/163988/BSCW-Server-XML-Injection.html
|
|
CVE-2021-36359 - http://seclists.org/fulldisclosure/2021/Aug/23
|
|
CVE-2021-36368 - https://docs.ssh-mitm.at/trivialauth.html
|
|
CVE-2021-36373 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-36373 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-36373 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-36373 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-36374 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-36374 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-36374 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-36374 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-36380 - https://research.nccgroup.com/2021/07/26/technical-advisory-sunhillo-sureline-unauthenticated-os-command-injection-cve-2021-36380/
|
|
CVE-2021-36383 - https://github.com/vatesfr/xen-orchestra/issues/5712
|
|
CVE-2021-36387 - http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html
|
|
CVE-2021-36387 - https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html
|
|
CVE-2021-36388 - https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html
|
|
CVE-2021-36389 - http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html
|
|
CVE-2021-3640 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
|
|
CVE-2021-3640 - https://ubuntu.com/security/CVE-2021-3640
|
|
CVE-2021-3640 - https://www.openwall.com/lists/oss-security/2021/07/22/1
|
|
CVE-2021-36408 - https://github.com/strukturag/libde265/issues/299
|
|
CVE-2021-36409 - https://github.com/strukturag/libde265/issues/300
|
|
CVE-2021-36410 - https://github.com/strukturag/libde265/issues/301
|
|
CVE-2021-36411 - https://github.com/strukturag/libde265/issues/302
|
|
CVE-2021-36412 - https://github.com/gpac/gpac/issues/1838
|
|
CVE-2021-36414 - https://github.com/gpac/gpac/issues/1840
|
|
CVE-2021-36417 - https://github.com/gpac/gpac/issues/1846
|
|
CVE-2021-36426 - https://github.com/slackero/phpwcms/issues/312
|
|
CVE-2021-36440 - https://github.com/star7th/showdoc/issues/1406
|
|
CVE-2021-3645 - https://huntr.dev/bounties/ef387a9e-ca3c-4c21-80e3-d34a6a896262
|
|
CVE-2021-36450 - https://medium.com/@1nf0sk/cve-2021-36450-cross-site-scripting-xss-6f5d8d7db740
|
|
CVE-2021-36450 - https://sushantvkamble.blogspot.com/2021/11/cross-site-scripting-xss.html
|
|
CVE-2021-3646 - https://huntr.dev/bounties/32e30ecf-31fa-45f6-8552-47250ef0e613
|
|
CVE-2021-36460 - https://github.com/martinfrancois/CVE-2021-36460
|
|
CVE-2021-3647 - https://huntr.dev/bounties/1625558772840-medialize/URI.js
|
|
CVE-2021-3649 - https://huntr.dev/bounties/1625088985607-chatwoot/chatwoot
|
|
CVE-2021-36493 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42160
|
|
CVE-2021-36520 - http://packetstormsecurity.com/files/171731/itech-TrainSmart-r1044-SQL-Injection.html
|
|
CVE-2021-3653 - http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
|
|
CVE-2021-36530 - https://github.com/miniupnp/ngiflib/issues/19
|
|
CVE-2021-36531 - https://github.com/miniupnp/ngiflib/issues/18
|
|
CVE-2021-36532 - https://github.com/excellentoldtv/portfolioCMS-issues/issues/1
|
|
CVE-2021-36535 - https://github.com/cesanta/mjs/issues/175
|
|
CVE-2021-36539 - https://github.com/gaukas/instructure-canvas-file-oracle
|
|
CVE-2021-36543 - https://cyberdivision.medium.com/cve-2021-36543-9622f50c6dc
|
|
CVE-2021-36546 - https://github.com/Kitesky/KiteCMS/issues/10
|
|
CVE-2021-36550 - https://github.com/r0ck3t1973/xss_payload/issues/6
|
|
CVE-2021-36551 - https://github.com/r0ck3t1973/xss_payload/issues/7
|
|
CVE-2021-36563 - https://github.com/Edgarloyola/CVE-2021-36563
|
|
CVE-2021-36564 - https://github.com/top-think/framework/issues/2559
|
|
CVE-2021-36568 - https://blog.hackingforce.com.br/en/cve-2021-36568/
|
|
CVE-2021-36569 - https://github.com/daylightstudio/FUEL-CMS/issues/578
|
|
CVE-2021-36570 - https://github.com/daylightstudio/FUEL-CMS/issues/579
|
|
CVE-2021-36572 - https://github.com/liufee/cms/issues/58
|
|
CVE-2021-36573 - https://github.com/liufee/cms/issues/59
|
|
CVE-2021-36580 - http://icewarp.com
|
|
CVE-2021-36584 - https://github.com/gpac/gpac/issues/1842
|
|
CVE-2021-3659 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8
|
|
CVE-2021-36608 - https://sourceforge.net/p/webtareas/tickets/44/
|
|
CVE-2021-36609 - https://sourceforge.net/p/webtareas/tickets/43/
|
|
CVE-2021-36613 - http://seclists.org/fulldisclosure/2022/Jun/2
|
|
CVE-2021-36613 - https://seclists.org/fulldisclosure/2021/Jul/0
|
|
CVE-2021-36614 - http://seclists.org/fulldisclosure/2022/Jun/2
|
|
CVE-2021-36614 - https://seclists.org/fulldisclosure/2021/Jul/0
|
|
CVE-2021-36621 - http://packetstormsecurity.com/files/164324/Covid-Vaccination-Scheduler-System-1.0-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2021-36621 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-18-09-2821
|
|
CVE-2021-36621 - https://www.exploit-db.com/exploits/50109
|
|
CVE-2021-36622 - https://www.exploit-db.com/exploits/50114
|
|
CVE-2021-36623 - https://www.exploit-db.com/exploits/50106
|
|
CVE-2021-36624 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-36624
|
|
CVE-2021-36624 - https://www.exploit-db.com/exploits/50105
|
|
CVE-2021-3664 - https://huntr.dev/bounties/1625557993985-unshiftio/url-parse
|
|
CVE-2021-36646 - https://github.com/kalcaddle/KodExplorer/issues/482
|
|
CVE-2021-36654 - http://packetstormsecurity.com/files/163737/CMSuno-1.7-Cross-Site-Scripting.html
|
|
CVE-2021-3666 - https://huntr.dev/bounties/1-other-fiznool/body-parser-xml
|
|
CVE-2021-36665 - https://imhotepisinvisible.com/druva-lpe/
|
|
CVE-2021-36666 - https://imhotepisinvisible.com/druva-lpe/
|
|
CVE-2021-36667 - https://imhotepisinvisible.com/druva-lpe/
|
|
CVE-2021-36668 - https://imhotepisinvisible.com/druva-lpe/
|
|
CVE-2021-36689 - https://vrls.ws/posts/2021/08/samourai-wallet-bitcoin-pin-authentication-bypass-crypto/
|
|
CVE-2021-36690 - http://seclists.org/fulldisclosure/2022/Oct/39
|
|
CVE-2021-36690 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2021-36690 - http://seclists.org/fulldisclosure/2022/Oct/47
|
|
CVE-2021-36690 - http://seclists.org/fulldisclosure/2022/Oct/49
|
|
CVE-2021-36690 - https://www.sqlite.org/forum/forumpost/718c0a8d17
|
|
CVE-2021-36691 - https://github.com/libjxl/libjxl/issues/422
|
|
CVE-2021-36695 - https://www.r29k.com/articles/bb/stored-xss-in-deskpro#anchor1
|
|
CVE-2021-36696 - https://www.r29k.com/articles/bb/stored-xss-in-deskpro#anchor2
|
|
CVE-2021-36705 - https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#tr069-command-injection
|
|
CVE-2021-36706 - https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#syscmd-command-injection
|
|
CVE-2021-36707 - https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#ledonoff-command-injection
|
|
CVE-2021-36708 - https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#sysinit-password-reset
|
|
CVE-2021-36711 - http://packetstormsecurity.com/files/167780/OctoBot-WebInterface-0.4.3-Remote-Code-Execution.html
|
|
CVE-2021-36711 - https://github.com/Drakkar-Software/OctoBot/issues/1966
|
|
CVE-2021-36711 - https://github.com/Nwqda/Sashimi-Evil-OctoBot-Tentacle
|
|
CVE-2021-36711 - https://packetstormsecurity.com/files/167721/Sashimi-Evil-OctoBot-Tentacle.html
|
|
CVE-2021-36713 - https://gist.github.com/walhajri/711af9b62f6fb25e66a5d9a490deab98
|
|
CVE-2021-3672 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-3674 - https://gist.github.com/netspooky/61101e191afee95feda7dbd2f6b061c4
|
|
CVE-2021-3674 - https://github.com/rizinorg/rizin/pull/1313
|
|
CVE-2021-36748 - https://blog.sorcery.ie
|
|
CVE-2021-36748 - https://blog.sorcery.ie/posts/ph_simpleblog_sqli/
|
|
CVE-2021-36761 - https://www.cyberiskvision.com/advisory/
|
|
CVE-2021-36762 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
|
CVE-2021-36762 - https://www.kb.cert.org/vuls/id/608209
|
|
CVE-2021-36766 - http://packetstormsecurity.com/files/163564/Concrete5-8.5.5-Phar-Deserialization.html
|
|
CVE-2021-36773 - https://news.ycombinator.com/item?id=27833752
|
|
CVE-2021-3678 - https://huntr.dev/bounties/f9a9defd-29ea-4442-b692-ff1512813de4
|
|
CVE-2021-36787 - http://packetstormsecurity.com/files/165675/TYPO3-femanager-6.3.0-Cross-Site-Scripting.html
|
|
CVE-2021-36787 - http://seclists.org/fulldisclosure/2022/Jan/53
|
|
CVE-2021-3679 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a
|
|
CVE-2021-36797 - https://github.com/victronenergy/venus/issues/836
|
|
CVE-2021-36798 - https://labs.sentinelone.com/hotcobalt-new-cobalt-strike-dos-vulnerability-that-lets-you-halt-operations/
|
|
CVE-2021-36799 - http://packetstormsecurity.com/files/165200/ETS5-Password-Recovery-Tool.html
|
|
CVE-2021-36799 - https://github.com/robertguetzkow/ets5-password-recovery
|
|
CVE-2021-3680 - https://huntr.dev/bounties/76b49607-fba9-4100-9be7-cb459fe6cfe2
|
|
CVE-2021-36800 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/
|
|
CVE-2021-36801 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/
|
|
CVE-2021-36802 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/
|
|
CVE-2021-36803 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/
|
|
CVE-2021-36804 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/
|
|
CVE-2021-36805 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/
|
|
CVE-2021-3683 - https://huntr.dev/bounties/063a339a-5d78-40d6-a96a-6716960e8134
|
|
CVE-2021-3689 - https://huntr.dev/bounties/50aad1d4-eb00-4573-b8a4-dbe38e2c229f
|
|
CVE-2021-3692 - https://huntr.dev/bounties/55517f19-5c28-4db2-8b00-f78f841e8aba
|
|
CVE-2021-36934 - http://packetstormsecurity.com/files/164006/HiveNightmare-AKA-SeriousSAM.html
|
|
CVE-2021-36942 - https://www.kb.cert.org/vuls/id/405600
|
|
CVE-2021-36977 - https://github.com/HDFGroup/hdf5/issues/272
|
|
CVE-2021-36978 - https://github.com/qpdf/qpdf/issues/492
|
|
CVE-2021-36981 - https://github.com/0xBrAinsTorM/CVE-2021-36981
|
|
CVE-2021-3706 - https://huntr.dev/bounties/ac7fd77b-b31b-4d02-aebd-f89ecbae3fce
|
|
CVE-2021-3707 - https://github.com/HadiMed/firmware-analysis/blob/main/DSL-2750U%20(firmware%20version%201.6)/README.md
|
|
CVE-2021-3708 - https://github.com/HadiMed/firmware-analysis/blob/main/DSL-2750U%20(firmware%20version%201.6)/README.md
|
|
CVE-2021-3709 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1934308
|
|
CVE-2021-3710 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832
|
|
CVE-2021-3711 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-3711 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-3711 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-3712 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366
|
|
CVE-2021-3712 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-3712 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-3712 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-37136 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-37136 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-37136 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-37137 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-37137 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-37137 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-37144 - https://github.com/cskaza/cszcms/issues/32
|
|
CVE-2021-37145 - https://support.polycom.com/content/support.html
|
|
CVE-2021-3715 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359
|
|
CVE-2021-37152 - https://support.sonatype.com
|
|
CVE-2021-37152 - https://support.sonatype.com/hc/en-us/articles/4404115639827
|
|
CVE-2021-37157 - https://www.exploit-db.com/exploits/50373
|
|
CVE-2021-37158 - https://www.exploit-db.com/exploits/50373
|
|
CVE-2021-37159 - https://bugzilla.suse.com/show_bug.cgi?id=1188601
|
|
CVE-2021-37159 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-37160 - https://www.armis.com/PwnedPiper
|
|
CVE-2021-37161 - https://www.armis.com/PwnedPiper
|
|
CVE-2021-37161 - https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37161-bulletin---underflow-in-udprxthread.pdf?rev=9395dad86d0b4811ae4a9e37f0568c2e&hash=3D8571C7A3DCC8B7D8DCB89C2DA4BB8D
|
|
CVE-2021-37162 - https://www.armis.com/PwnedPiper
|
|
CVE-2021-37163 - https://www.armis.com/PwnedPiper
|
|
CVE-2021-37164 - https://www.armis.com/PwnedPiper
|
|
CVE-2021-37165 - https://www.armis.com/PwnedPiper
|
|
CVE-2021-37166 - https://www.armis.com/PwnedPiper
|
|
CVE-2021-37167 - https://www.armis.com/PwnedPiper
|
|
CVE-2021-37187 - https://www.digi.com/search/results?q=transport
|
|
CVE-2021-37188 - https://www.digi.com/search/results?q=transport
|
|
CVE-2021-37189 - https://www.digi.com/search/results?q=transport
|
|
CVE-2021-37220 - https://bugs.ghostscript.com/show_bug.cgi?id=703791
|
|
CVE-2021-37221 - https://www.exploit-db.com/exploits/50046
|
|
CVE-2021-37253 - http://packetstormsecurity.com/files/165139/M-Files-Web-Denial-Of-Service.html
|
|
CVE-2021-37253 - http://seclists.org/fulldisclosure/2021/Dec/1
|
|
CVE-2021-37253 - https://www.tenable.com/cve/CVE-2021-37253
|
|
CVE-2021-3728 - https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d
|
|
CVE-2021-3729 - https://huntr.dev/bounties/d32f3d5a-0738-41ba-89de-34f2a772de76
|
|
CVE-2021-37291 - https://www.zeroscience.mk/en/vulnerabilities/
|
|
CVE-2021-37292 - https://www.zeroscience.mk/en/vulnerabilities/
|
|
CVE-2021-37293 - https://www.zeroscience.mk/en/vulnerabilities/
|
|
CVE-2021-3730 - https://huntr.dev/bounties/ea181323-51f8-46a2-a60f-6a401907feb7
|
|
CVE-2021-37315 - https://robertchen.cc/blog/2021/03/31/asus-rce
|
|
CVE-2021-37316 - https://robertchen.cc/blog/2021/03/31/asus-rce
|
|
CVE-2021-37317 - https://robertchen.cc/blog/2021/03/31/asus-rce
|
|
CVE-2021-3732 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631
|
|
CVE-2021-37322 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
|
|
CVE-2021-37330 - https://www.navidkagalwalla.com/booking-core-vulnerabilities
|
|
CVE-2021-37331 - https://www.navidkagalwalla.com/booking-core-vulnerabilities
|
|
CVE-2021-37333 - https://www.navidkagalwalla.com/booking-core-vulnerabilities
|
|
CVE-2021-3734 - https://huntr.dev/bounties/dd2e2dbe-efe5-49ec-be11-7a7e7c41debd
|
|
CVE-2021-37343 - http://packetstormsecurity.com/files/165978/Nagios-XI-Autodiscovery-Shell-Upload.html
|
|
CVE-2021-37354 - https://github.com/Ainevsia/CVE-Request/tree/main/Xerox/1
|
|
CVE-2021-37363 - https://www.exploit-db.com/exploits/50449
|
|
CVE-2021-37364 - https://www.exploit-db.com/exploits/50448
|
|
CVE-2021-3737 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-37371 - http://packetstormsecurity.com/files/164625/Online-Student-Admission-System-1.0-SQL-Injection-Shell-Upload.html
|
|
CVE-2021-37371 - https://packetstormsecurity.com/files/164625/Online_Admission_System_CVEs-Gerard-Carbonell.pdf
|
|
CVE-2021-37372 - http://packetstormsecurity.com/files/164625/Online-Student-Admission-System-1.0-SQL-Injection-Shell-Upload.html
|
|
CVE-2021-37372 - https://packetstormsecurity.com/files/164625/Online_Admission_System_CVEs-Gerard-Carbonell.pdf
|
|
CVE-2021-37373 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory
|
|
CVE-2021-37374 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory
|
|
CVE-2021-37375 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory
|
|
CVE-2021-37376 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory
|
|
CVE-2021-37377 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory
|
|
CVE-2021-37378 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory
|
|
CVE-2021-37379 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory
|
|
CVE-2021-37381 - https://github.com/caiteli/poc_information/blob/main/southsoft_GMIS.txt
|
|
CVE-2021-37381 - https://github.com/caiteli/poc_information/issues/1
|
|
CVE-2021-37388 - https://github.com/noobexploiter/IOTHACKS/blob/main/vuln1.md
|
|
CVE-2021-37388 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-37389 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chamilo-lms-1.11.14-xss-vulnerabilities
|
|
CVE-2021-3739 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091
|
|
CVE-2021-3739 - https://ubuntu.com/security/CVE-2021-3739
|
|
CVE-2021-37390 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chamilo-lms-1.11.14-xss-vulnerabilities
|
|
CVE-2021-37391 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chamilo-lms-1.11.14-xss-vulnerabilities
|
|
CVE-2021-37402 - http://seclists.org/fulldisclosure/2021/Jul/33
|
|
CVE-2021-37403 - http://seclists.org/fulldisclosure/2021/Jul/33
|
|
CVE-2021-37412 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-040.txt
|
|
CVE-2021-37415 - https://www.manageengine.com
|
|
CVE-2021-37416 - https://blog.stmcyber.com/vulns/cve-2021-37416/
|
|
CVE-2021-37417 - https://blog.stmcyber.com/vulns/cve-2021-37417/
|
|
CVE-2021-37419 - https://blog.stmcyber.com/vulns/cve-2021-37419/
|
|
CVE-2021-37419 - https://www.manageengine.com
|
|
CVE-2021-37420 - https://blog.stmcyber.com/vulns/cve-2021-37420/
|
|
CVE-2021-37420 - https://www.manageengine.com
|
|
CVE-2021-37421 - https://blog.stmcyber.com/vulns/cve-2021-37421/
|
|
CVE-2021-37424 - https://www.manageengine.com
|
|
CVE-2021-37425 - http://seclists.org/fulldisclosure/2021/Aug/12
|
|
CVE-2021-37425 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-002
|
|
CVE-2021-37425 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
|
CVE-2021-3743 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e78c597c3ebfd0cb329aa09a838734147e4f117
|
|
CVE-2021-3743 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-37439 - https://github.com/0xfml/poc/blob/main/NCH/Flexiserver_6.00_LFI.md
|
|
CVE-2021-3744 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-37440 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_LFI.md
|
|
CVE-2021-37441 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_LFI.md
|
|
CVE-2021-37442 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_LFI.md
|
|
CVE-2021-37443 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_LFI.md
|
|
CVE-2021-37444 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_RCE.md
|
|
CVE-2021-37445 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_LFI.md
|
|
CVE-2021-37446 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_LFI.md
|
|
CVE-2021-37447 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_LFI.md
|
|
CVE-2021-37448 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md
|
|
CVE-2021-37449 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md
|
|
CVE-2021-3745 - https://huntr.dev/bounties/7879ab3d-8018-402a-aa0b-131bdbd1966c
|
|
CVE-2021-37450 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md
|
|
CVE-2021-37451 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md
|
|
CVE-2021-37452 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_CC.md
|
|
CVE-2021-37453 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md
|
|
CVE-2021-37454 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md
|
|
CVE-2021-37455 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md
|
|
CVE-2021-37456 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md
|
|
CVE-2021-37457 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md
|
|
CVE-2021-37458 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md
|
|
CVE-2021-37459 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md
|
|
CVE-2021-37460 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md
|
|
CVE-2021-37461 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md
|
|
CVE-2021-37462 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md
|
|
CVE-2021-37463 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md
|
|
CVE-2021-37464 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md
|
|
CVE-2021-37465 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md
|
|
CVE-2021-37466 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md
|
|
CVE-2021-37467 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md
|
|
CVE-2021-37468 - https://github.com/0xfml/poc/blob/main/NCH/ReflectCRM_3.01_CC.md
|
|
CVE-2021-37469 - https://github.com/0xfml/poc/blob/main/NCH/WebDictate_2.13_LFI.md
|
|
CVE-2021-37470 - https://github.com/0xfml/poc/blob/main/NCH/WebDictate_2.13_XSS.md
|
|
CVE-2021-3749 - https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31
|
|
CVE-2021-3749 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-37491 - https://github.com/bitcoin/bitcoin/commit/2fb9c1e6681370478e24a19172ed6d78d95d50d3
|
|
CVE-2021-37492 - https://github.com/bitcoin/bitcoin/commit/2fb9c1e6681370478e24a19172ed6d78d95d50d3
|
|
CVE-2021-37497 - https://github.com/penson233/Vuln/issues/3
|
|
CVE-2021-37501 - https://github.com/HDFGroup/hdf5
|
|
CVE-2021-37501 - https://github.com/HDFGroup/hdf5/issues/2458
|
|
CVE-2021-37501 - https://github.com/ST4RF4LL/Something_Found/blob/main/HDF5_v1.13.0_h5dump_heap_overflow.md
|
|
CVE-2021-3751 - https://huntr.dev/bounties/fcb4383c-bc27-4b89-bfce-6b041f0cb769
|
|
CVE-2021-37519 - https://github.com/memcached/memcached/issues/805
|
|
CVE-2021-3752 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-37529 - https://sourceforge.net/p/mcj/tickets/125/
|
|
CVE-2021-37531 - http://packetstormsecurity.com/files/165751/SAP-Enterprise-Portal-XSLT-Injection.html
|
|
CVE-2021-37538 - https://blog.sorcery.ie/posts/smartblog_sqli/
|
|
CVE-2021-37539 - https://www.manageengine.com
|
|
CVE-2021-3756 - https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1
|
|
CVE-2021-37560 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-37561 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-37562 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-37563 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-37564 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-37565 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-37566 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-37567 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-37568 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-37569 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-3757 - https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa
|
|
CVE-2021-37570 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-37571 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-37572 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-37573 - http://packetstormsecurity.com/files/163825/Tiny-Java-Web-Server-1.115-Cross-Site-Scripting.html
|
|
CVE-2021-37573 - http://seclists.org/fulldisclosure/2021/Aug/13
|
|
CVE-2021-37573 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-042.txt
|
|
CVE-2021-37576 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a
|
|
CVE-2021-3758 - https://huntr.dev/bounties/a8d7fb24-9a69-42f3-990a-2db93b53f76b
|
|
CVE-2021-37583 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-37584 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
|
|
CVE-2021-37589 - http://packetstormsecurity.com/files/167480/Virtua-Software-Cobranca-12S-SQL-Injection.html
|
|
CVE-2021-37589 - https://github.com/luca-regne/my-cves/tree/main/CVE-2021-37589
|
|
CVE-2021-3759 - https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/
|
|
CVE-2021-37593 - http://www.netbytesec.com/advisories/UnauthenticatedBlindSQLInjectionVulnerabilityInPEELShopping/
|
|
CVE-2021-37593 - https://github.com/advisto/peel-shopping/issues/3
|
|
CVE-2021-37593 - https://github.com/faisalfs10x/CVE-IDs/blob/main/2021/CVE-2021-37593/Proof_of_Concept.md
|
|
CVE-2021-37605 - https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.51.0.101-readme.pdf
|
|
CVE-2021-37606 - https://peter.website/meow-hash-cryptanalysis
|
|
CVE-2021-37613 - https://advisories.stormshield.eu
|
|
CVE-2021-37623 - https://github.com/Exiv2/exiv2/pull/1790
|
|
CVE-2021-37624 - http://packetstormsecurity.com/files/164628/FreeSWITCH-1.10.6-Missing-SIP-MESSAGE-Authentication.html
|
|
CVE-2021-3765 - https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9
|
|
CVE-2021-3766 - https://huntr.dev/bounties/c98e0f0e-ebf2-4072-be73-a1848ea031cc
|
|
CVE-2021-3767 - https://huntr.dev/bounties/7ec92c85-30eb-4071-8891-6183446ca980
|
|
CVE-2021-3768 - https://huntr.dev/bounties/64a0229f-ff5e-4c64-b83e-9bfc0698a78e
|
|
CVE-2021-37695 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-37695 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-3770 - http://www.openwall.com/lists/oss-security/2021/10/01/1
|
|
CVE-2021-3770 - https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
|
|
CVE-2021-37701 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-37706 - http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html
|
|
CVE-2021-37712 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-37713 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-37714 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-37714 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-37714 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-3772 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
|
|
CVE-2021-3772 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-3773 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-37740 - https://github.com/robertguetzkow/CVE-2021-37740
|
|
CVE-2021-37741 - https://www.manageengine.com
|
|
CVE-2021-37748 - https://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915/
|
|
CVE-2021-37749 - https://www.silentgrid.com/blog/cve-2021-37749-hexagon-geomedia-webmap-2020-blind-sql-injection/
|
|
CVE-2021-3775 - https://huntr.dev/bounties/6a59d203-4ca7-4aed-bdb9-1e39b66c77b3
|
|
CVE-2021-37750 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-3776 - https://huntr.dev/bounties/e0edf27d-437e-44fe-907a-df020f385304
|
|
CVE-2021-37761 - https://www.manageengine.com
|
|
CVE-2021-37762 - https://www.manageengine.com
|
|
CVE-2021-37764 - https://github.com/XOS-Shop/xos_shop_system/issues/1
|
|
CVE-2021-3777 - https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df
|
|
CVE-2021-37774 - https://github.com/fishykz/TP-POC
|
|
CVE-2021-37777 - https://www.navidkagalwalla.com/gila-cms-vulnerabilities
|
|
CVE-2021-3778 - http://www.openwall.com/lists/oss-security/2021/10/01/1
|
|
CVE-2021-3778 - https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
|
|
CVE-2021-37788 - https://gist.github.com/rvismit/67bc11dd9ccb7423827564cb81d25740
|
|
CVE-2021-37789 - https://github.com/nothings/stb/issues/1178
|
|
CVE-2021-37791 - https://github.com/cdfan/my-admin/issues/3
|
|
CVE-2021-3780 - https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6
|
|
CVE-2021-3780 - https://huntr.dev/bounties/282807a8-4bf5-4fe2-af62-e05f945b3d65
|
|
CVE-2021-37803 - https://packetstormsecurity.com/files/163415/Online-Covid-Vaccination-Scheduler-System-1.0-SQL-Injection.html
|
|
CVE-2021-37805 - https://packetstormsecurity.com/files/163625/Vehicle-Parking-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-37806 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-37806
|
|
CVE-2021-37806 - https://packetstormsecurity.com/files/163626/Vehicle-Parking-Management-System-1.0-SQL-Injection.html
|
|
CVE-2021-37807 - https://packetstormsecurity.com/files/163574/Online-Shopping-Portal-3.1-SQL-Injection.html
|
|
CVE-2021-37808 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-37808
|
|
CVE-2021-37808 - https://packetstormsecurity.com/files/163575/News-Portal-Project-3.1-SQL-Injection.html
|
|
CVE-2021-37819 - https://gitlab.com/pdftk-java/pdftk/-/merge_requests/21/diffs?commit_id=9b0cbb76c8434a8505f02ada02a94263dcae9247#diff-content-b3cfd29983c793bcae2375502abd5baa8f5d1081
|
|
CVE-2021-37840 - https://github.com/aaPanel/aaPanel/issues/74
|
|
CVE-2021-37841 - https://docs.docker.com/docker-for-windows/release-notes/
|
|
CVE-2021-3785 - https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638
|
|
CVE-2021-37859 - https://mattermost.com/security-updates/
|
|
CVE-2021-37860 - https://mattermost.com/security-updates/
|
|
CVE-2021-37861 - https://mattermost.com/security-updates/
|
|
CVE-2021-37862 - https://mattermost.com/security-updates/
|
|
CVE-2021-37863 - https://mattermost.com/security-updates/
|
|
CVE-2021-37864 - https://mattermost.com/security-updates/
|
|
CVE-2021-37865 - https://mattermost.com/security-updates/
|
|
CVE-2021-37866 - https://mattermost.com/security-updates/
|
|
CVE-2021-37866 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-37866
|
|
CVE-2021-37867 - https://mattermost.com/security-updates/
|
|
CVE-2021-37914 - https://github.com/argoproj/argo-workflows/issues/6441
|
|
CVE-2021-37914 - https://github.com/argoproj/argo-workflows/pull/6442
|
|
CVE-2021-37915 - https://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915/
|
|
CVE-2021-37916 - https://github.com/laurent22/joplin/commit/feaecf765368f2c273bea3a9fa641ff0da7e6b26
|
|
CVE-2021-37916 - https://github.com/laurent22/joplin/releases/tag/v2.0.9
|
|
CVE-2021-37918 - https://www.manageengine.com
|
|
CVE-2021-37919 - https://www.manageengine.com
|
|
CVE-2021-37920 - https://www.manageengine.com
|
|
CVE-2021-37921 - https://www.manageengine.com
|
|
CVE-2021-37922 - https://www.manageengine.com
|
|
CVE-2021-37923 - https://www.manageengine.com
|
|
CVE-2021-37924 - https://www.manageengine.com
|
|
CVE-2021-37925 - https://www.manageengine.com
|
|
CVE-2021-37926 - https://www.manageengine.com
|
|
CVE-2021-37927 - https://www.manageengine.com
|
|
CVE-2021-37928 - https://www.manageengine.com
|
|
CVE-2021-37929 - https://www.manageengine.com
|
|
CVE-2021-37930 - https://www.manageengine.com
|
|
CVE-2021-37931 - https://www.manageengine.com
|
|
CVE-2021-37936 - https://www.elastic.co/community/security/
|
|
CVE-2021-37937 - https://www.elastic.co/community/security
|
|
CVE-2021-3794 - https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7
|
|
CVE-2021-37942 - https://www.elastic.co/community/security
|
|
CVE-2021-3796 - http://www.openwall.com/lists/oss-security/2021/10/01/1
|
|
CVE-2021-3796 - https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
|
|
CVE-2021-3797 - https://huntr.dev/bounties/c24fb15c-3c84-45c8-af04-a660f8da388f
|
|
CVE-2021-37975 - http://packetstormsecurity.com/files/172847/Chrome-V8-Logic-Bug-Use-After-Free.html
|
|
CVE-2021-37979 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1372
|
|
CVE-2021-3799 - https://huntr.dev/bounties/d73f24a8-302b-4f9f-abb8-54688abd9813
|
|
CVE-2021-3801 - https://huntr.dev/bounties/8c16ab31-6eb6-46d1-b9a4-387222fe1b8a
|
|
CVE-2021-3802 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt
|
|
CVE-2021-3803 - https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0
|
|
CVE-2021-3804 - https://huntr.dev/bounties/0ebe85e6-cc85-42b8-957e-18d8df277414
|
|
CVE-2021-3805 - https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053
|
|
CVE-2021-3806 - https://pentest.blog/pardus-21-linux-distro-remote-code-execution-0day-2021/
|
|
CVE-2021-3807 - https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
|
|
CVE-2021-3807 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-38085 - http://packetstormsecurity.com/files/163795/Canon-TR150-Driver-3.71.2.10-Privilege-Escalation.html
|
|
CVE-2021-38085 - https://www.youtube.com/watch?v=vdesswZYz-8
|
|
CVE-2021-38090 - https://trac.ffmpeg.org/ticket/8263
|
|
CVE-2021-38091 - https://trac.ffmpeg.org/ticket/8263
|
|
CVE-2021-38092 - https://trac.ffmpeg.org/ticket/8263
|
|
CVE-2021-38093 - https://trac.ffmpeg.org/ticket/8263
|
|
CVE-2021-38094 - https://trac.ffmpeg.org/ticket/8263
|
|
CVE-2021-38095 - https://github.com/FlaviuPopescu/Spigit-PoC
|
|
CVE-2021-3810 - https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223
|
|
CVE-2021-3811 - https://huntr.dev/bounties/fa38c61f-4043-4872-bc85-7fe5ae5cc2e8
|
|
CVE-2021-38112 - https://rhinosecuritylabs.com/aws/cve-2021-38112-aws-workspaces-rce/
|
|
CVE-2021-38113 - https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/issues/1387
|
|
CVE-2021-3812 - https://huntr.dev/bounties/875a6885-9a64-46f3-94ad-92f40f989200
|
|
CVE-2021-3813 - https://huntr.dev/bounties/36f02c4f-cf1c-479e-a1ad-091a1ac7cb56
|
|
CVE-2021-38136 - https://www.shielder.it/advisories/corero_secure_watch_managed_services-get_snapshot-path-traversal/
|
|
CVE-2021-38137 - https://www.shielder.it/advisories/corero_secure_watch_managed_services-multiple-broken-access-control/
|
|
CVE-2021-38138 - http://packetstormsecurity.com/files/163753/OneNav-Beta-0.9.12-Cross-Site-Scripting.html
|
|
CVE-2021-38143 - https://bernardofsr.github.io/blog/2021/form-tools/
|
|
CVE-2021-38143 - https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md
|
|
CVE-2021-38144 - https://bernardofsr.github.io/blog/2021/form-tools/
|
|
CVE-2021-38144 - https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md
|
|
CVE-2021-38145 - https://bernardofsr.github.io/blog/2021/form-tools/
|
|
CVE-2021-38145 - https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md
|
|
CVE-2021-38146 - http://packetstormsecurity.com/files/164970/Wipro-Holmes-Orchestrator-20.4.1-Arbitrary-File-Download.html
|
|
CVE-2021-38147 - http://packetstormsecurity.com/files/165039/Wipro-Holmes-Orchestrator-20.4.1-Report-Disclosure.html
|
|
CVE-2021-38149 - https://github.com/jboogie15/CVE-2021-38149
|
|
CVE-2021-3815 - https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0
|
|
CVE-2021-38151 - https://github.com/jboogie15/CVE-2021-38149
|
|
CVE-2021-38152 - http://packetstormsecurity.com/files/163816/Chikitsa-2.0.0-Cross-Site-Scripting.html
|
|
CVE-2021-38152 - https://github.com/jboogie15/CVE-2021-38149
|
|
CVE-2021-38153 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-38153 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-38153 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-38156 - https://raxis.com/blog/cve-2021-38156
|
|
CVE-2021-38157 - https://gist.github.com/erud1te-sec/5c85924cb78ba85af42e0b7b62a5ec91
|
|
CVE-2021-38157 - https://leostream.com
|
|
CVE-2021-38157 - https://www.leostream.com/resources-2/product-lifecycle/
|
|
CVE-2021-38160 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
|
|
CVE-2021-38162 - http://packetstormsecurity.com/files/166964/SAP-Web-Dispatcher-HTTP-Request-Smuggling.html
|
|
CVE-2021-3817 - http://packetstormsecurity.com/files/165377/WBCE-CMS-1.5.1-Admin-Password-Reset.html
|
|
CVE-2021-3817 - https://huntr.dev/bounties/c330dc0d-220a-4b15-b785-5face4cf6ef7
|
|
CVE-2021-38177 - http://packetstormsecurity.com/files/165749/SAP-CommonCryptoLib-Null-Pointer-Dereference.html
|
|
CVE-2021-38178 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983
|
|
CVE-2021-38179 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983
|
|
CVE-2021-3818 - https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea
|
|
CVE-2021-38180 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983
|
|
CVE-2021-38181 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983
|
|
CVE-2021-38183 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983
|
|
CVE-2021-38185 - https://github.com/fangqyi/cpiopwn
|
|
CVE-2021-38198 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11
|
|
CVE-2021-38199 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
|
|
CVE-2021-3820 - https://huntr.dev/bounties/4612b31a-072b-4f61-a916-c7e4cbc2042a
|
|
CVE-2021-38200 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
|
|
CVE-2021-38201 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
|
|
CVE-2021-38202 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
|
|
CVE-2021-38203 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
|
|
CVE-2021-38204 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6
|
|
CVE-2021-38205 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
|
|
CVE-2021-38206 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
|
|
CVE-2021-38207 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
|
|
CVE-2021-38208 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.10
|
|
CVE-2021-38209 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.2
|
|
CVE-2021-3822 - https://huntr.dev/bounties/1e3ed803-b7ed-42f1-a4ea-c4c75da9de73
|
|
CVE-2021-38221 - https://github.com/mlogclub/bbs-go/issues/112
|
|
CVE-2021-38241 - https://www.du1ge.com/archives/CVE-2021-38241
|
|
CVE-2021-38244 - https://github.com/cBioPortal/cbioportal/issues/8680
|
|
CVE-2021-3825 - https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/
|
|
CVE-2021-38263 - https://issues.liferay.com/browse/LPE-17061
|
|
CVE-2021-38266 - https://issues.liferay.com/browse/LPE-17191
|
|
CVE-2021-38278 - https://noob3xploiter.medium.com/hacking-the-tenda-ac10-1200-router-part-2-strcpy-buffer-overflow-92cd88e1d503
|
|
CVE-2021-3828 - https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32
|
|
CVE-2021-38283 - http://packetstormsecurity.com/files/165031/Wipro-Holmes-Orchestrator-20.4.1-File-Disclosure.html
|
|
CVE-2021-38289 - https://github.com/viperbluff/Novastar-VNNOX-iCare-Privilege-Escalation
|
|
CVE-2021-3829 - https://huntr.dev/bounties/6b8acb0c-8b5d-461e-9b46-b1bfb5a8ccdf
|
|
CVE-2021-38291 - https://trac.ffmpeg.org/ticket/9312
|
|
CVE-2021-38294 - http://packetstormsecurity.com/files/165019/Apache-Storm-Nimbus-2.2.0-Command-Execution.html
|
|
CVE-2021-38296 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-3830 - https://huntr.dev/bounties/0fcdee5f-1f07-47ce-b650-ea8b4a7d35d8
|
|
CVE-2021-38300 - http://www.openwall.com/lists/oss-security/2021/09/15/5
|
|
CVE-2021-38300 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10
|
|
CVE-2021-38300 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b
|
|
CVE-2021-3831 - https://huntr.dev/bounties/25775287-88cd-4f00-b978-692d627dff04
|
|
CVE-2021-3836 - https://huntr.dev/bounties/a98264fb-1930-4c7c-b774-af24c0175fd4
|
|
CVE-2021-38362 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
|
|
CVE-2021-3837 - https://huntr.dev/bounties/d66f90d6-1b5f-440d-8be6-cdffc9d4587e
|
|
CVE-2021-38371 - https://www.exim.org
|
|
CVE-2021-38374 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html
|
|
CVE-2021-38374 - http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html
|
|
CVE-2021-38374 - http://seclists.org/fulldisclosure/2021/Nov/43
|
|
CVE-2021-38374 - http://seclists.org/fulldisclosure/2022/Jul/11
|
|
CVE-2021-38375 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html
|
|
CVE-2021-38375 - https://seclists.org/fulldisclosure/2021/Nov/43
|
|
CVE-2021-38376 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html
|
|
CVE-2021-38376 - https://seclists.org/fulldisclosure/2021/Nov/43
|
|
CVE-2021-38377 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html
|
|
CVE-2021-38377 - https://seclists.org/fulldisclosure/2021/Nov/43
|
|
CVE-2021-38378 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html
|
|
CVE-2021-38378 - https://seclists.org/fulldisclosure/2021/Nov/43
|
|
CVE-2021-38380 - http://lists.live555.com/pipermail/live-devel/2021-August/021954.html
|
|
CVE-2021-38381 - http://lists.live555.com/pipermail/live-devel/2021-August/021961.html
|
|
CVE-2021-38382 - http://lists.live555.com/pipermail/live-devel/2021-August/021959.html
|
|
CVE-2021-38410 - https://www.aveva.com/en/support-and-success/cyber-security-updates/
|
|
CVE-2021-3842 - https://huntr.dev/bounties/761a761e-2be2-430a-8d92-6f74ffe9866a
|
|
CVE-2021-38425 - https://github.com/eProsima/Fast-DDS
|
|
CVE-2021-3845 - https://huntr.dev/bounties/dc7fc98f-4f4f-440a-b6f6-124a56ea36ef
|
|
CVE-2021-3846 - https://huntr.dev/bounties/5267ec1c-d204-40d2-bd4f-6c2dd495ee18
|
|
CVE-2021-38490 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-002
|
|
CVE-2021-38496 - https://bugzilla.mozilla.org/show_bug.cgi?id=1725335
|
|
CVE-2021-38498 - https://bugzilla.mozilla.org/show_bug.cgi?id=1729642
|
|
CVE-2021-3850 - https://huntr.dev/bounties/bdf5f216-4499-4225-a737-b28bc6f5801c
|
|
CVE-2021-38503 - https://bugzilla.mozilla.org/show_bug.cgi?id=1729517
|
|
CVE-2021-38509 - https://bugzilla.mozilla.org/show_bug.cgi?id=1718571
|
|
CVE-2021-38520 - https://kb.netgear.com/000063763/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2018-0565
|
|
CVE-2021-38522 - https://kb.netgear.com/000063767/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R6400-PSV-2019-0058
|
|
CVE-2021-38523 - https://kb.netgear.com/000063771/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R6400-PSV-2019-0166
|
|
CVE-2021-3853 - https://huntr.dev/bounties/2b6a7647-8f2b-4510-b40f-c52aedc2820d
|
|
CVE-2021-38530 - https://kb.netgear.com/000063770/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2019-0151
|
|
CVE-2021-38531 - https://kb.netgear.com/000063769/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-and-Gateways-PSV-2019-0113
|
|
CVE-2021-38532 - https://kb.netgear.com/000063787/Security-Advisory-for-Security-Misconfiguration-on-WAC104-PSV-2021-0124
|
|
CVE-2021-38535 - https://kb.netgear.com/000063773/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2019-0192
|
|
CVE-2021-38536 - https://kb.netgear.com/000063774/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2019-0193
|
|
CVE-2021-3855 - https://docs.liman.dev/baslangic/guvenlik
|
|
CVE-2021-3857 - https://huntr.dev/bounties/18f7eaee-6309-40cb-aed3-d5ac0af03cf3
|
|
CVE-2021-3858 - https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b
|
|
CVE-2021-3860 - http://packetstormsecurity.com/files/177162/JFrog-Artifactory-SQL-Injection.html
|
|
CVE-2021-38603 - http://packetstormsecurity.com/files/163823/PluXML-5.8.7-Cross-Site-Scripting.html
|
|
CVE-2021-38604 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-38615 - https://excellium-services.com/cert-xlm-advisory/
|
|
CVE-2021-38616 - https://excellium-services.com/cert-xlm-advisory/
|
|
CVE-2021-38617 - https://excellium-services.com/cert-xlm-advisory/
|
|
CVE-2021-3862 - https://huntr.dev/bounties/5c9c228e-2a39-4643-bb82-2b02a2b0a601
|
|
CVE-2021-3863 - https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0
|
|
CVE-2021-3864 - https://www.openwall.com/lists/oss-security/2021/10/20/2
|
|
CVE-2021-38647 - http://packetstormsecurity.com/files/164694/Microsoft-OMI-Management-Interface-Authentication-Bypass.html
|
|
CVE-2021-38648 - http://packetstormsecurity.com/files/164925/Microsoft-OMI-Management-Interface-Authentication-Bypass.html
|
|
CVE-2021-3866 - https://huntr.dev/bounties/5f48dac5-e112-4b23-bbbf-cc00ba83bcf2
|
|
CVE-2021-3869 - https://huntr.dev/bounties/2f8baf6c-14b3-420d-8ede-9805797cd324
|
|
CVE-2021-38699 - http://packetstormsecurity.com/files/163843/TastyIgniter-3.0.7-Cross-Site-Scripting.html
|
|
CVE-2021-38699 - https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS
|
|
CVE-2021-38699 - https://github.com/HuskyHacks/CVE-2021-38699-Stored-XSS
|
|
CVE-2021-38702 - http://packetstormsecurity.com/files/163859/Cyberoam-NetGenie-Cross-Site-Scripting.html
|
|
CVE-2021-38702 - http://seclists.org/fulldisclosure/2021/Aug/20
|
|
CVE-2021-38702 - https://seclists.org/fulldisclosure/2021/Aug/20
|
|
CVE-2021-38703 - https://7bits.nl/journal/posts/cve-2021-38703-kpn-experia-wifi-root-shell/
|
|
CVE-2021-38714 - https://sourceforge.net/p/plib/bugs/55/
|
|
CVE-2021-3872 - https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
|
|
CVE-2021-38721 - https://github.com/daylightstudio/FUEL-CMS/issues/584
|
|
CVE-2021-38727 - https://www.nu11secur1ty.com/2021/10/cve-2021-38727.html
|
|
CVE-2021-3874 - https://huntr.dev/bounties/ac268a17-72b5-446f-a09a-9945ef58607a
|
|
CVE-2021-3875 - https://huntr.dev/bounties/5cdbc168-6ba1-4bc2-ba6c-28be12166a53
|
|
CVE-2021-38752 - https://github.com/dumpling-soup/Online-Catering-Reservation/blob/main/README.md
|
|
CVE-2021-38753 - https://github.com/dumpling-soup/Simple-Image-Gallery-Web-App/blob/main/README.md
|
|
CVE-2021-38757 - http://packetstormsecurity.com/files/163869/Hospital-Management-System-Cross-Site-Scripting.html
|
|
CVE-2021-38758 - https://attackerkb.com/topics/XuEb81tsid/online-catering-reservation-dt-food-catering-by-oretnom23-v1-0-sql-injection---login
|
|
CVE-2021-38758 - https://github.com/dumpling-soup/Online-Catering-Reservation-DT/blob/main/README.md
|
|
CVE-2021-38758 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/Online-Catering-Reservation-DT-Food-Catering
|
|
CVE-2021-38759 - http://packetstormsecurity.com/files/165211/Raspberry-Pi-5.10-Default-Credentials.html
|
|
CVE-2021-38772 - https://noob3xploiter.medium.com/hacking-the-tenda-ac10-1200-router-part-3-yet-another-buffer-overflow-4eb322f64823
|
|
CVE-2021-3878 - https://huntr.dev/bounties/a11c889b-ccff-4fea-9e29-963a23a63dd2
|
|
CVE-2021-38789 - https://github.com/pokerfacett/MY_CVE_CREDIT/blob/master/Allwinner%20R818%20SoC%EF%BC%9Aaw_display%20service%20has%20EoP%20Vulnerability.md
|
|
CVE-2021-3879 - https://huntr.dev/bounties/6dccc49e-3843-4a4a-b397-5c659e5f8bfe
|
|
CVE-2021-3881 - https://huntr.dev/bounties/540fd115-7de4-4e19-a918-5ee61f5157c1
|
|
CVE-2021-38819 - https://github.com/m4sk0ff/CVE-2021-38819/blob/main/CVE-2021-38819.md
|
|
CVE-2021-3882 - https://huntr.dev/bounties/7061d97a-98a5-495a-8ba0-3a4c66091e9d
|
|
CVE-2021-38822 - https://www.navidkagalwalla.com/icehrm-vulnerabilities
|
|
CVE-2021-38823 - https://www.navidkagalwalla.com/icehrm-vulnerabilities
|
|
CVE-2021-38833 - https://www.exploit-db.com/exploits/50288
|
|
CVE-2021-38834 - https://www.exploit-db.com/exploits/50194
|
|
CVE-2021-38840 - https://www.exploit-db.com/exploits/50204
|
|
CVE-2021-38840 - https://www.exploit-db.com/exploits/50205
|
|
CVE-2021-38841 - https://www.exploit-db.com/exploits/50205
|
|
CVE-2021-3888 - https://huntr.dev/bounties/722b3acb-792b-4429-a98d-bb80efb8938d
|
|
CVE-2021-3889 - https://huntr.dev/bounties/efb3e261-3f7d-4a45-8114-e0ace6b21516
|
|
CVE-2021-38926 - https://www.ibm.com/support/pages/node/6523808
|
|
CVE-2021-3900 - https://huntr.dev/bounties/909e55b6-ef02-4143-92e4-bc3e8397db76
|
|
CVE-2021-3901 - https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464
|
|
CVE-2021-3903 - https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
|
|
CVE-2021-3904 - https://huntr.dev/bounties/b1182515-d911-4da9-b4f7-b4c341a62a8d
|
|
CVE-2021-39118 - https://jira.atlassian.com/browse/JRASERVER-72736
|
|
CVE-2021-39131 - https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9
|
|
CVE-2021-39134 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-39135 - https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
CVE-2021-39139 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39139 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39139 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-39140 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39140 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39140 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-39141 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39141 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39141 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-39144 - http://packetstormsecurity.com/files/169859/VMware-NSX-Manager-XStream-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2021-39144 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39144 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39144 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-39145 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39145 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39145 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-39146 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39146 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39146 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-39147 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39147 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39147 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-39148 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39148 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39148 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-39149 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39149 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39149 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-3915 - https://huntr.dev/bounties/fcb65f2d-257a-46f4-bac9-f6ded5649079
|
|
CVE-2021-39150 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39150 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39150 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-39151 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39151 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39151 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-39152 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39152 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39152 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-39153 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39153 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39153 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-39154 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39154 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39154 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-39157 - https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-jqfh-8hw5-fqjr
|
|
CVE-2021-3916 - https://huntr.dev/bounties/0be32e6b-7c48-43f0-9cec-433000ad8f64
|
|
CVE-2021-39170 - https://huntr.dev/bounties/e4cb9cd8-89cf-427c-8d2e-37ca40099bf2/
|
|
CVE-2021-39171 - https://github.com/node-saml/passport-saml/pull/595
|
|
CVE-2021-39172 - https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/
|
|
CVE-2021-39173 - https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/
|
|
CVE-2021-39174 - https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/
|
|
CVE-2021-39176 - https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-5rwj-j5m3-3chj
|
|
CVE-2021-3918 - https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9
|
|
CVE-2021-39189 - https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/
|
|
CVE-2021-39193 - https://github.com/paritytech/frontier/security/advisories/GHSA-hw4v-5x4h-c3xm
|
|
CVE-2021-3920 - https://huntr.dev/bounties/ab564760-90c6-4e1d-80c2-852f45034cd1
|
|
CVE-2021-39243 - http://seclists.org/fulldisclosure/2021/Aug/21
|
|
CVE-2021-39244 - https://seclists.org/fulldisclosure/2021/Aug/21
|
|
CVE-2021-39245 - https://seclists.org/fulldisclosure/2021/Aug/21
|
|
CVE-2021-39246 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-111.md
|
|
CVE-2021-39246 - https://sick.codes/sick-2021-111
|
|
CVE-2021-39249 - https://ssd-disclosure.com/ssd-advisory-ip-board-stored-xss-to-rce-chain/
|
|
CVE-2021-39250 - https://ssd-disclosure.com/ssd-advisory-ip-board-stored-xss-to-rce-chain/
|
|
CVE-2021-39251 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2021-39252 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2021-39253 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2021-39254 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2021-39255 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2021-39256 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2021-39257 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2021-39258 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2021-39259 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2021-39260 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2021-39261 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2021-39262 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2021-39263 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2021-39267 - https://thanhlocpanda.wordpress.com/2021/07/31/file-upload-bypass-suitecrm-7-11-18/
|
|
CVE-2021-39268 - https://thanhlocpanda.wordpress.com/2021/07/31/stored-xss-via-svg-on-suitecrm/
|
|
CVE-2021-3927 - https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
|
|
CVE-2021-39271 - http://packetstormsecurity.com/files/163989/BSCW-Server-Remote-Code-Execution.html
|
|
CVE-2021-39271 - https://seclists.org/fulldisclosure/2021/Aug/24
|
|
CVE-2021-39275 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-39275 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-39278 - http://packetstormsecurity.com/files/164014
|
|
CVE-2021-3928 - https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
|
|
CVE-2021-39280 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html
|
|
CVE-2021-39282 - http://lists.live555.com/pipermail/live-devel/2021-August/021970.html
|
|
CVE-2021-39283 - http://lists.live555.com/pipermail/live-devel/2021-August/021969.html
|
|
CVE-2021-39285 - https://github.com/pbgt/CVEs/blob/main/CVE-2021-39285.md
|
|
CVE-2021-39289 - http://seclists.org/fulldisclosure/2021/Aug/22
|
|
CVE-2021-39290 - https://seclists.org/fulldisclosure/2021/Aug/22
|
|
CVE-2021-39291 - https://seclists.org/fulldisclosure/2021/Aug/22
|
|
CVE-2021-39295 - https://github.com/google/security-research/security/advisories/GHSA-gg9x-v835-m48q
|
|
CVE-2021-39296 - https://github.com/google/security-research/security/advisories/GHSA-gg9x-v835-m48q
|
|
CVE-2021-39307 - https://research.nccgroup.com/2021/09/14/technical-advisory-pdftron-javascript-urls-allowed-in-webviewer-ui-cve-2021-39307/
|
|
CVE-2021-39307 - https://www.pdftron.com/webviewer/
|
|
CVE-2021-3931 - https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f
|
|
CVE-2021-39312 - http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html
|
|
CVE-2021-39316 - http://packetstormsecurity.com/files/165146/WordPress-DZS-Zoomsounds-6.45-Arbitrary-File-Read.html
|
|
CVE-2021-39320 - https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875
|
|
CVE-2021-39327 - http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html
|
|
CVE-2021-39327 - https://www.exploit-db.com/exploits/50382
|
|
CVE-2021-39352 - http://packetstormsecurity.com/files/165207/WordPress-Catch-Themes-Demo-Import-1.6.1-Shell-Upload.html
|
|
CVE-2021-39352 - http://packetstormsecurity.com/files/165463/WordPress-Catch-Themes-Demo-Import-Shell-Upload.html
|
|
CVE-2021-39352 - https://www.exploit-db.com/exploits/50580
|
|
CVE-2021-39363 - https://www.honeywell.com/us/en/product-security
|
|
CVE-2021-39364 - https://www.honeywell.com/us/en/product-security
|
|
CVE-2021-39369 - https://www.youtube.com/watch?v=7zC84TNpIxw
|
|
CVE-2021-39375 - https://diesec.home.blog/2021/08/24/philips-tasy-emr-3-06-sql-injection-cve-2021-39375cve-2021-39376/
|
|
CVE-2021-39376 - https://diesec.home.blog/2021/08/24/philips-tasy-emr-3-06-sql-injection-cve-2021-39375cve-2021-39376/
|
|
CVE-2021-3938 - https://huntr.dev/bounties/198a0d67-9189-4170-809b-0f8aea43b063
|
|
CVE-2021-39383 - https://github.com/wkeyuan/DWSurvey/issues/81
|
|
CVE-2021-3939 - http://packetstormsecurity.com/files/172848/Ubuntu-accountsservice-Double-Free-Memory-Corruption.html
|
|
CVE-2021-39428 - https://github.com/eyoucms/eyoucms/issues/14
|
|
CVE-2021-39432 - https://github.com/DIPlib/diplib/issues/80
|
|
CVE-2021-3944 - https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9
|
|
CVE-2021-3945 - https://huntr.dev/bounties/745f483c-70ed-441f-ab2e-7ac1305439a4
|
|
CVE-2021-39458 - https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39458
|
|
CVE-2021-39459 - https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39459
|
|
CVE-2021-39474 - https://saikotwolf.medium.com/f9ed24e14e51
|
|
CVE-2021-39480 - https://github.com/m4b/bingrep/issues/30
|
|
CVE-2021-39486 - https://www.navidkagalwalla.com/gila-cms-vulnerabilities
|
|
CVE-2021-39499 - https://github.com/eyoucms/eyoucms/issues/18
|
|
CVE-2021-3950 - https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e
|
|
CVE-2021-39501 - https://github.com/eyoucms/eyoucms/issues/17
|
|
CVE-2021-39503 - https://github.com/gaozhifeng/PHPMyWind/issues/15
|
|
CVE-2021-39509 - https://github.com/doudoudedi/main-DIR-816_A2_Command-injection
|
|
CVE-2021-39509 - https://github.com/doudoudedi/main-DIR-816_A2_Command-injection/blob/main/injection.md
|
|
CVE-2021-39509 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-39510 - https://github.com/doudoudedi/main-DIR-816_A1_Command-injection
|
|
CVE-2021-39510 - https://github.com/doudoudedi/main-DIR-816_A1_Command-injection/blob/main/injection_A1.md
|
|
CVE-2021-39510 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-39514 - https://github.com/thorfdbg/libjpeg/issues/36
|
|
CVE-2021-39515 - https://github.com/thorfdbg/libjpeg/issues/37
|
|
CVE-2021-39516 - https://github.com/thorfdbg/libjpeg/issues/42
|
|
CVE-2021-39517 - https://github.com/thorfdbg/libjpeg/issues/33
|
|
CVE-2021-39518 - https://github.com/thorfdbg/libjpeg/issues/35
|
|
CVE-2021-39519 - https://github.com/thorfdbg/libjpeg/issues/28
|
|
CVE-2021-39520 - https://github.com/thorfdbg/libjpeg/issues/34
|
|
CVE-2021-39521 - https://github.com/LibreDWG/libredwg/issues/262
|
|
CVE-2021-39522 - https://github.com/LibreDWG/libredwg/issues/255
|
|
CVE-2021-39523 - https://github.com/LibreDWG/libredwg/issues/251
|
|
CVE-2021-39525 - https://github.com/LibreDWG/libredwg/issues/261
|
|
CVE-2021-39527 - https://github.com/LibreDWG/libredwg/issues/252
|
|
CVE-2021-39528 - https://github.com/LibreDWG/libredwg/issues/256
|
|
CVE-2021-39530 - https://github.com/LibreDWG/libredwg/issues/258
|
|
CVE-2021-39531 - https://github.com/Juniper/libslax/issues/53
|
|
CVE-2021-39532 - https://github.com/Juniper/libslax/issues/50
|
|
CVE-2021-39533 - https://github.com/Juniper/libslax/issues/51
|
|
CVE-2021-39534 - https://github.com/Juniper/libslax/issues/52
|
|
CVE-2021-39535 - https://github.com/hfp/libxsmm/issues/398
|
|
CVE-2021-39536 - https://github.com/hfp/libxsmm/issues/402
|
|
CVE-2021-39537 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2021-39537 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2021-39537 - http://seclists.org/fulldisclosure/2022/Oct/45
|
|
CVE-2021-39537 - https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
|
|
CVE-2021-39538 - https://github.com/leonhad/pdftools/issues/4
|
|
CVE-2021-39539 - https://github.com/leonhad/pdftools/issues/6
|
|
CVE-2021-39540 - https://github.com/leonhad/pdftools/issues/2
|
|
CVE-2021-39541 - https://github.com/leonhad/pdftools/issues/3
|
|
CVE-2021-39542 - https://github.com/leonhad/pdftools/issues/5
|
|
CVE-2021-39543 - https://github.com/leonhad/pdftools/issues/1
|
|
CVE-2021-39544 - https://github.com/sahaRatul/sela/issues/25
|
|
CVE-2021-39545 - https://github.com/sahaRatul/sela/issues/31
|
|
CVE-2021-39546 - https://github.com/sahaRatul/sela/issues/29
|
|
CVE-2021-39547 - https://github.com/sahaRatul/sela/issues/32
|
|
CVE-2021-39548 - https://github.com/sahaRatul/sela/issues/28
|
|
CVE-2021-39549 - https://github.com/sahaRatul/sela/issues/27
|
|
CVE-2021-39550 - https://github.com/sahaRatul/sela/issues/30
|
|
CVE-2021-39551 - https://github.com/sahaRatul/sela/issues/26
|
|
CVE-2021-39552 - https://github.com/sahaRatul/sela/issues/23
|
|
CVE-2021-39553 - https://github.com/matthiaskramm/swftools/issues/103
|
|
CVE-2021-39554 - https://github.com/matthiaskramm/swftools/issues/100
|
|
CVE-2021-39555 - https://github.com/matthiaskramm/swftools/issues/99
|
|
CVE-2021-39556 - https://github.com/matthiaskramm/swftools/issues/105
|
|
CVE-2021-39557 - https://github.com/matthiaskramm/swftools/issues/97
|
|
CVE-2021-39558 - https://github.com/matthiaskramm/swftools/issues/106
|
|
CVE-2021-39559 - https://github.com/matthiaskramm/swftools/issues/101
|
|
CVE-2021-39561 - https://github.com/matthiaskramm/swftools/issues/102
|
|
CVE-2021-39562 - https://github.com/matthiaskramm/swftools/issues/98
|
|
CVE-2021-39563 - https://github.com/matthiaskramm/swftools/issues/115
|
|
CVE-2021-39564 - https://github.com/matthiaskramm/swftools/issues/116
|
|
CVE-2021-39569 - https://github.com/matthiaskramm/swftools/issues/114
|
|
CVE-2021-3957 - https://huntr.dev/bounties/5fa3098a-ba02-45e0-af56-645e34dbc691
|
|
CVE-2021-39574 - https://github.com/matthiaskramm/swftools/issues/124
|
|
CVE-2021-39575 - https://github.com/matthiaskramm/swftools/issues/128
|
|
CVE-2021-39577 - https://github.com/matthiaskramm/swftools/issues/121
|
|
CVE-2021-39579 - https://github.com/matthiaskramm/swftools/issues/125
|
|
CVE-2021-3958 - https://github.com/paradessia/cve/blob/main/Ipack-Scada-Automation.txt
|
|
CVE-2021-39582 - https://github.com/matthiaskramm/swftools/issues/122
|
|
CVE-2021-39583 - https://github.com/matthiaskramm/swftools/issues/136
|
|
CVE-2021-39584 - https://github.com/matthiaskramm/swftools/issues/130
|
|
CVE-2021-39585 - https://github.com/matthiaskramm/swftools/issues/133
|
|
CVE-2021-39587 - https://github.com/matthiaskramm/swftools/issues/129
|
|
CVE-2021-39588 - https://github.com/matthiaskramm/swftools/issues/131
|
|
CVE-2021-39589 - https://github.com/matthiaskramm/swftools/issues/132
|
|
CVE-2021-39590 - https://github.com/matthiaskramm/swftools/issues/137
|
|
CVE-2021-39591 - https://github.com/matthiaskramm/swftools/issues/135
|
|
CVE-2021-39592 - https://github.com/matthiaskramm/swftools/issues/138
|
|
CVE-2021-39593 - https://github.com/matthiaskramm/swftools/issues/139
|
|
CVE-2021-39594 - https://github.com/matthiaskramm/swftools/issues/142
|
|
CVE-2021-39595 - https://github.com/matthiaskramm/swftools/issues/141
|
|
CVE-2021-39596 - https://github.com/matthiaskramm/swftools/issues/146
|
|
CVE-2021-39597 - https://github.com/matthiaskramm/swftools/issues/143
|
|
CVE-2021-39598 - https://github.com/matthiaskramm/swftools/issues/145
|
|
CVE-2021-39599 - https://github.com/cbkhwx/cxuucmsv3/issues/7
|
|
CVE-2021-39608 - http://packetstormsecurity.com/files/164047/FlatCore-CMS-2.0.7-Remote-Code-Execution.html
|
|
CVE-2021-39608 - https://github.com/flatCore/flatCore-CMS/issues/52
|
|
CVE-2021-39609 - https://github.com/flatCore/flatCore-CMS/issues/53
|
|
CVE-2021-3961 - https://huntr.dev/bounties/5987aed5-6613-4937-8a3e-d48009b7da10
|
|
CVE-2021-39613 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-39613 - https://www.nussko.com/advisories/advisory-2021-08-01.txt
|
|
CVE-2021-39614 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-39614 - https://www.nussko.com/advisories/advisory-2021-08-01.txt
|
|
CVE-2021-39615 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-39615 - https://www.nussko.com/advisories/advisory-2021-08-02.txt
|
|
CVE-2021-3962 - https://github.com/ImageMagick/ImageMagick/issues/4446
|
|
CVE-2021-3963 - https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8
|
|
CVE-2021-3967 - https://huntr.dev/bounties/2928a625-0467-4a0a-b4e2-e27322786686
|
|
CVE-2021-3968 - https://huntr.dev/bounties/00d62924-a7b4-4a61-ba29-acab2eaa1528
|
|
CVE-2021-39713 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
|
|
CVE-2021-3973 - https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
|
|
CVE-2021-3974 - https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
|
|
CVE-2021-3976 - https://huntr.dev/bounties/0567048a-118c-42ec-9f94-b55533017406
|
|
CVE-2021-3977 - https://huntr.dev/bounties/99c4ed09-b66f-474a-bd74-eeccf9339fde
|
|
CVE-2021-3980 - https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac
|
|
CVE-2021-3983 - https://huntr.dev/bounties/c96f3480-dccf-4cc2-99a4-d2b3a7462413
|
|
CVE-2021-3984 - https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
|
|
CVE-2021-3985 - https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4
|
|
CVE-2021-39868 - https://gitlab.com/gitlab-org/gitlab/-/issues/24649
|
|
CVE-2021-39877 - https://gitlab.com/gitlab-org/gitlab/-/issues/300095
|
|
CVE-2021-39881 - https://gitlab.com/gitlab-org/gitlab/-/issues/26695
|
|
CVE-2021-3989 - https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5
|
|
CVE-2021-39892 - https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39892.json
|
|
CVE-2021-39892 - https://gitlab.com/gitlab-org/gitlab/-/issues/28440
|
|
CVE-2021-39895 - https://gitlab.com/gitlab-org/gitlab/-/issues/337824
|
|
CVE-2021-3990 - https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f
|
|
CVE-2021-39905 - https://gitlab.com/gitlab-org/gitlab/-/issues/28226
|
|
CVE-2021-39914 - https://gitlab.com/gitlab-org/gitlab/-/issues/289948
|
|
CVE-2021-3992 - https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93
|
|
CVE-2021-3993 - https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871
|
|
CVE-2021-3993 - https://huntr.dev/bounties/0aa84736-139b-4ae7-becf-604f7f60b1c9
|
|
CVE-2021-39936 - https://gitlab.com/gitlab-org/gitlab/-/issues/241767
|
|
CVE-2021-3994 - https://huntr.dev/bounties/be7f211d-4bfd-44fd-91e8-682329906fbd
|
|
CVE-2021-39946 - https://gitlab.com/gitlab-org/gitlab/-/issues/345657
|
|
CVE-2021-3995 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
|
|
CVE-2021-3996 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
|
|
CVE-2021-3998 - https://www.openwall.com/lists/oss-security/2022/01/24/4
|
|
CVE-2021-3999 - https://www.openwall.com/lists/oss-security/2022/01/24/4
|
|
CVE-2021-4000 - https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962
|
|
CVE-2021-4002 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea
|
|
CVE-2021-4002 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890
|
|
CVE-2021-4002 - https://www.openwall.com/lists/oss-security/2021/11/25/1
|
|
CVE-2021-4002 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-4005 - https://huntr.dev/bounties/bf4ef581-325a-492d-a710-14fcb53f00ff
|
|
CVE-2021-40085 - https://launchpad.net/bugs/1939733
|
|
CVE-2021-40091 - https://support.squaredup.com
|
|
CVE-2021-40091 - https://support.squaredup.com/hc/en-us/articles/4410656394129-CVE-2021-40091-SSRF-issue
|
|
CVE-2021-40092 - https://support.squaredup.com
|
|
CVE-2021-40092 - https://support.squaredup.com/hc/en-us/articles/4410635417233-CVE-2021-40092-Stored-cross-site-scripting-Image-tile-
|
|
CVE-2021-40093 - https://support.squaredup.com
|
|
CVE-2021-40093 - https://support.squaredup.com/hc/en-us/articles/4410635418257-CVE-2021-40093-Stored-cross-site-scripting-Action-Buttons-
|
|
CVE-2021-40094 - https://support.squaredup.com
|
|
CVE-2021-40094 - https://support.squaredup.com/hc/en-us/articles/4410656395537-CVE-2021-40094-DOM-based-stored-cross-site-scripting
|
|
CVE-2021-40095 - https://support.squaredup.com
|
|
CVE-2021-40095 - https://support.squaredup.com/hc/en-us/articles/4410635419153-CVE-2021-40095-Reading-arbitrary-files
|
|
CVE-2021-40096 - https://support.squaredup.com
|
|
CVE-2021-40096 - https://support.squaredup.com/hc/en-us/articles/4410656396817-CVE-2021-40096-Stored-cross-site-scripting-provider-configuration-
|
|
CVE-2021-40104 - https://hackerone.com/reports/1102088
|
|
CVE-2021-40142 - https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2021-40142.pdf
|
|
CVE-2021-40142 - https://opcfoundation.org/security-bulletins/
|
|
CVE-2021-40143 - https://support.sonatype.com/hc/en-us/articles/4405941762579
|
|
CVE-2021-40145 - https://github.com/libgd/libgd/issues/700
|
|
CVE-2021-40145 - https://github.com/libgd/libgd/pull/713
|
|
CVE-2021-40149 - http://packetstormsecurity.com/files/167407/Reolink-E1-Zoom-Camera-3.0.0.716-Private-Key-Disclosure.html
|
|
CVE-2021-4015 - https://huntr.dev/bounties/b698d445-602d-4701-961c-dffe6d3009b1
|
|
CVE-2021-40153 - https://github.com/plougher/squashfs-tools/issues/72
|
|
CVE-2021-40154 - https://github.com/Xen1thLabs-AE/CVE-2021-40154
|
|
CVE-2021-4017 - https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871
|
|
CVE-2021-4017 - https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd
|
|
CVE-2021-4018 - https://huntr.dev/bounties/c14395f6-bf0d-4b06-b4d1-b509d8a99b54
|
|
CVE-2021-40180 - https://arxiv.org/pdf/2205.15202.pdf
|
|
CVE-2021-40186 - https://appcheck-ng.com/dnn-cms-server-side-request-forgery-cve-2021-40186
|
|
CVE-2021-4019 - https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
|
|
CVE-2021-4020 - https://huntr.dev/bounties/9814baa8-7bdd-4e31-a132-d9d15653409e
|
|
CVE-2021-40212 - https://a-man-in-the-cookie.blogspot.com
|
|
CVE-2021-40212 - https://a-man-in-the-cookie.blogspot.com/2021/08/PotPlayer-Critical-Memory-Access-Violation-Vulnerability.html
|
|
CVE-2021-40219 - https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-40219
|
|
CVE-2021-40222 - https://github.com/asang17/CVE-2021-RCE
|
|
CVE-2021-4026 - https://huntr.dev/bounties/c6dfa80d-43e6-4b49-95af-cc031bb66b1d
|
|
CVE-2021-40279 - https://gist.github.com/aaaahuia/b99596c6de9bd6f60e0ddb7bf0bd13c4
|
|
CVE-2021-4028 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74
|
|
CVE-2021-40280 - https://gist.github.com/aaaahuia/1fd31c1ebcddfe4c95268fa4f31fc312
|
|
CVE-2021-40281 - https://gist.github.com/aaaahuia/583b062b686cdff27554e3c6fa5ac94e
|
|
CVE-2021-40282 - https://gist.github.com/aaaahuia/1343e3aa06b031ea621b5701cebcee3e
|
|
CVE-2021-40284 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-40285 - https://github.com/danpros/htmly/issues/462
|
|
CVE-2021-40292 - https://github.com/zyx0814/dzzoffice/issues/195
|
|
CVE-2021-40303 - https://www.exploit-db.com/exploits/50097
|
|
CVE-2021-40309 - https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md
|
|
CVE-2021-40309 - https://www.exploit-db.com/exploits/50249
|
|
CVE-2021-40310 - https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md
|
|
CVE-2021-40310 - https://www.youtube.com/watch?v=aPKPUDmmYpc
|
|
CVE-2021-4032 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7d8a19f9a056a05c5c509fa65af472a322abfee
|
|
CVE-2021-40326 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-4033 - https://huntr.dev/bounties/e05be1f7-d00c-4cfd-9390-ccd9d1c737b7
|
|
CVE-2021-40337 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
CVE-2021-40338 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
CVE-2021-40339 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
CVE-2021-4034 - http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html
|
|
CVE-2021-4034 - http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html
|
|
CVE-2021-4034 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-40340 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
CVE-2021-40352 - http://packetstormsecurity.com/files/164011/OpenEMR-6.0.0-Insecure-Direct-Object-Reference.html
|
|
CVE-2021-4037 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e
|
|
CVE-2021-4037 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848
|
|
CVE-2021-40371 - http://packetstormsecurity.com/files/164621/GridPro-Request-Management-For-Windows-Azure-Pack-2.0.7905-Directory-Traversal.html
|
|
CVE-2021-40371 - http://seclists.org/fulldisclosure/2021/Oct/33
|
|
CVE-2021-40376 - https://www.tuv.com/landingpage/en/vulnerability-disclosure/
|
|
CVE-2021-40378 - http://packetstormsecurity.com/files/164024/Compro-Technology-IP-Camera-Denial-Of-Service.html
|
|
CVE-2021-40379 - http://packetstormsecurity.com/files/164026/Compro-Technology-IP-Camera-RTSP-Stream-Disclosure.html
|
|
CVE-2021-40380 - http://packetstormsecurity.com/files/164027/Compro-Technology-IP-Camera-Credential-Disclosure.html
|
|
CVE-2021-40381 - http://packetstormsecurity.com/files/164031/Compro-Technology-IP-Camera-Stream-Disclosure.html
|
|
CVE-2021-40382 - http://packetstormsecurity.com/files/164032/Compro-Technology-IP-Camera-Screenshot-Disclosure.html
|
|
CVE-2021-40388 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1399
|
|
CVE-2021-40389 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1400
|
|
CVE-2021-4039 - http://packetstormsecurity.com/files/166752/Zyxel-NWA-1100-NH-Command-Injection.html
|
|
CVE-2021-40390 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1401
|
|
CVE-2021-40391 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1402
|
|
CVE-2021-40392 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1403
|
|
CVE-2021-40393 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404
|
|
CVE-2021-40394 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404
|
|
CVE-2021-40396 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1408
|
|
CVE-2021-40397 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1409
|
|
CVE-2021-40398 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1411
|
|
CVE-2021-40399 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1412
|
|
CVE-2021-40400 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1413
|
|
CVE-2021-40401 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1415
|
|
CVE-2021-40402 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1416
|
|
CVE-2021-40403 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1417
|
|
CVE-2021-40404 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1420
|
|
CVE-2021-40405 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1422
|
|
CVE-2021-40406 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1423
|
|
CVE-2021-40407 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424
|
|
CVE-2021-40408 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424
|
|
CVE-2021-40409 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424
|
|
CVE-2021-40410 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424
|
|
CVE-2021-40411 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424
|
|
CVE-2021-40412 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424
|
|
CVE-2021-40413 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425
|
|
CVE-2021-40414 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425
|
|
CVE-2021-40415 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425
|
|
CVE-2021-40416 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425
|
|
CVE-2021-40417 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1426
|
|
CVE-2021-40418 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1427
|
|
CVE-2021-40419 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1428
|
|
CVE-2021-40420 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1429
|
|
CVE-2021-40422 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1431
|
|
CVE-2021-40423 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1432
|
|
CVE-2021-40424 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1433
|
|
CVE-2021-40425 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1433
|
|
CVE-2021-40426 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1434
|
|
CVE-2021-4043 - https://huntr.dev/bounties/d7a534cb-df7a-48ba-8ce3-46b1551a9c47
|
|
CVE-2021-40438 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-40438 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-40444 - http://packetstormsecurity.com/files/164210/Microsoft-Windows-MSHTML-Overview.html
|
|
CVE-2021-40444 - http://packetstormsecurity.com/files/165214/Microsoft-Office-Word-MSHTML-Remote-Code-Execution.html
|
|
CVE-2021-40444 - http://packetstormsecurity.com/files/167317/Microsoft-Office-MSDT-Follina-Proof-Of-Concept.html
|
|
CVE-2021-40449 - http://packetstormsecurity.com/files/164926/Win32k-NtGdiResetDC-Use-After-Free-Local-Privilege-Escalation.html
|
|
CVE-2021-4045 - http://packetstormsecurity.com/files/168472/TP-Link-Tapo-c200-1.1.15-Remote-Code-Execution.html
|
|
CVE-2021-40476 - http://packetstormsecurity.com/files/164942/Microsoft-Windows-WSAQuerySocketSecurity-AppContainer-Privilege-Escalation.html
|
|
CVE-2021-4049 - https://huntr.dev/bounties/62408fa4-2c16-4fcd-8b34-41fcdccb779e
|
|
CVE-2021-40495 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983
|
|
CVE-2021-40496 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983
|
|
CVE-2021-40497 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983
|
|
CVE-2021-40498 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983
|
|
CVE-2021-40499 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983
|
|
CVE-2021-4050 - https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05
|
|
CVE-2021-40500 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983
|
|
CVE-2021-40509 - http://packetstormsecurity.com/files/164045/jforum-2.7.0-Cross-Site-Scripting.html
|
|
CVE-2021-40509 - http://seclists.org/fulldisclosure/2021/Sep/13
|
|
CVE-2021-40509 - https://lists.openwall.net/full-disclosure/2021/09/03/7
|
|
CVE-2021-40510 - https://www.cyberiskvision.com/advisory/
|
|
CVE-2021-40511 - https://www.cyberiskvision.com/advisory/
|
|
CVE-2021-40528 - https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
|
|
CVE-2021-40529 - https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
|
|
CVE-2021-40530 - https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
|
|
CVE-2021-40531 - https://jonpalmisc.com/2021/11/22/cve-2021-40531
|
|
CVE-2021-40539 - http://packetstormsecurity.com/files/165085/ManageEngine-ADSelfService-Plus-Authentication-Bypass-Code-Execution.html
|
|
CVE-2021-40539 - https://www.manageengine.com
|
|
CVE-2021-40540 - http://packetstormsecurity.com/files/164152/Ulfius-Web-Framework-Remote-Memory-Corruption.html
|
|
CVE-2021-40546 - https://github.com/doudoudedi/buffer_overflow/blob/main/Tenda%20AC6%20V4.0-Denial%20of%20Service%20Vulnerability.md
|
|
CVE-2021-40555 - https://github.com/flatCore/flatCore-CMS/issues/56
|
|
CVE-2021-40556 - https://x1ng.top/2021/10/14/ASUS%E6%A0%88%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/
|
|
CVE-2021-40559 - https://github.com/gpac/gpac/issues/1886
|
|
CVE-2021-40562 - https://github.com/gpac/gpac/issues/1901
|
|
CVE-2021-40563 - https://github.com/gpac/gpac/issues/1892
|
|
CVE-2021-40564 - https://github.com/gpac/gpac/issues/1898
|
|
CVE-2021-40565 - https://github.com/gpac/gpac/commit/893fb99b606eebfae46cde151846a980e689039b
|
|
CVE-2021-40565 - https://github.com/gpac/gpac/issues/1902
|
|
CVE-2021-40566 - https://github.com/gpac/gpac/issues/1887
|
|
CVE-2021-40567 - https://github.com/gpac/gpac/issues/1889
|
|
CVE-2021-40568 - https://github.com/gpac/gpac/issues/1900
|
|
CVE-2021-40569 - https://github.com/gpac/gpac/issues/1890
|
|
CVE-2021-4057 - http://packetstormsecurity.com/files/165486/Chrome-storage-BlobURLStoreImpl-Revoke-Heap-Use-After-Free.html
|
|
CVE-2021-40570 - https://github.com/gpac/gpac/commit/04dbf08bff4d61948bab80c3f9096ecc60c7f302
|
|
CVE-2021-40570 - https://github.com/gpac/gpac/issues/1899
|
|
CVE-2021-40571 - https://github.com/gpac/gpac/issues/1895
|
|
CVE-2021-40572 - https://github.com/gpac/gpac/issues/1893
|
|
CVE-2021-40573 - https://github.com/gpac/gpac/issues/1891
|
|
CVE-2021-40574 - https://github.com/gpac/gpac/issues/1897
|
|
CVE-2021-40575 - https://github.com/gpac/gpac/issues/1905
|
|
CVE-2021-40576 - https://github.com/gpac/gpac/issues/1904
|
|
CVE-2021-40577 - http://packetstormsecurity.com/files/165106/Online-Enrollment-Management-System-In-PHP-And-PayPal-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-40577 - https://medium.com/@J03KR/cve-2021-40577-ec96a831ba71
|
|
CVE-2021-40578 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Online-Enrollment-Management-System
|
|
CVE-2021-40595 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-03
|
|
CVE-2021-40596 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-07
|
|
CVE-2021-40606 - https://github.com/gpac/gpac/issues/1885
|
|
CVE-2021-40607 - https://github.com/gpac/gpac/issues/1879
|
|
CVE-2021-40608 - https://github.com/gpac/gpac/issues/1883
|
|
CVE-2021-40609 - https://github.com/gpac/gpac/issues/1894
|
|
CVE-2021-40617 - https://github.com/OS4ED/openSIS-Classic/issues/192
|
|
CVE-2021-40618 - https://github.com/OS4ED/openSIS-Classic/issues/193
|
|
CVE-2021-40639 - https://github.com/jflyfox/jfinal_cms/issues/27
|
|
CVE-2021-40644 - https://github.com/novysodope/VulReq/blob/main/oa_system
|
|
CVE-2021-40645 - https://github.com/novysodope/VulReq/blob/main/JFinalOA
|
|
CVE-2021-40651 - https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md
|
|
CVE-2021-40651 - https://www.exploit-db.com/exploits/50259
|
|
CVE-2021-40651 - https://youtu.be/wFwlbXANRCo
|
|
CVE-2021-40654 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-40655 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-40656 - https://github.com/libsixel/libsixel/issues/25
|
|
CVE-2021-40660 - https://github.com/javadelight/delight-nashorn-sandbox/issues/117
|
|
CVE-2021-40661 - https://sidsecure.au/blog/cve-2021-40661/?_sm_pdc=1&_sm_rid=MRRqb4KBDnjBMJk24b40LMS3SKqPMqb4KVn32Kr
|
|
CVE-2021-40662 - https://febinj.medium.com/cve-2021-40662-chamilo-lms-1-11-14-rce-5301bad245d7
|
|
CVE-2021-40663 - https://github.com/janbialostok/deep-assign/issues/1
|
|
CVE-2021-40669 - https://github.com/wuzhicms/wuzhicms/issues/196
|
|
CVE-2021-40670 - https://github.com/wuzhicms/wuzhicms/issues/197
|
|
CVE-2021-40674 - https://github.com/wuzhicms/wuzhicms/issues/198
|
|
CVE-2021-40680 - http://seclists.org/fulldisclosure/2022/Apr/39
|
|
CVE-2021-4069 - https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
|
|
CVE-2021-40690 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-40690 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-4070 - https://huntr.dev/bounties/8da19456-4d89-41ef-9781-a41efd6a1877
|
|
CVE-2021-4080 - https://huntr.dev/bounties/d7453360-baca-4e56-985f-481275fa38db
|
|
CVE-2021-40813 - https://www.exploit-db.com/exploits/50645
|
|
CVE-2021-40814 - https://www.getastra.com/blog/911/plugin-exploit/prestashops-customer-photo-gallery-module-vulnerable-to-sql-injection-attacks/
|
|
CVE-2021-4082 - https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092
|
|
CVE-2021-40822 - https://osgeo-org.atlassian.net/browse/GEOS-10229
|
|
CVE-2021-40822 - https://osgeo-org.atlassian.net/browse/GEOS-10229?focusedCommentId=83508
|
|
CVE-2021-40826 - https://voidsec.com/advisories/cve-2021-40826/
|
|
CVE-2021-40827 - https://voidsec.com/advisories/cve-2021-40827/
|
|
CVE-2021-40828 - https://github.com/aws/aws-iot-device-sdk-python-v2
|
|
CVE-2021-40829 - https://github.com/aws/aws-iot-device-sdk-python-v2
|
|
CVE-2021-4083 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9
|
|
CVE-2021-4083 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-40830 - https://github.com/aws/aws-iot-device-sdk-python-v2
|
|
CVE-2021-40831 - https://github.com/aws/aws-iot-device-sdk-python-v2
|
|
CVE-2021-40835 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories
|
|
CVE-2021-40836 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories
|
|
CVE-2021-40837 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories
|
|
CVE-2021-4084 - https://huntr.dev/bounties/dcb37f19-ba53-4498-b953-d21999279266
|
|
CVE-2021-40845 - http://packetstormsecurity.com/files/164149/Zenitel-AlphaCom-XE-Audio-Server-11.2.3.10-Shell-Upload.html
|
|
CVE-2021-40845 - http://packetstormsecurity.com/files/164160/Zenitel-AlphaCom-XE-Audio-Server-11.2.3.10-Shell-Upload.html
|
|
CVE-2021-40845 - https://github.com/ricardojoserf/CVE-2021-40845
|
|
CVE-2021-40845 - https://ricardojoserf.github.io/CVE-2021-40845/
|
|
CVE-2021-40847 - https://blog.grimm-co.com/2021/09/mama-always-told-me-not-to-trust.html
|
|
CVE-2021-40847 - https://kb.netgear.com/000064039/Security-Advisory-for-Remote-Code-Execution-on-Some-Routers-PSV-2021-0204
|
|
CVE-2021-40856 - http://packetstormsecurity.com/files/165162/Auerswald-COMfortel-1400-2600-3600-IP-2.8F-Authentication-Bypass.html
|
|
CVE-2021-40856 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
|
CVE-2021-40856 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-004/-auerswald-comfortel-1400-2600-3600-ip-authentication-bypass
|
|
CVE-2021-40857 - http://packetstormsecurity.com/files/165163/Auerswald-COMpact-8.0B-Privilege-Escalation.html
|
|
CVE-2021-40857 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-005
|
|
CVE-2021-40857 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
|
CVE-2021-40858 - http://packetstormsecurity.com/files/165166/Auerswald-COMpact-8.0B-Arbitrary-File-Disclosure.html
|
|
CVE-2021-40858 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-006
|
|
CVE-2021-40858 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
|
CVE-2021-40859 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
|
CVE-2021-40859 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-007/-auerswald-compact-multiple-backdoors
|
|
CVE-2021-40866 - https://gynvael.coldwind.pl/?id=740
|
|
CVE-2021-40867 - https://gynvael.coldwind.pl/?id=741
|
|
CVE-2021-40868 - http://packetstormsecurity.com/files/164255/Cloudron-6.2-Cross-Site-Scripting.html
|
|
CVE-2021-40868 - https://packetstormsecurity.com/files/164183/Cloudron-6.2-Cross-Site-Scripting.html
|
|
CVE-2021-40870 - http://packetstormsecurity.com/files/164461/Aviatrix-Controller-6.x-Path-Traversal-Code-Execution.html
|
|
CVE-2021-40870 - https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html#security-note-9-11-2021
|
|
CVE-2021-40870 - https://wearetradecraft.com/advisories/tc-2021-0002/
|
|
CVE-2021-40875 - http://packetstormsecurity.com/files/164270/Gurock-Testrail-7.2.0.3014-Improper-Access-Control.html
|
|
CVE-2021-40875 - https://github.com/SakuraSamuraii/derailed
|
|
CVE-2021-4088 - https://kc.mcafee.com/corporate/index?page=content&id=SB10376
|
|
CVE-2021-40888 - https://github.com/projectsend/projectsend/issues/995
|
|
CVE-2021-40889 - https://github.com/boiteasite/cmsuno/issues/19
|
|
CVE-2021-4089 - https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862
|
|
CVE-2021-40903 - https://packetstormsecurity.com/files/164048/Antminer-Monitor-0.5.0-Authentication-Bypass.html
|
|
CVE-2021-40903 - https://www.exploit-db.com/exploits/50267
|
|
CVE-2021-40904 - https://github.com/Edgarloyola/CVE-2021-40904
|
|
CVE-2021-40906 - https://github.com/Edgarloyola/CVE-2021-40906
|
|
CVE-2021-40907 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-08-09072021
|
|
CVE-2021-40908 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-09
|
|
CVE-2021-40909 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-10-09102021
|
|
CVE-2021-4092 - https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e
|
|
CVE-2021-40940 - https://github.com/monstra-cms/monstra/issues/471
|
|
CVE-2021-40943 - https://github.com/axiomatic-systems/Bento4/issues/643
|
|
CVE-2021-40960 - http://www.omrylmz.com/galera-webtemplate-1-0-directory-traversal-vulnerability-cve-2021-40960/
|
|
CVE-2021-40961 - https://github.com/beerpwn/CVE/blob/master/cms_made_simple_2021/sqli_order_by/CMS-MS-SQLi-report.md
|
|
CVE-2021-40961 - https://packetstormsecurity.com/files/161895/CMS-Made-Simple-2.2.15-SQL-Injection.html
|
|
CVE-2021-40961 - https://seclists.org/fulldisclosure/2021/Mar/49
|
|
CVE-2021-40961 - https://www.soteritsecurity.com/blog/2023/01/CMS-Made-Simple_CVE-2021-40961.html
|
|
CVE-2021-40964 - http://packetstormsecurity.com/files/166330/Tiny-File-Manager-2.4.6-Shell-Upload.html
|
|
CVE-2021-4097 - https://huntr.dev/bounties/d617ced7-be06-4e34-9db0-63d45c003a43
|
|
CVE-2021-40978 - https://github.com/nisdn/CVE-2021-40978
|
|
CVE-2021-40978 - https://github.com/nisdn/CVE-2021-40978/issues/1
|
|
CVE-2021-40985 - https://github.com/michaelrsweet/htmldoc/issues/444
|
|
CVE-2021-4103 - https://huntr.dev/bounties/67b980af-7357-4879-9448-a926c6474225
|
|
CVE-2021-41038 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=575924
|
|
CVE-2021-4104 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-4104 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-4104 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-41043 - https://github.com/the-tcpdump-group/tcpslice/issues/11
|
|
CVE-2021-41054 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41054
|
|
CVE-2021-41061 - https://github.com/RIOT-OS/RIOT/issues/16844
|
|
CVE-2021-41063 - https://www.xylem.com
|
|
CVE-2021-41063 - https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-aanderaa-psa-2021-003.pdf
|
|
CVE-2021-41065 - https://medium.com/@tomerp_77017/exploiting-listary-searching-your-way-to-system-privileges-8175af676c3e
|
|
CVE-2021-41066 - https://medium.com/@tomerp_77017/exploiting-listary-searching-your-way-to-system-privileges-8175af676c3e
|
|
CVE-2021-41067 - https://medium.com/@tomerp_77017/exploiting-listary-searching-your-way-to-system-privileges-8175af676c3e
|
|
CVE-2021-4107 - https://huntr.dev/bounties/1d124520-cf29-4539-a0f3-6d041af7b5a8
|
|
CVE-2021-41072 - https://github.com/plougher/squashfs-tools/issues/72#issuecomment-913833405
|
|
CVE-2021-41073 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16c8d2df7ec0eed31b7d3b61cb13206a7fb930cc
|
|
CVE-2021-4108 - https://huntr.dev/bounties/5069a037-040e-4d77-8526-846e65edfaf4
|
|
CVE-2021-41090 - https://github.com/grafana/agent/pull/1152
|
|
CVE-2021-41097 - https://github.com/aurelia/path/issues/44
|
|
CVE-2021-41099 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-4110 - https://huntr.dev/bounties/4ce5dc47-2512-4c87-8609-453adc8cad20
|
|
CVE-2021-4111 - https://huntr.dev/bounties/8afc8981-baff-4082-b640-be535b29eb9a
|
|
CVE-2021-41110 - https://www.fatalerrors.org/a/analysis-of-the-snakeyaml-deserialization-in-java-security.html
|
|
CVE-2021-41116 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/
|
|
CVE-2021-41131 - https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr
|
|
CVE-2021-41146 - https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430
|
|
CVE-2021-4115 - http://packetstormsecurity.com/files/172849/polkit-File-Descriptor-Exhaustion.html
|
|
CVE-2021-4115 - https://gitlab.freedesktop.org/polkit/polkit/-/issues/141
|
|
CVE-2021-4115 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-41150 - https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr
|
|
CVE-2021-4116 - https://huntr.dev/bounties/7561bae7-9053-4dc8-aa59-b71acfb1712c
|
|
CVE-2021-41164 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-41164 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-41164 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-41165 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-41165 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-41165 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-41168 - https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6
|
|
CVE-2021-41171 - https://www.exploit-db.com/docs/50436
|
|
CVE-2021-41172 - https://github.com/AntSword-Store/AS_Redis/issues/1
|
|
CVE-2021-41173 - https://github.com/ethereum/go-ethereum/pull/23801
|
|
CVE-2021-4118 - https://huntr.dev/bounties/31832f0c-e5bb-4552-a12c-542f81f111e6
|
|
CVE-2021-41182 - https://www.drupal.org/sa-contrib-2022-004
|
|
CVE-2021-41182 - https://www.drupal.org/sa-core-2022-002
|
|
CVE-2021-41182 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-41182 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-41183 - https://www.drupal.org/sa-contrib-2022-004
|
|
CVE-2021-41183 - https://www.drupal.org/sa-core-2022-001
|
|
CVE-2021-41183 - https://www.drupal.org/sa-core-2022-002
|
|
CVE-2021-41183 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-41183 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-41184 - https://www.drupal.org/sa-core-2022-001
|
|
CVE-2021-41184 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-41184 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-4119 - https://huntr.dev/bounties/135f2d7d-ab0b-4351-99b9-889efac46fca
|
|
CVE-2021-4121 - https://huntr.dev/bounties/6da878de-acdb-4b97-b9ff-9674c3f0881d
|
|
CVE-2021-4123 - https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba
|
|
CVE-2021-4124 - https://huntr.dev/bounties/a6ca142e-60aa-4d6f-b231-5d1bcd1b7190
|
|
CVE-2021-41245 - https://huntr.dev/bounties/0a39630d-f4b9-4468-86d8-aea3b02f91ae
|
|
CVE-2021-41249 - https://github.com/graphql/graphql-playground/commit/b8a956006835992f12c46b90384a79ab82bcadad
|
|
CVE-2021-41253 - https://huntr.dev/bounties/d2536d7d-36ce-4723-928c-98d1ee039784
|
|
CVE-2021-41256 - https://github.com/nextcloud/news-android/blob/master/security/GHSL-2021-1033_Nextcloud_News_for_Android.md
|
|
CVE-2021-41269 - https://github.com/jmrozanec/cron-utils/issues/461
|
|
CVE-2021-41282 - http://packetstormsecurity.com/files/166208/pfSense-2.5.2-Shell-Upload.html
|
|
CVE-2021-41282 - https://www.shielder.it/advisories/pfsense-remote-command-execution/
|
|
CVE-2021-41285 - https://github.com/VoidSec/Exploit-Development/blob/master/windows/x64/kernel/crucial_Ballistix_MOD_Utility_v.2.0.2.5/crucial_Ballistix_MOD_Utility_v.2.0.2.5_memory_dump_PoC.cpp
|
|
CVE-2021-41285 - https://voidsec.com/crucial-mod-utility-lpe-cve-2021-41285/
|
|
CVE-2021-41286 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-047.txt
|
|
CVE-2021-4130 - https://huntr.dev/bounties/ccf073cd-7f54-4d51-89f2-6b4a2e4ae81e
|
|
CVE-2021-41303 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-4131 - https://huntr.dev/bounties/52dfac87-4fd3-4dfb-83d2-d39916764d43
|
|
CVE-2021-41314 - https://gynvael.coldwind.pl/?id=742
|
|
CVE-2021-41318 - http://packetstormsecurity.com/files/164359/WhatsUpGold-21.0.3-Cross-Site-Scripting.html
|
|
CVE-2021-4132 - https://huntr.dev/bounties/7eb80e7c-bb7a-478d-9760-0ea2fa9dc0c2
|
|
CVE-2021-41322 - https://packetstormsecurity.com/files/140753/Polycom-VVX-Web-Interface-Privilege-Escalation.html
|
|
CVE-2021-41322 - https://support.polycom.com/content/support.html
|
|
CVE-2021-41323 - https://charonv.net/Pydio-Broken-Access-Control/
|
|
CVE-2021-41324 - https://charonv.net/Pydio-Broken-Access-Control/
|
|
CVE-2021-41325 - https://charonv.net/Pydio-Broken-Access-Control/
|
|
CVE-2021-4133 - https://github.com/keycloak/keycloak/issues/9247
|
|
CVE-2021-4133 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-41355 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-4136 - https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938
|
|
CVE-2021-4138 - https://bugzilla.mozilla.org/show_bug.cgi?id=1652612
|
|
CVE-2021-41381 - http://packetstormsecurity.com/files/164365/Payara-Micro-Community-5.2021.6-Directory-Traversal.html
|
|
CVE-2021-41381 - http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html
|
|
CVE-2021-41381 - http://seclists.org/fulldisclosure/2022/Nov/11
|
|
CVE-2021-41381 - https://github.com/Net-hunter121/CVE-2021-41381/blob/main/CVE:%202021-41381-POC
|
|
CVE-2021-41381 - https://www.exploit-db.com/exploits/50371
|
|
CVE-2021-41381 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-054.txt
|
|
CVE-2021-41382 - http://packetstormsecurity.com/files/164531/Plastic-SCM-10.0.16.5622-Improper-Access-Control.html
|
|
CVE-2021-41382 - http://packetstormsecurity.com/files/164531/Plastic-SCM-10.0.16.5622-Insecure-Direct-Object-Reference.html
|
|
CVE-2021-41388 - https://www.netskope.com/company/security-compliance-and-assurance/netskope-security-advisory-nskpsa-2021-002
|
|
CVE-2021-4139 - https://huntr.dev/bounties/6ec59e43-095f-4ba3-8b75-e92250da8e3a
|
|
CVE-2021-41390 - https://the-it-wonders.blogspot.com/2021/09/ericsson-ecm-enterprise-content_17.html
|
|
CVE-2021-41391 - https://the-it-wonders.blogspot.com/2021/09/ericsson-ecm-enterprise-content.html
|
|
CVE-2021-41393 - https://github.com/gravitational/teleport/releases/tag/v4.4.11
|
|
CVE-2021-41393 - https://github.com/gravitational/teleport/releases/tag/v5.2.4
|
|
CVE-2021-41393 - https://github.com/gravitational/teleport/releases/tag/v6.2.12
|
|
CVE-2021-41393 - https://github.com/gravitational/teleport/releases/tag/v7.1.1
|
|
CVE-2021-41394 - https://github.com/gravitational/teleport/releases/tag/v4.4.11
|
|
CVE-2021-41394 - https://github.com/gravitational/teleport/releases/tag/v5.2.4
|
|
CVE-2021-41394 - https://github.com/gravitational/teleport/releases/tag/v6.2.12
|
|
CVE-2021-41394 - https://github.com/gravitational/teleport/releases/tag/v7.1.1
|
|
CVE-2021-41395 - https://github.com/gravitational/teleport/releases/tag/v6.2.12
|
|
CVE-2021-41395 - https://github.com/gravitational/teleport/releases/tag/v7.1.1
|
|
CVE-2021-41413 - https://github.com/brackeen/ok-file-formats/issues/20
|
|
CVE-2021-41415 - https://github.com/youranreus/Subscription-Manager/issues/2
|
|
CVE-2021-41419 - https://gist.github.com/Meeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee/712ac36c8a08e2698e875169442a23a4
|
|
CVE-2021-41426 - https://youtu.be/HL73yOW7YWU?t=540
|
|
CVE-2021-41426 - https://youtu.be/WtcyIVImcwc
|
|
CVE-2021-41427 - https://youtu.be/CbWI-JQteRo
|
|
CVE-2021-41427 - https://youtu.be/HL73yOW7YWU?t=520
|
|
CVE-2021-4143 - https://huntr.dev/bounties/e67603e6-8497-4ab6-b93a-02c26407d443
|
|
CVE-2021-41441 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-41442 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-41445 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-41456 - https://github.com/gpac/gpac/issues/1911
|
|
CVE-2021-41458 - https://github.com/gpac/gpac/issues/1910
|
|
CVE-2021-41459 - https://github.com/gpac/gpac/issues/1912
|
|
CVE-2021-4146 - https://huntr.dev/bounties/47b37054-cafe-4f48-8b40-c86efc7fb760
|
|
CVE-2021-41461 - https://github.com/concrete5/concrete5-legacy/issues/2006
|
|
CVE-2021-41462 - https://github.com/concrete5/concrete5-legacy/issues/2006
|
|
CVE-2021-41463 - https://github.com/concrete5/concrete5-legacy/issues/2006
|
|
CVE-2021-41464 - https://github.com/concrete5/concrete5-legacy/issues/2006
|
|
CVE-2021-41465 - https://github.com/concrete5/concrete5-legacy/issues/2006
|
|
CVE-2021-41471 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-12-09162021
|
|
CVE-2021-41472 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/razormist
|
|
CVE-2021-41487 - https://www.exploit-db.com/exploits/48528
|
|
CVE-2021-41492 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41492
|
|
CVE-2021-41495 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-41496 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-41497 - https://github.com/RaRe-Technologies/bounter/issues/47
|
|
CVE-2021-41503 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-41504 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-41506 - https://github.com/Snawoot/hisilicon-dvr-telnet
|
|
CVE-2021-41506 - https://github.com/tothi/hs-dvr-telnet
|
|
CVE-2021-41506 - https://habr.com/en/post/486856/
|
|
CVE-2021-41511 - http://packetstormsecurity.com/files/164366/Lodging-Reservation-Management-System-1.0-SQL-Injection.html
|
|
CVE-2021-41511 - https://github.com/Ni7inSharma/CVE-2021-41511
|
|
CVE-2021-41511 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41511
|
|
CVE-2021-41511 - https://www.exploit-db.com/exploits/50372
|
|
CVE-2021-41524 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-41526 - http://seclists.org/fulldisclosure/2024/Apr/24
|
|
CVE-2021-4154 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b
|
|
CVE-2021-4155 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79
|
|
CVE-2021-41550 - https://leostream.com/wp-content/uploads/2018/11/Leostream_release_notes.pdf
|
|
CVE-2021-41550 - https://www.leostream.com/resource/leostream-connection-broker-9-0/
|
|
CVE-2021-41551 - https://leostream.com/wp-content/uploads/2018/11/Leostream_release_notes.pdf
|
|
CVE-2021-41551 - https://www.leostream.com/resource/leostream-connection-broker-9-0/
|
|
CVE-2021-41553 - https://www.gruppotim.it/redteam
|
|
CVE-2021-41554 - https://www.gruppotim.it/redteam
|
|
CVE-2021-41555 - https://www.gruppotim.it/redteam
|
|
CVE-2021-41556 - https://blog.sonarsource.com/squirrel-vm-sandbox-escape/
|
|
CVE-2021-41557 - http://packetstormsecurity.com/files/165278/Sofico-Miles-RIA-2020.2-Build-127964T-Cross-Site-Scripting.html
|
|
CVE-2021-41559 - https://github.com/silverstripe/silverstripe-framework/releases
|
|
CVE-2021-4156 - https://github.com/libsndfile/libsndfile/issues/731
|
|
CVE-2021-4157 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-4159 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd
|
|
CVE-2021-41591 - https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing
|
|
CVE-2021-41592 - https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing
|
|
CVE-2021-41593 - https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing
|
|
CVE-2021-41594 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
|
|
CVE-2021-41594 - https://www.rsa.com/en-us/company/vulnerability-response-policy
|
|
CVE-2021-4160 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-4160 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-41615 - https://github.com/trenta3/goahead-versions/blob/master/2.1.8/230165webs218.tar.gz?raw=true
|
|
CVE-2021-41617 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-41617 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-4162 - https://huntr.dev/bounties/e204a768-2129-4b6f-abad-e436309c7c32
|
|
CVE-2021-41634 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/
|
|
CVE-2021-41635 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/
|
|
CVE-2021-41636 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/
|
|
CVE-2021-41637 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/
|
|
CVE-2021-41638 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/
|
|
CVE-2021-41639 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/
|
|
CVE-2021-4164 - https://huntr.dev/bounties/2debace1-a0f3-45c1-95fa-9d0512680758
|
|
CVE-2021-41641 - https://github.com/denoland/deno/issues/12152
|
|
CVE-2021-41643 - https://www.exploit-db.com/exploits/50306
|
|
CVE-2021-41644 - https://www.exploit-db.com/exploits/50305
|
|
CVE-2021-41645 - https://www.exploit-db.com/exploits/50308
|
|
CVE-2021-41646 - https://www.exploit-db.com/exploits/50319
|
|
CVE-2021-41647 - http://packetstormsecurity.com/files/164422/Online-Food-Ordering-Web-App-SQL-Injection.html
|
|
CVE-2021-41647 - https://github.com/MobiusBinary/CVE-2021-41647
|
|
CVE-2021-41647 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41647
|
|
CVE-2021-41648 - http://packetstormsecurity.com/files/165036/PuneethReddyHC-Online-Shopping-System-Advanced-1.0-SQL-Injection.html
|
|
CVE-2021-41648 - https://github.com/MobiusBinary/CVE-2021-41648
|
|
CVE-2021-41648 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41648
|
|
CVE-2021-41649 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41649
|
|
CVE-2021-41651 - https://github.com/MobiusBinary/CVE-2021-41651/
|
|
CVE-2021-41653 - https://k4m1ll0.com/cve-2021-41653.html
|
|
CVE-2021-41654 - https://github.com/wuzhicms/wuzhicms/issues/198
|
|
CVE-2021-41657 - https://gist.github.com/rvismit/2b1a10a48104e01f575cc948da69df19
|
|
CVE-2021-41658 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-15-092121
|
|
CVE-2021-41659 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-16-092421
|
|
CVE-2021-4166 - https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
|
|
CVE-2021-41660 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-06-092421
|
|
CVE-2021-41663 - http://minicms.com
|
|
CVE-2021-41672 - https://github.com/advisto/peel-shopping/issues/5
|
|
CVE-2021-41674 - https://github.com/janikwehrli1/0dayHunt/blob/main/E-Negosyo-System-SQLi.txt
|
|
CVE-2021-41674 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41674
|
|
CVE-2021-41675 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41675
|
|
CVE-2021-41677 - https://github.com/OS4ED/openSIS-Classic/issues/202
|
|
CVE-2021-41678 - https://github.com/OS4ED/openSIS-Classic/issues/203
|
|
CVE-2021-41679 - https://github.com/OS4ED/openSIS-Classic/issues/204
|
|
CVE-2021-4169 - https://huntr.dev/bounties/91bbb411-6502-4dc1-8b59-b31f7d1c1f72
|
|
CVE-2021-41694 - https://www.chudamax.com/posts/multiple-vulnerabilities-in-belloo-dating-script/
|
|
CVE-2021-41695 - https://www.chudamax.com/posts/multiple-vulnerabilities-in-belloo-dating-script/
|
|
CVE-2021-41696 - https://www.chudamax.com/posts/multiple-vulnerabilities-in-belloo-dating-script/
|
|
CVE-2021-41697 - https://www.chudamax.com/posts/multiple-vulnerabilities-in-belloo-dating-script/
|
|
CVE-2021-4170 - https://huntr.dev/bounties/ff395101-e392-401d-ab4f-579c63fbf6a0
|
|
CVE-2021-4171 - https://huntr.dev/bounties/1117f439-133c-4563-afb2-6cd80607bd5c
|
|
CVE-2021-41715 - https://github.com/libsixel/libsixel/issues/27
|
|
CVE-2021-41716 - https://cvewalkthrough.com/cve-2021-41716-mahavitaran-android-application-account-take-over-via-otp-fixation/
|
|
CVE-2021-41729 - https://github.com/meiko-S/BaiCloud-cms/issues/3
|
|
CVE-2021-4173 - https://huntr.dev/bounties/a1b236b9-89fb-4ccf-9689-ba11b471e766
|
|
CVE-2021-41731 - http://packetstormsecurity.com/files/168384/News247-News-Magazine-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-41732 - https://github.com/zeek/zeek/issues/1798
|
|
CVE-2021-41738 - https://medium.com/@rootless724
|
|
CVE-2021-41739 - https://medium.com/@rootless724/artica-proxy-4-30-cyrus-events-php-rce-3aa2a868c695
|
|
CVE-2021-4175 - https://huntr.dev/bounties/8a7d16e0-9a46-4710-a029-c89c33c01528
|
|
CVE-2021-4176 - https://huntr.dev/bounties/8b531ae9-2d36-43ff-af33-4d81acfb2f27
|
|
CVE-2021-41765 - https://www.horizon3.ai/multiple-vulnerabilities-in-resourcespace/
|
|
CVE-2021-4177 - https://huntr.dev/bounties/ac641425-1c64-4874-95e7-c7805c72074e
|
|
CVE-2021-41771 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-41772 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-41773 - http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html
|
|
CVE-2021-41773 - http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html
|
|
CVE-2021-41773 - http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html
|
|
CVE-2021-41773 - http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html
|
|
CVE-2021-41773 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-41780 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-41781 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-41782 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-41783 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-41784 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-41785 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-4179 - https://huntr.dev/bounties/8df06513-c57d-4a55-9798-0a1f6c153535
|
|
CVE-2021-41794 - https://research.nccgroup.com/2021/10/06/technical-advisory-open5gs-stack-buffer-overflow-during-pfcp-session-establishment-on-upf-cve-2021-41794
|
|
CVE-2021-4181 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-4182 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-41821 - https://documentation.wazuh.com/current/release-notes/release_4_2_0.html
|
|
CVE-2021-41823 - https://pastebin.com/kpx9Nvbf
|
|
CVE-2021-41825 - https://0xy37.medium.com/my-first-cve-cve-2021-41825-verint-workforce-optimization-html-injection-6dd450e7f2af
|
|
CVE-2021-41826 - http://packetstormsecurity.com/files/164345/PlaceOS-1.2109.1-Open-Redirection.html
|
|
CVE-2021-41827 - https://medium.com/nestedif/vulnerability-disclosure-hardcoded-keys-password-zoho-r-a-p-318aa9bba2e
|
|
CVE-2021-41828 - https://medium.com/nestedif/vulnerability-disclosure-hardcoded-keys-password-zoho-r-a-p-318aa9bba2e
|
|
CVE-2021-4183 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-4184 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-41843 - http://packetstormsecurity.com/files/165301/OpenEMR-6.0.0-6.1.0-dev-SQL-Injection.html
|
|
CVE-2021-41843 - http://seclists.org/fulldisclosure/2021/Dec/38
|
|
CVE-2021-41843 - https://trovent.github.io/security-advisories/TRSA-2109-01/TRSA-2109-01.txt
|
|
CVE-2021-41843 - https://trovent.io/security-advisory-2109-01
|
|
CVE-2021-41847 - https://grant-rose.com/infinias-access-control-vulnerability/
|
|
CVE-2021-4185 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-41861 - https://pikabu.ru/story/konfidentsialnost_polzovateley_telegram_snova_narushena_predstaviteli_messendzhera_trebuyut_ne_raskryivat_podrobnostey_8511495
|
|
CVE-2021-41864 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12
|
|
CVE-2021-41867 - https://www.ihteam.net/advisory/onionshare/
|
|
CVE-2021-41868 - https://www.ihteam.net/advisory/onionshare/
|
|
CVE-2021-4187 - https://huntr.dev/bounties/a8bee03a-6e2e-43bf-bee3-4968c5386a2e
|
|
CVE-2021-41870 - https://f20.be/cves/socomec
|
|
CVE-2021-41871 - https://f20.be/cves/socomec
|
|
CVE-2021-41878 - http://packetstormsecurity.com/files/164519/i-Panel-Administration-System-2.0-Cross-Site-Scripting.html
|
|
CVE-2021-41878 - https://cybergroot.com/cve_submission/2021-1/XSS_i-Panel_2.0.html
|
|
CVE-2021-41878 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41878
|
|
CVE-2021-4188 - https://huntr.dev/bounties/78533fb9-f3e0-47c2-86dc-d1f96d5bea28
|
|
CVE-2021-4190 - https://gitlab.com/wireshark/wireshark/-/issues/17811
|
|
CVE-2021-41916 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/
|
|
CVE-2021-41917 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/
|
|
CVE-2021-41918 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/
|
|
CVE-2021-41919 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/
|
|
CVE-2021-4192 - https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
|
|
CVE-2021-41920 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/
|
|
CVE-2021-41928 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-17-092921
|
|
CVE-2021-41929 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-19-302021
|
|
CVE-2021-4193 - https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
|
|
CVE-2021-41930 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-18-09-2821
|
|
CVE-2021-41931 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-20-100121
|
|
CVE-2021-4194 - https://huntr.dev/bounties/0bc8b3f7-9057-4eb7-a989-24cd5689f114
|
|
CVE-2021-41943 - https://medium.com/@idema16/how-i-found-a-cve-in-logrhythm-cve-2021-41943-61cef1797cb
|
|
CVE-2021-41945 - https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571
|
|
CVE-2021-41946 - https://github.com/afaq1337/CVE-2021-41946
|
|
CVE-2021-41947 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41947
|
|
CVE-2021-41950 - https://www.horizon3.ai/multiple-vulnerabilities-in-resourcespace/
|
|
CVE-2021-41951 - https://www.horizon3.ai/multiple-vulnerabilities-in-resourcespace/
|
|
CVE-2021-41965 - https://www.alexbilz.com/post/2022-05-14-cve-2021-41965/
|
|
CVE-2021-4197 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-41973 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-41987 - https://teamt5.org/en/posts/vulnerability-mikrotik-cve-2021-41987/
|
|
CVE-2021-42006 - https://github.com/gpertea/gclib/issues/11
|
|
CVE-2021-42008 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13
|
|
CVE-2021-42008 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793
|
|
CVE-2021-42013 - http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html
|
|
CVE-2021-42013 - http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html
|
|
CVE-2021-42013 - http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html
|
|
CVE-2021-42013 - http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html
|
|
CVE-2021-42013 - http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html
|
|
CVE-2021-42013 - http://packetstormsecurity.com/files/167397/Apache-2.4.50-Remote-Code-Execution.html
|
|
CVE-2021-42013 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-42013 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-4203 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-42050 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-abantecart-e-commerce-platform/
|
|
CVE-2021-42051 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-abantecart-e-commerce-platform/
|
|
CVE-2021-42052 - https://nxnjz.net/2022/08/cve-2021-42052-full-disclosure/
|
|
CVE-2021-42053 - http://packetstormsecurity.com/files/164442/django-unicorn-0.35.3-Cross-Site-Scripting.html
|
|
CVE-2021-42056 - https://github.com/z00z00z00/Safenet_SAC_CVE-2021-42056
|
|
CVE-2021-42057 - https://github.com/blacksmithgu/obsidian-dataview/issues/615
|
|
CVE-2021-42063 - http://packetstormsecurity.com/files/166369/SAP-Knowledge-Warehouse-7.50-7.40-7.31-7.30-Cross-Site-Scripting.html
|
|
CVE-2021-42063 - http://seclists.org/fulldisclosure/2022/Mar/32
|
|
CVE-2021-42071 - https://www.exploit-db.com/exploits/50098
|
|
CVE-2021-42071 - https://www.swascan.com/security-advisory-visual-tools-dvr-cve-2021-42071/
|
|
CVE-2021-42077 - http://packetstormsecurity.com/files/164777/PHP-Event-Calendar-Lite-Edition-SQL-Injection.html
|
|
CVE-2021-42077 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-048.txt
|
|
CVE-2021-42078 - http://seclists.org/fulldisclosure/2021/Nov/24
|
|
CVE-2021-42078 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-049.txt
|
|
CVE-2021-4208 - https://wpscan.com/vulnerability/0cf63b44-f709-4ba4-be14-1eea934c2007
|
|
CVE-2021-4209 - https://gitlab.com/gnutls/gnutls/-/commit/3db352734472d851318944db13be73da61300568
|
|
CVE-2021-42099 - https://www.manageengine.com
|
|
CVE-2021-42110 - https://excellium-services.com/cert-xlm-advisory/CVE-2021-42110
|
|
CVE-2021-42112 - https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_limesurvey_-_cve-2021-42112.pdf
|
|
CVE-2021-42136 - http://packetstormsecurity.com/files/166723/REDCap-Cross-Site-Scripting.html
|
|
CVE-2021-42141 - http://packetstormsecurity.com/files/176625/Contiki-NG-tinyDTLS-Denial-Of-Service.html
|
|
CVE-2021-42165 - https://packetstormsecurity.com/files/164333/Mitrastar-GPT-2541GNAC-N1-Privilege-Escalation.html
|
|
CVE-2021-42165 - https://www.exploit-db.com/exploits/50351
|
|
CVE-2021-42168 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-17-092921
|
|
CVE-2021-42169 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-21-100521
|
|
CVE-2021-42169 - https://www.exploit-db.com/exploits/50403
|
|
CVE-2021-42171 - http://packetstormsecurity.com/files/166617/Zenario-CMS-9.0.54156-Remote-Code-Execution.html
|
|
CVE-2021-42171 - https://minhnq22.medium.com/file-upload-to-rce-on-zenario-9-0-54156-cms-fa05fcc6cf74
|
|
CVE-2021-42192 - https://www.exploit-db.com/exploits/50521
|
|
CVE-2021-42194 - https://github.com/eyoucms/eyoucms/issues/19
|
|
CVE-2021-42195 - https://github.com/matthiaskramm/swftools/issues/174
|
|
CVE-2021-42196 - https://github.com/matthiaskramm/swftools/issues/172
|
|
CVE-2021-42197 - https://github.com/matthiaskramm/swftools/issues/177
|
|
CVE-2021-42198 - https://github.com/matthiaskramm/swftools/issues/168
|
|
CVE-2021-42199 - https://github.com/matthiaskramm/swftools/issues/173
|
|
CVE-2021-42200 - https://github.com/matthiaskramm/swftools/issues/170
|
|
CVE-2021-42201 - https://github.com/matthiaskramm/swftools/issues/175
|
|
CVE-2021-42202 - https://github.com/matthiaskramm/swftools/issues/171
|
|
CVE-2021-42203 - https://github.com/matthiaskramm/swftools/issues/176
|
|
CVE-2021-42204 - https://github.com/matthiaskramm/swftools/issues/169
|
|
CVE-2021-4221 - https://bugzilla.mozilla.org/show_bug.cgi?id=1704422
|
|
CVE-2021-42216 - https://huntr.dev/bounties/419f4e8a-ee15-4f80-bcbf-5c83513515dd
|
|
CVE-2021-4222 - https://packetstormsecurity.com/files/160800/
|
|
CVE-2021-4222 - https://wpscan.com/vulnerability/6df5f5b1-f10b-488e-80b3-2c024bbb8c78
|
|
CVE-2021-42220 - https://packetstormsecurity.com/files/164544/Dolibarr-ERP-CRM-14.0.2-Cross-Site-Scripting-Privilege-Escalation.html
|
|
CVE-2021-42220 - https://truedigitalsecurity.com/advisory-summary-2021
|
|
CVE-2021-42223 - https://www.exploit-db.com/exploits/50386
|
|
CVE-2021-42224 - http://packetstormsecurity.com/files/164514/IFSC-Code-Finder-Project-1.0-SQL-Injection.html
|
|
CVE-2021-42224 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42224
|
|
CVE-2021-42224 - https://www.exploit-db.com/exploits/50391
|
|
CVE-2021-42230 - https://www.exploit-db.com/exploits/50295
|
|
CVE-2021-42237 - http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html
|
|
CVE-2021-42244 - https://github.com/PaquitoSoft/Notimoo/issues/3
|
|
CVE-2021-42245 - https://github.com/flatCore/flatCore-CMS/issues/69
|
|
CVE-2021-4225 - https://github.com/pang0lin/CVEproject/blob/main/wordpress_SP-Project_fileupload.md
|
|
CVE-2021-4225 - https://wpscan.com/vulnerability/bd1083d1-edcc-482e-a8a9-c8b6c8d417bd
|
|
CVE-2021-42252 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.6
|
|
CVE-2021-42252 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b49a0e69a7b1a68c8d3f64097d06dabb770fec96
|
|
CVE-2021-42258 - https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware
|
|
CVE-2021-4226 - https://wpscan.com/vulnerability/c0ed80c8-ebbf-4ed9-b02f-31660097c352
|
|
CVE-2021-4227 - https://wpscan.com/vulnerability/8d015eba-31dc-44cb-a051-4e95df782b75/
|
|
CVE-2021-4229 - https://github.com/faisalman/ua-parser-js/issues/536
|
|
CVE-2021-4229 - https://vuldb.com/?id.185453
|
|
CVE-2021-4232 - https://vuldb.com/?id.178254
|
|
CVE-2021-42321 - http://packetstormsecurity.com/files/166153/Microsoft-Exchange-Server-Remote-Code-Execution.html
|
|
CVE-2021-42321 - http://packetstormsecurity.com/files/168131/Microsoft-Exchange-Server-ChainedSerializationBinder-Remote-Code-Execution.html
|
|
CVE-2021-42325 - http://packetstormsecurity.com/files/164800/Froxlor-0.10.29.1-SQL-Injection.html
|
|
CVE-2021-42325 - https://www.exploit-db.com/exploits/50502
|
|
CVE-2021-42340 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-42340 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-42340 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-42343 - https://docs.dask.org/en/latest/changelog.html
|
|
CVE-2021-42362 - http://packetstormsecurity.com/files/165376/WordPress-Popular-Posts-5.3.2-Remote-Code-Execution.html
|
|
CVE-2021-42369 - https://www.imagicle.com/en/resources/download/
|
|
CVE-2021-42371 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-p2fq-9h5j-x6w5
|
|
CVE-2021-42372 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p
|
|
CVE-2021-42373 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
|
|
CVE-2021-42373 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
|
|
CVE-2021-42374 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
|
|
CVE-2021-42374 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
|
|
CVE-2021-42375 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
|
|
CVE-2021-42375 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
|
|
CVE-2021-42376 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
|
|
CVE-2021-42376 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
|
|
CVE-2021-42377 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
|
|
CVE-2021-42377 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
|
|
CVE-2021-42378 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
|
|
CVE-2021-42378 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
|
|
CVE-2021-42379 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
|
|
CVE-2021-42379 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
|
|
CVE-2021-42380 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
|
|
CVE-2021-42380 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
|
|
CVE-2021-42381 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
|
|
CVE-2021-42381 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
|
|
CVE-2021-42382 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
|
|
CVE-2021-42382 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
|
|
CVE-2021-42383 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
|
|
CVE-2021-42383 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
|
|
CVE-2021-42384 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
|
|
CVE-2021-42384 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
|
|
CVE-2021-42385 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
|
|
CVE-2021-42385 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
|
|
CVE-2021-42386 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
|
|
CVE-2021-42386 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
|
|
CVE-2021-42392 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-4240 - https://huntr.dev/bounties/2-phpservermon/phpservermon/
|
|
CVE-2021-4240 - https://vuldb.com/?id.213717
|
|
CVE-2021-4241 - https://github.com/phpservermon/phpservermon/commit/bb10a5f3c68527c58073258cb12446782d223bc3
|
|
CVE-2021-4241 - https://huntr.dev/bounties/1-phpservermon/phpservermon/
|
|
CVE-2021-4241 - https://vuldb.com/?id.213744
|
|
CVE-2021-4242 - https://blog.csdn.net/qq_44159028/article/details/114590267
|
|
CVE-2021-4242 - https://vuldb.com/?id.214592
|
|
CVE-2021-4243 - https://securitylab.github.com/advisories/GHSL-2021-1045_jQuery_MiniColors_Plugin/
|
|
CVE-2021-4245 - https://github.com/chbrown/rfc6902/pull/76
|
|
CVE-2021-4245 - https://vuldb.com/?id.215883
|
|
CVE-2021-4250 - https://vuldb.com/?id.216207
|
|
CVE-2021-42550 - http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html
|
|
CVE-2021-42550 - http://seclists.org/fulldisclosure/2022/Jul/11
|
|
CVE-2021-42551 - https://www.redguard.ch/advisories/netbiblio_webopac.txt
|
|
CVE-2021-42552 - https://it-sec.de/schwachstelle-in-archivista-dms/
|
|
CVE-2021-42556 - https://rasa.com
|
|
CVE-2021-42558 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42558-Multiple%20XSS-MITRE%20Caldera
|
|
CVE-2021-42559 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42559-Command%20Injection%20Via%20Configurations-MITRE%20Caldera
|
|
CVE-2021-42560 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42560-Unsafe%20XML%20Parsing-MITRE%20Caldera
|
|
CVE-2021-42561 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42561-Command%20Injection%20Via%20the%20Human%20Plugin-MITRE%20Caldera
|
|
CVE-2021-42562 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42562-Improper%20Access%20Control-MITRE%20Caldera
|
|
CVE-2021-42564 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-057.txt
|
|
CVE-2021-42565 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-001
|
|
CVE-2021-42566 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-001
|
|
CVE-2021-42568 - https://support.sonatype.com
|
|
CVE-2021-42568 - https://support.sonatype.com/hc/en-us/articles/4408801690515-CVE-2021-42568-Nexus-Repository-Manager-3-Incorrect-Access-Control-October-27-2021
|
|
CVE-2021-42575 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-42575 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-42580 - http://packetstormsecurity.com/files/164985/Online-Learning-System-2.0-Remote-Code-Execution.html
|
|
CVE-2021-42580 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-07
|
|
CVE-2021-42581 - https://github.com/ramda/ramda/pull/3192
|
|
CVE-2021-42584 - https://dev696.github.io/Writeup/
|
|
CVE-2021-42584 - https://github.com/convos-chat/convos/issues/623
|
|
CVE-2021-42585 - https://github.com/LibreDWG/libredwg/issues/351
|
|
CVE-2021-42586 - https://github.com/LibreDWG/libredwg/issues/350
|
|
CVE-2021-42612 - https://carteryagemann.com/halibut-case-study.html#poc-halibut-text-uaf
|
|
CVE-2021-42613 - https://carteryagemann.com/halibut-case-study.html#poc-halibut-winhelp-df
|
|
CVE-2021-42614 - https://carteryagemann.com/halibut-case-study.html#poc-halibut-info-uaf
|
|
CVE-2021-42627 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-42631 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html
|
|
CVE-2021-42631 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite
|
|
CVE-2021-42631 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite
|
|
CVE-2021-42633 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html
|
|
CVE-2021-42633 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite
|
|
CVE-2021-42633 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite
|
|
CVE-2021-42635 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html
|
|
CVE-2021-42635 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite
|
|
CVE-2021-42635 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite
|
|
CVE-2021-42637 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html
|
|
CVE-2021-42637 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite
|
|
CVE-2021-42637 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite
|
|
CVE-2021-42638 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html
|
|
CVE-2021-42638 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite
|
|
CVE-2021-42638 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite
|
|
CVE-2021-42639 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html
|
|
CVE-2021-42639 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite
|
|
CVE-2021-42639 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite
|
|
CVE-2021-4264 - https://vuldb.com/?id.216464
|
|
CVE-2021-42640 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html
|
|
CVE-2021-42640 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite
|
|
CVE-2021-42640 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite
|
|
CVE-2021-42641 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html
|
|
CVE-2021-42641 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite
|
|
CVE-2021-42641 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite
|
|
CVE-2021-42642 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html
|
|
CVE-2021-42642 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite
|
|
CVE-2021-42642 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite
|
|
CVE-2021-42643 - https://jdr2021.github.io/2021/10/14/CmsEasy_7.7.5_20211012%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E5%92%8C%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E/
|
|
CVE-2021-42644 - https://jdr2021.github.io/2021/10/14/CmsEasy_7.7.5_20211012%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E5%92%8C%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E/
|
|
CVE-2021-42646 - http://packetstormsecurity.com/files/167465/WSO2-Management-Console-XML-Injection.html
|
|
CVE-2021-42646 - https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1289/
|
|
CVE-2021-42659 - https://github.com/Lyc-heng/routers/blob/main/routers/stack4.md
|
|
CVE-2021-42662 - http://packetstormsecurity.com/files/164615/Online-Event-Booking-And-Reservation-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-42662 - https://github.com/TheHackingRabbi/CVE-2021-42662
|
|
CVE-2021-42662 - https://www.exploit-db.com/exploits/50450
|
|
CVE-2021-42663 - https://github.com/TheHackingRabbi/CVE-2021-42663
|
|
CVE-2021-42664 - http://packetstormsecurity.com/files/164618/Engineers-Online-Portal-1.0-SQL-Injection.html
|
|
CVE-2021-42664 - https://github.com/TheHackingRabbi/CVE-2021-42664
|
|
CVE-2021-42664 - https://www.exploit-db.com/exploits/50451
|
|
CVE-2021-42665 - https://github.com/TheHackingRabbi/CVE-2021-42665
|
|
CVE-2021-42665 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42665
|
|
CVE-2021-42665 - https://www.exploit-db.com/exploits/50452
|
|
CVE-2021-42666 - https://github.com/TheHackingRabbi/CVE-2021-42666
|
|
CVE-2021-42666 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-101321
|
|
CVE-2021-42666 - https://www.exploit-db.com/exploits/50453
|
|
CVE-2021-42667 - https://github.com/TheHackingRabbi/CVE-2021-42667
|
|
CVE-2021-42667 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42667
|
|
CVE-2021-42668 - https://github.com/TheHackingRabbi/CVE-2021-42668
|
|
CVE-2021-42668 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42668
|
|
CVE-2021-42669 - https://github.com/TheHackingRabbi/CVE-2021-42669
|
|
CVE-2021-42669 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42671
|
|
CVE-2021-42670 - https://github.com/TheHackingRabbi/CVE-2021-42670
|
|
CVE-2021-42670 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-101321
|
|
CVE-2021-42671 - https://github.com/TheHackingRabbi/CVE-2021-42671
|
|
CVE-2021-42671 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42671
|
|
CVE-2021-42681 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42682 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42683 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42685 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42686 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42687 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42688 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42697 - http://packetstormsecurity.com/files/167018/Akka-HTTP-10.1.14-Denial-Of-Service.html
|
|
CVE-2021-42715 - https://github.com/nothings/stb/issues/1224
|
|
CVE-2021-42716 - https://github.com/nothings/stb/issues/1166
|
|
CVE-2021-42716 - https://github.com/nothings/stb/issues/1225
|
|
CVE-2021-42717 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-4273 - https://vuldb.com/?id.216478
|
|
CVE-2021-42739 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-42750 - https://packetstormsecurity.com/files/167999/Thingsboard-3.3.1-Cross-Site-Scripting.html
|
|
CVE-2021-42751 - https://packetstormsecurity.com/files/167999/Thingsboard-3.3.1-Cross-Site-Scripting.html
|
|
CVE-2021-4276 - https://vuldb.com/?id.216746
|
|
CVE-2021-42770 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-r32j-xgg3-w2rw
|
|
CVE-2021-42771 - https://www.tenable.com/security/research/tra-2021-14
|
|
CVE-2021-42777 - http://burninatorsec.blogspot.com/2022/04/library-rce-object-chaining-cve-2021.html
|
|
CVE-2021-4279 - https://github.com/Starcounter-Jack/JSON-Patch/pull/262
|
|
CVE-2021-42794 - https://www.exploit-db.com/docs/english/17254-connection-string-parameter-pollution-attacks.pdf
|
|
CVE-2021-42840 - http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html
|
|
CVE-2021-42847 - http://packetstormsecurity.com/files/172258/ManageEngine-ADAudit-Plus-Remote-Code-Execution.html
|
|
CVE-2021-42859 - https://github.com/michaelrsweet/mxml/issues/286
|
|
CVE-2021-42860 - https://github.com/michaelrsweet/mxml/issues/286
|
|
CVE-2021-42863 - https://github.com/jerryscript-project/jerryscript/issues/4793
|
|
CVE-2021-42870 - https://github.com/xebd/accel-ppp/issues/158
|
|
CVE-2021-42872 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_NoticeUrl_rce4.md
|
|
CVE-2021-42875 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_ipdoamin_rce.md
|
|
CVE-2021-42877 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_reboot.md
|
|
CVE-2021-4288 - https://github.com/openmrs/openmrs-module-referenceapplication/pull/92
|
|
CVE-2021-42884 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_devicename_rce.md
|
|
CVE-2021-42885 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_devicemac_rce.md
|
|
CVE-2021-42886 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_exportsettings_leak.md
|
|
CVE-2021-42887 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_login_bypass.md
|
|
CVE-2021-42888 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_langtype_rce.md
|
|
CVE-2021-42889 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_getWiFiApConfig_leak.md
|
|
CVE-2021-4289 - https://issues.openmrs.org/browse/RA-1875
|
|
CVE-2021-42890 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_hosttime_rce.md
|
|
CVE-2021-42891 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_easywizard_leak.md
|
|
CVE-2021-42892 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_telnet_default.md
|
|
CVE-2021-42893 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_sysstatus_leak.md
|
|
CVE-2021-42897 - https://github.com/FeMiner/wms/issues/12
|
|
CVE-2021-42911 - https://gist.github.com/Cossack9989/e9c1c2d2e69b773ca4251acdd77f2835
|
|
CVE-2021-42912 - https://medium.com/@windsormoreira/fiberhome-an5506-os-command-injection-cve-2021-42912-10b64fd10ce2
|
|
CVE-2021-42913 - https://medium.com/@windsormoreira/samsung-printer-scx-6x55x-improper-access-control-cve-2021-42913-bd50837e5e9a
|
|
CVE-2021-42913 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-42917 - https://github.com/xbmc/xbmc/issues/20305
|
|
CVE-2021-42917 - https://github.com/xbmc/xbmc/pull/20306
|
|
CVE-2021-42940 - https://truedigitalsecurity.com/services/penetration-testing-services/advisory-summary-2.2022-cve-2021-42940
|
|
CVE-2021-42943 - https://devbrain.com.br/index.php/2022/05/16/cve-2021-42943/
|
|
CVE-2021-42950 - http://zepl.com
|
|
CVE-2021-42951 - http://algorithmia.com
|
|
CVE-2021-42952 - http://zepl.com
|
|
CVE-2021-42954 - https://medium.com/nestedif/vulnerability-disclosure-improper-filesystem-permission-misconfigured-acls-zoho-r-a-p-56e195464b51
|
|
CVE-2021-42955 - https://medium.com/nestedif/vulnerability-disclosure-improper-acl-unauthorized-password-reset-zoho-r-a-p-62efcdceb7a6
|
|
CVE-2021-42970 - https://github.com/cbkhwx/cxuucmsv3/issues/8
|
|
CVE-2021-42972 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42973 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42976 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42977 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42979 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42980 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42983 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42986 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42987 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42988 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42990 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42993 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42994 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-42996 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-43000 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-43002 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-43003 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-43006 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-43009 - http://packetstormsecurity.com/files/166619/Opmon-9.11-Cross-Site-Scripting.html
|
|
CVE-2021-43009 - https://www.exploit-db.com/exploits/50857
|
|
CVE-2021-43032 - https://github.com/SakuraSamuraii/CVE-2021-43032
|
|
CVE-2021-43033 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961
|
|
CVE-2021-43033 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1
|
|
CVE-2021-43033 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2
|
|
CVE-2021-43034 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961
|
|
CVE-2021-43034 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1
|
|
CVE-2021-43034 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2
|
|
CVE-2021-43035 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961
|
|
CVE-2021-43035 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1
|
|
CVE-2021-43035 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2
|
|
CVE-2021-43036 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961
|
|
CVE-2021-43036 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1
|
|
CVE-2021-43036 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2
|
|
CVE-2021-43037 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961
|
|
CVE-2021-43037 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1
|
|
CVE-2021-43037 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2
|
|
CVE-2021-43038 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961
|
|
CVE-2021-43038 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1
|
|
CVE-2021-43038 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2
|
|
CVE-2021-43039 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961
|
|
CVE-2021-43039 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1
|
|
CVE-2021-43039 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2
|
|
CVE-2021-43040 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961
|
|
CVE-2021-43040 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1
|
|
CVE-2021-43040 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2
|
|
CVE-2021-43041 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961
|
|
CVE-2021-43041 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1
|
|
CVE-2021-43041 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2
|
|
CVE-2021-43042 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961
|
|
CVE-2021-43042 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1
|
|
CVE-2021-43042 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2
|
|
CVE-2021-43043 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961
|
|
CVE-2021-43043 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1
|
|
CVE-2021-43043 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2
|
|
CVE-2021-43044 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961
|
|
CVE-2021-43044 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1
|
|
CVE-2021-43044 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2
|
|
CVE-2021-4305 - https://vuldb.com/?id.217448
|
|
CVE-2021-43056 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
|
|
CVE-2021-43057 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.8
|
|
CVE-2021-43057 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3727a8bac0a9e77c70820655fd8715523ba3db7
|
|
CVE-2021-43062 - http://packetstormsecurity.com/files/166055/Fortinet-Fortimail-7.0.1-Cross-Site-Scripting.html
|
|
CVE-2021-43065 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-8wx4-g5p9-348h
|
|
CVE-2021-4307 - https://github.com/Yomguithereal/baobab/pull/511
|
|
CVE-2021-4308 - https://github.com/WebPA/WebPA/commit/8836c4f549181e885a68e0e7ca561fdbcbd04bf0
|
|
CVE-2021-43091 - https://huntr.dev/bounties/07f245a7-ee9f-4b55-a0cc-13d5cb1be6e0/
|
|
CVE-2021-43094 - https://issues.openmrs.org/browse/TRUNK-6043
|
|
CVE-2021-43097 - https://github.com/diyhi/bbs/issues/51
|
|
CVE-2021-43098 - https://github.com/diyhi/bbs/issues/51
|
|
CVE-2021-43099 - https://github.com/diyhi/bbs/issues/51
|
|
CVE-2021-43100 - https://github.com/diyhi/bbs/issues/51
|
|
CVE-2021-43101 - https://github.com/diyhi/bbs/issues/51
|
|
CVE-2021-43102 - https://github.com/diyhi/bbs/issues/51
|
|
CVE-2021-43103 - https://github.com/diyhi/bbs/issues/51
|
|
CVE-2021-43109 - https://github.com/PuneethReddyHC/online-shopping-system/issues/17
|
|
CVE-2021-43110 - https://github.com/PuneethReddyHC/online-shopping-system/issues/17
|
|
CVE-2021-43113 - https://pastebin.com/BXnkY9YY
|
|
CVE-2021-43116 - http://packetstormsecurity.com/files/171638/Nacos-2.0.3-Access-Control.html
|
|
CVE-2021-43118 - https://gist.github.com/Cossack9989/6034c077f46e4f06d0992e9f2fae7f26
|
|
CVE-2021-43129 - https://github.com/Skotizo/CVE-2021-43129
|
|
CVE-2021-43130 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-43130
|
|
CVE-2021-43130 - https://www.exploit-db.com/exploits/50158
|
|
CVE-2021-43136 - http://packetstormsecurity.com/files/164930/FormaLMS-2.4.4-Authentication-Bypass.html
|
|
CVE-2021-43136 - https://blog.hacktivesecurity.com
|
|
CVE-2021-43136 - https://blog.hacktivesecurity.com/index.php/2021/10/05/cve-2021-43136-formalms-the-evil-default-value-that-leads-to-authentication-bypass/
|
|
CVE-2021-43137 - https://www.exploit-db.com/exploits/50461
|
|
CVE-2021-43140 - http://packetstormsecurity.com/files/164968/Simple-Subscription-Website-1.0-SQL-Injection.html
|
|
CVE-2021-43140 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-43140
|
|
CVE-2021-43141 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-43141
|
|
CVE-2021-43142 - https://novysodope.github.io/2021/10/29/64/
|
|
CVE-2021-4315 - https://vuldb.com/?id.219676
|
|
CVE-2021-43155 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/18
|
|
CVE-2021-43156 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/19
|
|
CVE-2021-43157 - https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/1
|
|
CVE-2021-43158 - https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/2
|
|
CVE-2021-43159 - http://ruijie.com
|
|
CVE-2021-43160 - http://ruijie.com
|
|
CVE-2021-43161 - http://ruijie.com
|
|
CVE-2021-43162 - http://ruijie.com
|
|
CVE-2021-43163 - http://ruijie.com
|
|
CVE-2021-43164 - http://packetstormsecurity.com/files/167099/Ruijie-Reyee-Mesh-Router-Remote-Code-Execution.html
|
|
CVE-2021-43164 - http://ruijie.com
|
|
CVE-2021-43257 - https://www.mantisbt.org/bugs/view.php?id=29130
|
|
CVE-2021-43267 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16
|
|
CVE-2021-4328 - https://hammerking.top/index.php/archives/104/
|
|
CVE-2021-43282 - https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/
|
|
CVE-2021-43283 - https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/
|
|
CVE-2021-43284 - https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/
|
|
CVE-2021-43286 - https://blog.sonarsource.com/gocd-vulnerability-chain
|
|
CVE-2021-43288 - https://blog.sonarsource.com/gocd-vulnerability-chain
|
|
CVE-2021-43289 - https://blog.sonarsource.com/gocd-vulnerability-chain
|
|
CVE-2021-43290 - https://blog.sonarsource.com/gocd-vulnerability-chain
|
|
CVE-2021-43293 - https://support.sonatype.com/hc/en-us/articles/4409326330003
|
|
CVE-2021-43306 - https://research.jfrog.com/vulnerabilities/jquery-validation-redos-xray-211348/
|
|
CVE-2021-43307 - https://research.jfrog.com/vulnerabilities/semver-regex-redos-xray-211349/
|
|
CVE-2021-43308 - https://research.jfrog.com/vulnerabilities/markdown-link-extractor-redos-xray-211350/
|
|
CVE-2021-43309 - https://research.jfrog.com/vulnerabilities/uri-template-lite-redos-xray-211351/
|
|
CVE-2021-43311 - https://github.com/upx/upx/issues/380
|
|
CVE-2021-43312 - https://github.com/upx/upx/issues/379
|
|
CVE-2021-43313 - https://github.com/upx/upx/issues/378
|
|
CVE-2021-43314 - https://github.com/upx/upx/issues/380
|
|
CVE-2021-43315 - https://github.com/upx/upx/issues/380
|
|
CVE-2021-43316 - https://github.com/upx/upx/issues/381
|
|
CVE-2021-43317 - https://github.com/upx/upx/issues/380
|
|
CVE-2021-43326 - http://packetstormsecurity.com/files/165449/Automox-Agent-32-Local-Privilege-Escalation.html
|
|
CVE-2021-43329 - https://cxsecurity.com/issue/WLB-2021110057
|
|
CVE-2021-43329 - https://packetstormsecurity.com/files/164947/Mumara-Classic-2.93-SQL-Injection.html
|
|
CVE-2021-43329 - https://packetstormsecurity.com/files/164947/mumaraclassic293-sql.txt
|
|
CVE-2021-43329 - https://vulners.com/zdt/1337DAY-ID-37036
|
|
CVE-2021-43329 - https://www.cyberdetails.org/2021/11/mumara-classic-293-sql-injection.html
|
|
CVE-2021-43329 - https://www.exploit-db.com/exploits/50518
|
|
CVE-2021-43329 - https://www.gen.net.uk/about-us/news/50-exploit-db/18335-webapps-mumara-classic-293-license-sql-injection-unauthenticated
|
|
CVE-2021-43334 - https://www.cygenta.co.uk/post/buddyboss
|
|
CVE-2021-43339 - https://www.exploit-db.com/exploits/50468
|
|
CVE-2021-43339 - https://www.exploit-db.com/exploits/50469
|
|
CVE-2021-43389 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
|
|
CVE-2021-43389 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
|
|
CVE-2021-43389 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-43395 - https://jgardner100.wordpress.com/2022/01/20/security-heads-up/
|
|
CVE-2021-43395 - https://kebe.com/blog/?p=505
|
|
CVE-2021-43395 - https://www.illumos.org/issues/14424
|
|
CVE-2021-43395 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-43396 - https://sourceware.org/bugzilla/show_bug.cgi?id=28524
|
|
CVE-2021-43396 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-43397 - http://packetstormsecurity.com/files/164997/LiquidFiles-3.5.13-Privilege-Escalation.html
|
|
CVE-2021-43399 - https://blog.inhq.net/posts/yubico-yubihsm-shell-vuln3/
|
|
CVE-2021-43405 - http://packetstormsecurity.com/files/164795/FusionPBX-4.5.29-Remote-Code-Execution.html
|
|
CVE-2021-43409 - https://appcheck-ng.com/wordpress-microsoft-office-365-azure-ad-login-persistent-cross-site-scripting/
|
|
CVE-2021-43409 - https://www.wpo365.com/change-log/
|
|
CVE-2021-43419 - https://www.youtube.com/watch?v=HJUj3PgH7Ag
|
|
CVE-2021-43429 - https://github.com/Seagate/cortx-s3server/issues/1037
|
|
CVE-2021-43436 - https://medium.com/@mayhem7999/cve-2021-43436-56dc43aeac81
|
|
CVE-2021-43437 - https://medium.com/@mayhem7999/cve-2021-43437-5c5e3b977e84
|
|
CVE-2021-43439 - https://medium.com/@mayhem7999/cve-2021-43439-79c8ff1801fc
|
|
CVE-2021-43440 - https://medium.com/@mayhem7999/cve-2021-43439-d04781bca6ce
|
|
CVE-2021-43441 - https://medium.com/@mayhem7999/cve-2021-43441-2fcc857cb6bb
|
|
CVE-2021-43442 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5688.php
|
|
CVE-2021-43444 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/
|
|
CVE-2021-43445 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/
|
|
CVE-2021-43446 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/
|
|
CVE-2021-43447 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/
|
|
CVE-2021-43448 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/
|
|
CVE-2021-43449 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/
|
|
CVE-2021-43451 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PHPGURUKUL/ANUJ%20KUMAR/Employee-Record-Management-System-SQL-Injection
|
|
CVE-2021-43451 - https://www.exploit-db.com/exploits/50467
|
|
CVE-2021-43453 - https://github.com/jerryscript-project/jerryscript/issues/4754
|
|
CVE-2021-43454 - https://www.exploit-db.com/exploits/49549
|
|
CVE-2021-43455 - https://www.exploit-db.com/exploits/49630
|
|
CVE-2021-43456 - https://www.exploit-db.com/exploits/49203
|
|
CVE-2021-43457 - https://www.exploit-db.com/exploits/49632
|
|
CVE-2021-43458 - https://www.exploit-db.com/exploits/49641
|
|
CVE-2021-43459 - https://www.exploit-db.com/exploits/49254
|
|
CVE-2021-43460 - https://www.exploit-db.com/exploits/49248
|
|
CVE-2021-43461 - https://www.exploit-db.com/exploits/49253
|
|
CVE-2021-43462 - https://www.exploit-db.com/exploits/49255
|
|
CVE-2021-43463 - https://www.exploit-db.com/exploits/49706
|
|
CVE-2021-43474 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-43481 - http://packetstormsecurity.com/files/167026/WebTareas-2.4-SQL-Injection.html
|
|
CVE-2021-43481 - https://behradtaher.dev/2021/11/05/Discovering-a-Blind-SQL-Injection-Whitebox-Approach/
|
|
CVE-2021-43484 - https://www.exploit-db.com/exploits/50094
|
|
CVE-2021-43492 - https://github.com/AlquistManager/alquist/issues/42
|
|
CVE-2021-43493 - https://github.com/cksgf/ServerManagement/issues/21
|
|
CVE-2021-43495 - https://github.com/AlquistManager/alquist/issues/43
|
|
CVE-2021-43496 - https://github.com/varun-suresh/Clustering/issues/12
|
|
CVE-2021-43498 - https://packetstormsecurity.com/files/157563/ATutor-LMS-2.2.4-Weak-Password-Reset-Hash.html
|
|
CVE-2021-43505 - https://raw.githubusercontent.com/Sentinal920/Findings/main/Simple%20Client%20Management%20System/xss.txt
|
|
CVE-2021-43506 - https://raw.githubusercontent.com/Sentinal920/Findings/main/Simple%20Client%20Management%20System/sql.txt
|
|
CVE-2021-43509 - https://github.com/r4hn1/Simple-Client-Management-System-Exploit/blob/main/CVE-2021-43509
|
|
CVE-2021-43509 - https://r4hn1.medium.com/journey-to-first-two-cve-by-rahul-kalnarayan-307e2e87ee26
|
|
CVE-2021-43510 - https://github.com/r4hn1/Simple-Client-Management-System-Exploit/blob/main/CVE-2021-43510
|
|
CVE-2021-43510 - https://r4hn1.medium.com/journey-to-first-two-cve-by-rahul-kalnarayan-307e2e87ee26
|
|
CVE-2021-43512 - https://medium.com/@janmejayaswainofficial/advisory-of-cve-2021-43512-5e54e6a93101
|
|
CVE-2021-43517 - https://habr.com/ru/post/486856/
|
|
CVE-2021-43527 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-43530 - https://bugzilla.mozilla.org/show_bug.cgi?id=1736886
|
|
CVE-2021-43532 - https://bugzilla.mozilla.org/show_bug.cgi?id=1719203
|
|
CVE-2021-43536 - https://bugzilla.mozilla.org/show_bug.cgi?id=1730120
|
|
CVE-2021-43537 - https://bugzilla.mozilla.org/show_bug.cgi?id=1738237
|
|
CVE-2021-43538 - https://bugzilla.mozilla.org/show_bug.cgi?id=1739091
|
|
CVE-2021-43540 - https://bugzilla.mozilla.org/show_bug.cgi?id=1636629
|
|
CVE-2021-43544 - https://bugzilla.mozilla.org/show_bug.cgi?id=1739934
|
|
CVE-2021-43566 - https://bugzilla.samba.org/show_bug.cgi?id=13979
|
|
CVE-2021-43566 - https://www.samba.org/samba/security/CVE-2021-43566.html
|
|
CVE-2021-43568 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/
|
|
CVE-2021-43569 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/
|
|
CVE-2021-43570 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/
|
|
CVE-2021-43571 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/
|
|
CVE-2021-43572 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/
|
|
CVE-2021-43574 - https://medium.com/@bhattronit96/cve-2021-43574-696041dcab9e
|
|
CVE-2021-43575 - https://github.com/robertguetzkow/ets5-password-recovery
|
|
CVE-2021-43579 - https://github.com/michaelrsweet/htmldoc/issues/453
|
|
CVE-2021-43579 - https://github.com/michaelrsweet/htmldoc/issues/456
|
|
CVE-2021-4360 - https://wpscan.com/vulnerability/5ddc0a9d-c081-4bef-aa87-3b10d037379c
|
|
CVE-2021-43609 - https://github.com/d5sec/CVE-2021-43609-POC
|
|
CVE-2021-43609 - https://www.linkedin.com/pulse/cve-2021-43609-write-up-division5-security-4lgwe
|
|
CVE-2021-43616 - https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0
|
|
CVE-2021-43628 - https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/2
|
|
CVE-2021-43629 - https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/3
|
|
CVE-2021-43630 - https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4
|
|
CVE-2021-43631 - https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/5
|
|
CVE-2021-43633 - https://medium.com/@shaunwhorton/how-i-found-two-different-xss-vulnerabilities-a491144e8494
|
|
CVE-2021-43637 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-43638 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
|
|
CVE-2021-43650 - https://www.exploit-db.com/exploits/50542
|
|
CVE-2021-43657 - https://github.com/c0n5n3d/CVE-2021-43657/blob/main/Info.txt
|
|
CVE-2021-43683 - https://github.com/HaschekSolutions/pictshare/issues/133
|
|
CVE-2021-43691 - https://github.com/toocool/tripexpress/issues/40
|
|
CVE-2021-43700 - https://github.com/gongwalker/ApiManager/issues/26
|
|
CVE-2021-43701 - http://packetstormsecurity.com/files/166535/CSZ-CMS-1.2.9-SQL-Injection.html
|
|
CVE-2021-43701 - https://github.com/cskaza/cszcms/issues/31
|
|
CVE-2021-43701 - https://www.exploit-db.com/exploits/50846
|
|
CVE-2021-43702 - https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch
|
|
CVE-2021-43708 - https://medium.com/@way2goraj/bypass-data-classification-labelling-tool-aa037ff86dee
|
|
CVE-2021-43711 - https://github.com/doudoudedi/ToTolink_EX200_Cmmand_Execute/blob/main/ToTolink%20EX200%20Comand%20Injection2.md
|
|
CVE-2021-43722 - https://github.com/luqiut/iot/blob/main/DIR-645%20Stack%20overflow.md
|
|
CVE-2021-43722 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-43724 - https://github.com/intelliants/subrion/issues/890
|
|
CVE-2021-43728 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990
|
|
CVE-2021-43729 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990
|
|
CVE-2021-43734 - https://github.com/kekingcn/kkFileView/issues/304
|
|
CVE-2021-43737 - https://github.com/hiliqi/xiaohuanxiong/issues/28
|
|
CVE-2021-43738 - https://github.com/hiliqi/xiaohuanxiong/issues/28
|
|
CVE-2021-43741 - https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-43741
|
|
CVE-2021-43742 - https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-43742
|
|
CVE-2021-4377 - https://wpscan.com/vulnerability/36afc442-9634-498e-961e-4c935880cd2b
|
|
CVE-2021-43778 - https://github.com/hansmach1ne/MyExploits/tree/main/Path%20Traversal%20in%20GLPI%20Barcode%20plugin
|
|
CVE-2021-43779 - https://github.com/hansmach1ne/MyExploits/tree/main/RCE_GLPI_addressing_plugin
|
|
CVE-2021-43797 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-43797 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-43798 - http://packetstormsecurity.com/files/165198/Grafana-Arbitrary-File-Reading.html
|
|
CVE-2021-43798 - http://packetstormsecurity.com/files/165221/Grafana-8.3.0-Directory-Traversal-Arbitrary-File-Read.html
|
|
CVE-2021-43802 - https://github.com/ether/etherpad-lite/releases/tag/1.8.16
|
|
CVE-2021-43809 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/
|
|
CVE-2021-43818 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-43818 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-43828 - https://huntr.dev/bounties/fe6248f1-603d-43df-816c-c75534a56f72
|
|
CVE-2021-43829 - https://huntr.dev/bounties/17324785-f83a-4058-ac40-03f2bfa16399/
|
|
CVE-2021-43837 - https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/
|
|
CVE-2021-43847 - https://huntr.dev/bounties/943dad83-f0ed-4c74-ba81-7dfce7ca0ef2/
|
|
CVE-2021-43857 - http://packetstormsecurity.com/files/165459/Gerapy-0.9.7-Remote-Code-Execution.html
|
|
CVE-2021-43859 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-43859 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-43862 - https://github.com/jcubic/jquery.terminal/issues/727
|
|
CVE-2021-43863 - https://github.com/nextcloud/android/security/advisories/GHSA-vjp2-f63v-w479
|
|
CVE-2021-43890 - https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-msix-protocol-handler-abused-in-malware-attacks/
|
|
CVE-2021-43893 - http://packetstormsecurity.com/files/165560/Microsoft-Windows-EFSRPC-Arbitrary-File-Upload-Privilege-Escalation.html
|
|
CVE-2021-43936 - http://packetstormsecurity.com/files/165252/WebHMI-4.0-Remote-Code-Execution.html
|
|
CVE-2021-43960 - https://www.surecloud.com/resources/blog/lorensbergs-connect2-cross-site-scripting
|
|
CVE-2021-43961 - https://support.sonatype.com/hc/en-us/articles/4412183372307
|
|
CVE-2021-43969 - https://www.assurainc.com/assura-announces-discovery-of-two-vulnerabilities-in-quicklert-for-digium-switchvox/amp-on/
|
|
CVE-2021-43970 - https://www.assurainc.com/assura-announces-discovery-of-two-vulnerabilities-in-quicklert-for-digium-switchvox/amp-on/
|
|
CVE-2021-43971 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md
|
|
CVE-2021-43972 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md
|
|
CVE-2021-43973 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md
|
|
CVE-2021-43974 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md
|
|
CVE-2021-43976 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-43979 - https://github.com/hkerma/opa-gatekeeper-concurrency-issue
|
|
CVE-2021-43991 - https://appcheck-ng.com/persistent-xss-kentico-cms/
|
|
CVE-2021-44032 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/POC_CVE-2021-44032_Kevin.md
|
|
CVE-2021-44033 - http://packetstormsecurity.com/files/165027/Ionic-Identity-Vault-5.0.4-PIN-Unlock-Lockout-Bypass.html
|
|
CVE-2021-44035 - https://www.wolterskluwer.com/en/solutions/teammate
|
|
CVE-2021-44036 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-059.txt
|
|
CVE-2021-44037 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-060.txt
|
|
CVE-2021-44041 - https://docs.uipath.com/robot/docs/release-notes-2021-10-4
|
|
CVE-2021-44041 - https://docs.uipath.com/robot/docs/uipath-assistant
|
|
CVE-2021-44042 - https://docs.uipath.com/robot/docs/release-notes-2021-10-4
|
|
CVE-2021-44042 - https://docs.uipath.com/robot/docs/uipath-assistant
|
|
CVE-2021-44043 - https://docs.uipath.com/apps/v2021.10/docs/2021-10-1
|
|
CVE-2021-44043 - https://docs.uipath.com/robot/docs/uipath-assistant
|
|
CVE-2021-44049 - https://hencohen10.medium.com/cyberark-endpoint-manager-local-privilege-escalation-cve-2021-44049-67cd5e62c3d2
|
|
CVE-2021-44076 - https://labs.nettitude.com/blog/cve-2021-44076-cross-site-scripting-xss-in-crushftp/
|
|
CVE-2021-44077 - http://packetstormsecurity.com/files/165400/ManageEngine-ServiceDesk-Plus-Remote-Code-Execution.html
|
|
CVE-2021-44080 - https://research.nccgroup.com/2022/05/24/technical-advisory-sercomm-h500s-authenticated-remote-command-execution-cve-2021-44080/
|
|
CVE-2021-44087 - https://www.exploit-db.com/exploits/50801
|
|
CVE-2021-44087 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/apsystem.zip
|
|
CVE-2021-44088 - https://www.exploit-db.com/exploits/50802
|
|
CVE-2021-44088 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/apsystem.zip
|
|
CVE-2021-44091 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Multi%20Restaurant%20Table%20Reservation%20System
|
|
CVE-2021-44092 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/code-projects/Pharmacy-Management
|
|
CVE-2021-44095 - https://medium.com/@shubhamvpandey/cve-2021-44095-481059d14470
|
|
CVE-2021-44097 - https://medium.com/@shubhamvpandey/cve-2021-44097-d51c11258571
|
|
CVE-2021-44098 - https://medium.com/@shubhamvpandey/cve-2021-44098-8dbaced8b854
|
|
CVE-2021-44103 - https://www.exploit-db.com/exploits/50521
|
|
CVE-2021-44108 - https://github.com/open5gs/open5gs/issues/1247
|
|
CVE-2021-44109 - https://github.com/open5gs/open5gs/issues/1247
|
|
CVE-2021-44111 - https://github.com/s-cart/s-cart/issues/102
|
|
CVE-2021-44114 - https://medium.com/@mayhem7999/cve-2021-44114-957145c1773
|
|
CVE-2021-44117 - https://github.com/warmachine-57/CVE-2021-44117/blob/main/CSRF%20in%20FuelCMS
|
|
CVE-2021-44127 - https://github.com/tgp-top/DAP-1360/blob/main/README.md
|
|
CVE-2021-44127 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-44142 - https://bugzilla.samba.org/show_bug.cgi?id=14914
|
|
CVE-2021-44151 - http://packetstormsecurity.com/files/165191/Reprise-License-Manager-14.2-Session-Hijacking.html
|
|
CVE-2021-44152 - http://packetstormsecurity.com/files/165186/Reprise-License-Manager-14.2-Unauthenticated-Password-Change.html
|
|
CVE-2021-44153 - http://packetstormsecurity.com/files/165194/Reprise-License-Manager-14.2-Remote-Binary-Execution.html
|
|
CVE-2021-44154 - http://packetstormsecurity.com/files/165193/Reprise-License-Manager-14.2-Buffer-Overflow.html
|
|
CVE-2021-44155 - http://packetstormsecurity.com/files/165182/Reprise-License-Manager-14.2-User-Enumeration.html
|
|
CVE-2021-44208 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html
|
|
CVE-2021-44209 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html
|
|
CVE-2021-44210 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html
|
|
CVE-2021-44211 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html
|
|
CVE-2021-44212 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html
|
|
CVE-2021-44213 - https://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html
|
|
CVE-2021-44223 - https://vavkamil.cz/2021/11/25/wordpress-plugin-confusion-update-can-get-you-pwned/
|
|
CVE-2021-44224 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-44224 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-44226 - http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html
|
|
CVE-2021-44226 - http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html
|
|
CVE-2021-44226 - http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html
|
|
CVE-2021-44226 - http://seclists.org/fulldisclosure/2022/Mar/51
|
|
CVE-2021-44226 - http://seclists.org/fulldisclosure/2023/Jan/26
|
|
CVE-2021-44226 - http://seclists.org/fulldisclosure/2023/Sep/6
|
|
CVE-2021-44226 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-058.txt
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html
|
|
CVE-2021-44228 - http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html
|
|
CVE-2021-44228 - http://seclists.org/fulldisclosure/2022/Dec/2
|
|
CVE-2021-44228 - http://seclists.org/fulldisclosure/2022/Jul/11
|
|
CVE-2021-44228 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228
|
|
CVE-2021-44228 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|
CVE-2021-44228 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-44228 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-44244 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Simple-Logistic-Hub-Parcels-Management
|
|
CVE-2021-44245 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/unyasoft/CTMS
|
|
CVE-2021-44249 - https://www.exploit-db.com/exploits/50429
|
|
CVE-2021-44255 - https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/
|
|
CVE-2021-44259 - https://github.com/zer0yu/CVE_Request/blob/master/WAVLINK/WAVLINK_AC1200_unauthorized_access_vulnerability_second.md
|
|
CVE-2021-44260 - https://github.com/zer0yu/CVE_Request/blob/master/WAVLINK/WAVLINK_AC1200_unauthorized_access_vulnerability_first.md
|
|
CVE-2021-44261 - https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_W104_unauthorized_access_vulnerability_first.md
|
|
CVE-2021-44262 - https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_W104_unauthorized_access_vulnerability_second.md
|
|
CVE-2021-44280 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44280
|
|
CVE-2021-44315 - https://github.com/abhiunix/Bus-Pass-Management-System-v1.0/blob/master/Directory%20listing/Report_Directory%20listing.pdf
|
|
CVE-2021-44315 - https://github.com/abhiunix/Bus-Pass-Management-System-v1.0/tree/master/Directory%20listing
|
|
CVE-2021-4432 - https://0day.today/exploit/description/36412
|
|
CVE-2021-4432 - https://packetstormsecurity.com/files/163104/PCMan-FTP-Server-2.0.7-Denial-Of-Service.html
|
|
CVE-2021-4432 - https://vuldb.com/?id.250719
|
|
CVE-2021-4433 - https://packetstormsecurity.com/files/163138/Sami-HTTP-Server-2.0-Denial-Of-Service.html
|
|
CVE-2021-44331 - https://github.com/ARM-software/astc-encoder/issues/294
|
|
CVE-2021-44334 - https://github.com/brackeen/ok-file-formats/issues/12
|
|
CVE-2021-44335 - https://github.com/brackeen/ok-file-formats/issues/17
|
|
CVE-2021-44339 - https://github.com/brackeen/ok-file-formats/issues/15
|
|
CVE-2021-4434 - https://packetstormsecurity.com/files/163680/WordPress-Social-Warfare-3.5.2-Remote-Code-Execution.html
|
|
CVE-2021-44340 - https://github.com/brackeen/ok-file-formats/issues/11
|
|
CVE-2021-44342 - https://github.com/brackeen/ok-file-formats/issues/19
|
|
CVE-2021-44343 - https://github.com/brackeen/ok-file-formats/issues/18
|
|
CVE-2021-44347 - https://github.com/yeyinshi/tuzicms/issues/7
|
|
CVE-2021-44348 - https://github.com/yeyinshi/tuzicms/issues/9
|
|
CVE-2021-44349 - https://github.com/yeyinshi/tuzicms/issues/8
|
|
CVE-2021-44352 - https://github.com/zhlu32/cve/blob/main/tenda/Tenda-ac15-buffer-overflow.md
|
|
CVE-2021-44354 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44355 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44356 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44357 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44358 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44359 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-4436 - https://wpscan.com/vulnerability/c46ecd0d-a132-4ad6-b936-8acde3a09282/
|
|
CVE-2021-44360 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44361 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44362 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44363 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44364 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44365 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44366 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44367 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44368 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44369 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44370 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44371 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44372 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44373 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44374 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44375 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44376 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44377 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44378 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44379 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44380 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44381 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44382 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44383 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44384 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44385 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44386 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44387 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44388 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44389 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44390 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44391 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44392 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44393 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44394 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44395 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44396 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44397 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44398 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44399 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44400 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44401 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44402 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44403 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44404 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44405 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44406 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44407 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44408 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44409 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44410 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44411 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44412 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44413 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44414 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44415 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44416 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44417 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44418 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44419 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
|
|
CVE-2021-44427 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/328
|
|
CVE-2021-44428 - https://www.exploit-db.com/exploits/50535
|
|
CVE-2021-44429 - https://packetstormsecurity.com/files/165058/Serva-4.4.0-TFTP-Remote-Buffer-Overflow.html
|
|
CVE-2021-44444 - http://packetstormsecurity.com/files/167317/Microsoft-Office-MSDT-Follina-Proof-Of-Concept.html
|
|
CVE-2021-44460 - https://github.com/odoo/odoo/issues/107685
|
|
CVE-2021-44479 - https://github.com/Xen1thLabs-AE/CVE-2021-40154
|
|
CVE-2021-44521 - https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/
|
|
CVE-2021-44529 - http://packetstormsecurity.com/files/166383/Ivanti-Endpoint-Manager-CSA-4.5-4.6-Remote-Code-Execution.html
|
|
CVE-2021-44529 - http://packetstormsecurity.com/files/170590/Ivanti-Cloud-Services-Appliance-CSA-Command-Injection.html
|
|
CVE-2021-44531 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-44531 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-44532 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-44532 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-44533 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-44533 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-44565 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/307
|
|
CVE-2021-44567 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/308
|
|
CVE-2021-44568 - https://github.com/openSUSE/libsolv/issues/425
|
|
CVE-2021-44568 - https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/resolve_dependencies-1940
|
|
CVE-2021-44568 - https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/resolve_dependencies-1995
|
|
CVE-2021-44586 - https://github.com/qinming99/dst-admin/issues/28
|
|
CVE-2021-44590 - https://github.com/libming/libming/issues/236
|
|
CVE-2021-44591 - https://github.com/libming/libming/issues/235
|
|
CVE-2021-44593 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44593
|
|
CVE-2021-44595 - http://packetstormsecurity.com/files/167036/Wondershare-Dr.Fone-12.0.7-Privilege-Escalation.html
|
|
CVE-2021-44595 - https://medium.com/@tomerp_77017/wondershell-a82372914f26
|
|
CVE-2021-44596 - http://packetstormsecurity.com/files/167035/Wondershare-Dr.Fone-12.0.7-Privilege-Escalation.html
|
|
CVE-2021-44596 - https://medium.com/@tomerp_77017/wondershell-a82372914f26
|
|
CVE-2021-44598 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44598
|
|
CVE-2021-44599 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Online-Enrollment-Management-System
|
|
CVE-2021-44600 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/MSMS
|
|
CVE-2021-44617 - http://packetstormsecurity.com/files/166285/Baixar-GLPI-Project-9.4.6-SQL-Injection.html
|
|
CVE-2021-44622 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/chkRegVeriRegister
|
|
CVE-2021-44623 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/chkResetVeriRegister
|
|
CVE-2021-44625 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/deviceInfoRegister
|
|
CVE-2021-44626 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/getRegVeriRegister
|
|
CVE-2021-44627 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/getResetVeriRegister
|
|
CVE-2021-44628 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/loginRegister
|
|
CVE-2021-44629 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/registerRegister
|
|
CVE-2021-44630 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/modifyAccPwdRegister
|
|
CVE-2021-44631 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/resetCloudPwdRegister
|
|
CVE-2021-44632 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/upgradeInfoRegister
|
|
CVE-2021-44648 - https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
|
|
CVE-2021-44648 - https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
|
|
CVE-2021-44649 - https://sahildhar.github.io/blogpost/Django-CMS-Reflected-XSS-Vulnerability/
|
|
CVE-2021-44651 - https://sahildhar.github.io/blogpost/Zoho-ManageEngine-CloudSecurityPlus-Remote-Code-Execution-via-Security-Misconfiguration/
|
|
CVE-2021-44653 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44653
|
|
CVE-2021-44653 - https://www.exploit-db.com/exploits/50561
|
|
CVE-2021-44655 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44655
|
|
CVE-2021-44655 - https://www.exploit-db.com/exploits/50560
|
|
CVE-2021-44657 - https://github.com/pallets/jinja/issues/549
|
|
CVE-2021-44657 - https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/
|
|
CVE-2021-44659 - https://youtu.be/WW_a3znugl0
|
|
CVE-2021-44663 - https://riklutz.nl/2021/10/30/unauthenticated-file-upload-to-remote-code-execution-in-xerte/
|
|
CVE-2021-44664 - http://packetstormsecurity.com/files/166182/Xerte-3.9-Remote-Code-Execution.html
|
|
CVE-2021-44664 - https://riklutz.nl/2021/11/03/authenticated-file-upload-to-remote-code-execution-in-xerte/
|
|
CVE-2021-44665 - http://packetstormsecurity.com/files/166181/Xerte-3.10.3-Directory-Traversal.html
|
|
CVE-2021-44676 - https://www.manageengine.com
|
|
CVE-2021-44684 - https://github.com/dwisiswant0/advisory/issues/5
|
|
CVE-2021-44685 - https://github.com/dwisiswant0/advisory/issues/3
|
|
CVE-2021-44686 - https://bugs.launchpad.net/calibre/+bug/1951979
|
|
CVE-2021-44686 - https://github.com/dwisiswant0/advisory/issues/18
|
|
CVE-2021-44692 - https://www.cygenta.co.uk/post/buddyboss
|
|
CVE-2021-44720 - https://kb.pulsesecure.net/?atype=sa
|
|
CVE-2021-44730 - http://www.openwall.com/lists/oss-security/2022/02/23/1
|
|
CVE-2021-44731 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
|
|
CVE-2021-44731 - http://www.openwall.com/lists/oss-security/2022/02/23/1
|
|
CVE-2021-44733 - https://github.com/pjlantz/optee-qemu/blob/main/README.md
|
|
CVE-2021-44790 - http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html
|
|
CVE-2021-44790 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-44790 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-44827 - https://Full-Disclosure.eu
|
|
CVE-2021-44827 - https://full-disclosure.eu/reports/2022/CVE-2021-44827-tplink-authenticated-remote-code-execution.html
|
|
CVE-2021-44829 - http://packetstormsecurity.com/files/165684/WebACMS-2.1.0-Cross-Site-Scripting.html
|
|
CVE-2021-44829 - http://seclists.org/fulldisclosure/2022/Jan/41
|
|
CVE-2021-44829 - https://blog.to.com/advisory-webacms-2-1-0-cross-site-scripting/
|
|
CVE-2021-44832 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|
CVE-2021-44832 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-44832 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-44832 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-44835 - https://gist.github.com/rntcruz23/199782fb65b7dc3c4492d168770b71e5
|
|
CVE-2021-44848 - http://packetstormsecurity.com/files/165327/Cibele-Thinfinity-VirtualUI-2.5.41.0-User-Enumeration.html
|
|
CVE-2021-44864 - https://github.com/zhlu32/cve/blob/main/tplink/wr886n/Tplink-wr886n-V3-Ping-DOS.md
|
|
CVE-2021-44868 - https://github.com/ming-soft/MCMS/issues/58
|
|
CVE-2021-44879 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
|
|
CVE-2021-44879 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f
|
|
CVE-2021-44880 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-44881 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-44882 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-44899 - https://voidsec.com
|
|
CVE-2021-44899 - https://voidsec.com/advisories/cve-2021-44899/
|
|
CVE-2021-44900 - https://voidsec.com
|
|
CVE-2021-44900 - https://voidsec.com/advisories/cve-2021-44900/
|
|
CVE-2021-44901 - https://voidsec.com
|
|
CVE-2021-44901 - https://voidsec.com/advisories/cve-2021-44901/
|
|
CVE-2021-44903 - https://voidsec.com
|
|
CVE-2021-44903 - https://voidsec.com/advisories/cve-2021-44903/
|
|
CVE-2021-44906 - https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip
|
|
CVE-2021-44906 - https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
|
|
CVE-2021-44908 - https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/sailsJS%20PoC.zip
|
|
CVE-2021-44908 - https://github.com/balderdashy/sails/issues/7209
|
|
CVE-2021-44915 - https://github.com/taogogo/taocms/issues/8
|
|
CVE-2021-44916 - http://packetstormsecurity.com/files/165502/Open-AudIT-Community-4.2.0-Cross-Site-Scripting.html
|
|
CVE-2021-44917 - https://sourceforge.net/p/gnuplot/bugs/2358/
|
|
CVE-2021-44918 - https://github.com/gpac/gpac/issues/1968
|
|
CVE-2021-44920 - https://github.com/gpac/gpac/issues/1957
|
|
CVE-2021-44921 - https://github.com/gpac/gpac/issues/1964
|
|
CVE-2021-44922 - https://github.com/gpac/gpac/issues/1969
|
|
CVE-2021-44924 - https://github.com/gpac/gpac/issues/1959
|
|
CVE-2021-44925 - https://github.com/gpac/gpac/issues/1967
|
|
CVE-2021-44942 - https://github.com/glFusion/glfusion/issues/486
|
|
CVE-2021-44956 - https://github.com/rockcarry/ffjpeg/issues/43
|
|
CVE-2021-44957 - https://github.com/rockcarry/ffjpeg/issues/44
|
|
CVE-2021-44964 - http://lua-users.org/lists/lua-l/2021-11/msg00186.html
|
|
CVE-2021-44965 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PHPGURUKUL/ANUJ%20KUMAR/Employee-Record-Management-System
|
|
CVE-2021-44966 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PHPGURUKUL/ANUJ%20KUMAR/Employee-Record-Management-System-SQL-Injection-Bypass-Authentication
|
|
CVE-2021-44967 - https://github.com/Y1LD1R1M-1337/Limesurvey-RCE
|
|
CVE-2021-44967 - https://www.exploit-db.com/exploits/50573
|
|
CVE-2021-44971 - https://github.com/21Gun5/my_cve/blob/main/tenda/bypass_auth.md
|
|
CVE-2021-44981 - https://websec.nl/blog/61b2b37a43a1155c848f3b08/websec%20finds%20critical%20vulnerabilities%20in%20popular%20media%20server
|
|
CVE-2021-44988 - https://github.com/jerryscript-project/jerryscript/issues/4890
|
|
CVE-2021-44988 - https://github.com/jerryscript-project/jerryscript/issues/4891
|
|
CVE-2021-44988 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-44992 - https://github.com/jerryscript-project/jerryscript/issues/4875
|
|
CVE-2021-44992 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-44993 - https://github.com/jerryscript-project/jerryscript/issues/4876
|
|
CVE-2021-44993 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-44994 - https://github.com/jerryscript-project/jerryscript/issues/4894
|
|
CVE-2021-44994 - https://github.com/jerryscript-project/jerryscript/issues/4895
|
|
CVE-2021-44994 - https://security.samsungmobile.com/securityUpdate.smsb
|
|
CVE-2021-45010 - http://packetstormsecurity.com/files/166330/Tiny-File-Manager-2.4.6-Shell-Upload.html
|
|
CVE-2021-45010 - https://febin0x4e4a.wordpress.com/2022/01/23/tiny-file-manager-authenticated-rce/
|
|
CVE-2021-45010 - https://github.com/febinrev/tinyfilemanager-2.4.3-exploit/raw/main/exploit.sh
|
|
CVE-2021-45010 - https://raw.githubusercontent.com/febinrev/tinyfilemanager-2.4.6-exploit/main/exploit.sh
|
|
CVE-2021-45010 - https://sploitus.com/exploit?id=1337DAY-ID-37364&utm_source=rss&utm_medium=rss
|
|
CVE-2021-45024 - http://asg.com
|
|
CVE-2021-45025 - http://asg.com
|
|
CVE-2021-45026 - http://asg.com
|
|
CVE-2021-45027 - https://www.exploit-db.com/exploits/50599
|
|
CVE-2021-45034 - http://packetstormsecurity.com/files/166743/Siemens-A8000-CP-8050-CP-8031-SICAM-WEB-Missing-File-Download-Missing-Authentication.html
|
|
CVE-2021-45034 - http://seclists.org/fulldisclosure/2022/Apr/20
|
|
CVE-2021-45041 - https://github.com/manuelz120/CVE-2021-45041
|
|
CVE-2021-45046 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|
CVE-2021-45046 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-45046 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-45046 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-45078 - https://sourceware.org/bugzilla/show_bug.cgi?id=28694
|
|
CVE-2021-45085 - https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
|
|
CVE-2021-45086 - https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
|
|
CVE-2021-45087 - https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
|
|
CVE-2021-45088 - https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
|
|
CVE-2021-45092 - http://packetstormsecurity.com/files/166068/Thinfinity-VirtualUI-2.5.41.0-IFRAME-Injection.html
|
|
CVE-2021-45098 - https://redmine.openinfosecfoundation.org/issues/4710
|
|
CVE-2021-45099 - https://gist.github.com/Eriner/0872628519f70556d2c26c83439a9f67
|
|
CVE-2021-45105 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|
CVE-2021-45105 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2021-45105 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2021-45105 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-45117 - https://www.youtube.com/watch?v=qv-RBdCaV4k
|
|
CVE-2021-45222 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview
|
|
CVE-2021-45222 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-029.txt
|
|
CVE-2021-45222 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053
|
|
CVE-2021-45223 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview
|
|
CVE-2021-45223 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-028.txt
|
|
CVE-2021-45223 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053
|
|
CVE-2021-45224 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview
|
|
CVE-2021-45224 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-053.txt
|
|
CVE-2021-45224 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053
|
|
CVE-2021-45225 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview
|
|
CVE-2021-45225 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-052.txt
|
|
CVE-2021-45225 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053
|
|
CVE-2021-45226 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview
|
|
CVE-2021-45226 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-051.txt
|
|
CVE-2021-45226 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053
|
|
CVE-2021-45227 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview
|
|
CVE-2021-45227 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-030.txt
|
|
CVE-2021-45228 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview
|
|
CVE-2021-45228 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-031.txt
|
|
CVE-2021-45252 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Forum-Discussion-System-1.0
|
|
CVE-2021-45253 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CSMS-1.0
|
|
CVE-2021-45255 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Video-Sharing-Website
|
|
CVE-2021-45256 - https://bugzilla.nasm.us/show_bug.cgi?id=3392789
|
|
CVE-2021-45257 - https://bugzilla.nasm.us/show_bug.cgi?id=3392790
|
|
CVE-2021-45258 - https://github.com/gpac/gpac/issues/1970
|
|
CVE-2021-45259 - https://github.com/gpac/gpac/issues/1986
|
|
CVE-2021-45260 - https://github.com/gpac/gpac/issues/1979
|
|
CVE-2021-45262 - https://github.com/gpac/gpac/issues/1980
|
|
CVE-2021-45263 - https://github.com/gpac/gpac/issues/1975
|
|
CVE-2021-45267 - https://github.com/gpac/gpac/issues/1965
|
|
CVE-2021-45268 - https://github.com/V1n1v131r4/CSRF-to-RCE-on-Backdrop-CMS
|
|
CVE-2021-45268 - https://www.exploit-db.com/exploits/50323
|
|
CVE-2021-45281 - https://websec.nl/blog/61b2b37a43a1155c848f3b08/developing%20a%20remote%20code%20execution%20exploit%20for%20a%20popular%20media%20box
|
|
CVE-2021-45286 - https://github.com/Boomingjacob/ZZCMS2021#readme
|
|
CVE-2021-45288 - https://github.com/gpac/gpac/issues/1956
|
|
CVE-2021-45289 - https://github.com/gpac/gpac/issues/1972
|
|
CVE-2021-45291 - https://github.com/gpac/gpac/issues/1955
|
|
CVE-2021-45292 - https://github.com/gpac/gpac/issues/1958
|
|
CVE-2021-45297 - https://github.com/gpac/gpac/issues/1973
|
|
CVE-2021-45330 - https://github.com/go-gitea/gitea/issues/4336
|
|
CVE-2021-45334 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-45334
|
|
CVE-2021-45334 - https://packetstormsecurity.com/files/165272/Online-Thesis-Archiving-System-1.0-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2021-45334 - https://www.exploit-db.com/exploits/50597
|
|
CVE-2021-45340 - https://github.com/libsixel/libsixel/issues/51
|
|
CVE-2021-45341 - https://github.com/LibreCAD/LibreCAD/issues/1462
|
|
CVE-2021-45342 - https://github.com/LibreCAD/LibreCAD/issues/1464
|
|
CVE-2021-45343 - https://github.com/LibreCAD/LibreCAD/issues/1468
|
|
CVE-2021-45345 - https://gist.github.com/0xHop/0d065694d56ac3943d8e8c239d80c63f
|
|
CVE-2021-45346 - https://github.com/guyinatuxedo/sqlite3_record_leaking
|
|
CVE-2021-45382 - https://github.com/doudoudedi/D-LINK_Command_Injection1/blob/main/D-LINK_Command_injection.md
|
|
CVE-2021-45385 - https://github.com/rockcarry/ffjpeg/issues/47
|
|
CVE-2021-45386 - https://github.com/appneta/tcpreplay/issues/687
|
|
CVE-2021-45387 - https://github.com/appneta/tcpreplay/issues/687
|
|
CVE-2021-45391 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/1
|
|
CVE-2021-45392 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/2
|
|
CVE-2021-45401 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/Tenda_AC10U_command_injection_RCE.pdf
|
|
CVE-2021-45406 - https://www.exploit-db.com/exploits/50659
|
|
CVE-2021-45411 - https://www.exploit-db.com/exploits/49877
|
|
CVE-2021-45414 - http://packetstormsecurity.com/files/166073/Datarobot-Remote-Code-Execution.html
|
|
CVE-2021-45416 - https://github.com/86x/CVE-2021-45416
|
|
CVE-2021-45417 - http://www.openwall.com/lists/oss-security/2022/01/20/3
|
|
CVE-2021-45417 - https://www.ipi.fi/pipermail/aide/2022-January/001713.html
|
|
CVE-2021-45417 - https://www.openwall.com/lists/oss-security/2022/01/20/3
|
|
CVE-2021-45418 - https://github.com/shortmore/trsh/blob/main/starcharge/CVE-2021-45418.md
|
|
CVE-2021-45419 - https://github.com/shortmore/trsh/blob/main/starcharge/CVE-2021-45419.md
|
|
CVE-2021-45420 - https://www.swascan.com/emerson
|
|
CVE-2021-45421 - https://www.swascan.com/emerson
|
|
CVE-2021-45422 - https://seclists.org/fulldisclosure/2022/Jan/31
|
|
CVE-2021-45422 - https://www.getinfosec.news/13202933/reprise-license-manager-142-reflected-cross-site-scripting#/
|
|
CVE-2021-45423 - https://github.com/merces/libpe/issues/35
|
|
CVE-2021-45425 - http://packetstormsecurity.com/files/165439/Safari-Montage-8.5-Cross-Site-Scripting.html
|
|
CVE-2021-45427 - https://drive.google.com/file/d/1iusYdheb62dom0DnvAzEiNR-e4EXSf2k/view?usp=sharing
|
|
CVE-2021-45428 - http://packetstormsecurity.com/files/167101/TLR-2005KSH-Arbitrary-File-Upload.html
|
|
CVE-2021-45429 - https://github.com/VirusTotal/yara/issues/1616
|
|
CVE-2021-45459 - https://github.com/dwisiswant0/advisory/issues/4
|
|
CVE-2021-45461 - https://community.freepbx.org/t/0-day-freepbx-exploit/80092
|
|
CVE-2021-45463 - https://gitlab.gnome.org/GNOME/gegl/-/issues/298
|
|
CVE-2021-45466 - https://octagon.net/blog/2022/01/22/cve-2021-45467-cwp-centos-web-panel-preauth-rce/
|
|
CVE-2021-45467 - https://octagon.net/blog/2022/01/22/cve-2021-45467-cwp-centos-web-panel-preauth-rce/
|
|
CVE-2021-45469 - https://bugzilla.kernel.org/show_bug.cgi?id=215235
|
|
CVE-2021-45480 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.11
|
|
CVE-2021-45481 - http://www.openwall.com/lists/oss-security/2022/01/21/2
|
|
CVE-2021-45482 - http://www.openwall.com/lists/oss-security/2022/01/21/2
|
|
CVE-2021-45483 - http://www.openwall.com/lists/oss-security/2022/01/21/2
|
|
CVE-2021-45485 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
|
|
CVE-2021-45485 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99
|
|
CVE-2021-45485 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-45486 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4
|
|
CVE-2021-45486 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-45490 - https://packetstormsecurity.com/files/166376/3CX-Client-Missing-TLS-Validation.html
|
|
CVE-2021-45491 - http://packetstormsecurity.com/files/166386/3CX-Phone-System-Cleartext-Passwords.html
|
|
CVE-2021-45494 - https://kb.netgear.com/000064160/Security-Advisory-for-Arbitrary-File-Read-on-Some-WiFi-Systems-PSV-2021-0044
|
|
CVE-2021-45496 - https://kb.netgear.com/000064529/Security-Advisory-for-Authentication-Bypass-on-D7000-PSV-2021-0060
|
|
CVE-2021-45497 - https://kb.netgear.com/000064533/Security-Advisory-for-Authentication-Bypass-on-D7000-PSV-2021-0155
|
|
CVE-2021-45499 - https://kb.netgear.com/000064445/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2019-0027
|
|
CVE-2021-45501 - https://kb.netgear.com/000064532/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2021-0154
|
|
CVE-2021-45502 - https://kb.netgear.com/000064126/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0473
|
|
CVE-2021-45507 - https://kb.netgear.com/000064131/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0487
|
|
CVE-2021-45515 - https://kb.netgear.com/000064484/Security-Advisory-for-Denial-of-Service-on-Some-Extenders-and-WiFi-Systems-PSV-2020-0286
|
|
CVE-2021-45516 - https://kb.netgear.com/000064060/Security-Advisory-for-Denial-of-Service-on-Some-Routers-and-WiFi-Systems-PSV-2019-0115
|
|
CVE-2021-45519 - https://kb.netgear.com/000064158/Security-Advisory-for-Denial-of-Service-on-XR1000-PSV-2021-0033
|
|
CVE-2021-45522 - https://kb.netgear.com/000064155/Security-Advisory-for-Hardcoded-Password-on-XR1000-PSV-2021-0030
|
|
CVE-2021-45523 - https://kb.netgear.com/000064442/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-R7000-PSV-2018-0418
|
|
CVE-2021-45524 - https://kb.netgear.com/000064123/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-R8000-PSV-2020-0315
|
|
CVE-2021-45526 - https://kb.netgear.com/000064446/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-and-Extenders-PSV-2019-0078
|
|
CVE-2021-45532 - https://kb.netgear.com/000064454/Security-Advisory-for-Post-Authentication-Command-Injection-on-R8000-PSV-2019-0294
|
|
CVE-2021-45535 - https://kb.netgear.com/000064457/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0052
|
|
CVE-2021-45536 - https://kb.netgear.com/000064080/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0056
|
|
CVE-2021-45541 - https://kb.netgear.com/000064479/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0246
|
|
CVE-2021-45542 - https://kb.netgear.com/000064143/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0540
|
|
CVE-2021-45543 - https://kb.netgear.com/000064517/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0541
|
|
CVE-2021-45563 - https://kb.netgear.com/000064084/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0066
|
|
CVE-2021-45567 - https://kb.netgear.com/000064089/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0075
|
|
CVE-2021-45570 - https://kb.netgear.com/000064092/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0078
|
|
CVE-2021-45574 - https://kb.netgear.com/000064096/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0082
|
|
CVE-2021-45576 - https://kb.netgear.com/000064098/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0084
|
|
CVE-2021-45577 - https://kb.netgear.com/000064099/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0085
|
|
CVE-2021-45587 - https://kb.netgear.com/000064109/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0095
|
|
CVE-2021-45590 - https://kb.netgear.com/000064112/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0098
|
|
CVE-2021-45591 - https://kb.netgear.com/000064113/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0099
|
|
CVE-2021-45594 - https://kb.netgear.com/000064475/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0183
|
|
CVE-2021-45607 - https://kb.netgear.com/000064531/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2021-0128
|
|
CVE-2021-45608 - https://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers/
|
|
CVE-2021-45612 - https://kb.netgear.com/000064515/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Router-Extenders-and-WiFi-Systems-PSV-2020-0524
|
|
CVE-2021-45615 - https://kb.netgear.com/000064514/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0521
|
|
CVE-2021-45619 - https://kb.netgear.com/000064492/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0435
|
|
CVE-2021-45631 - https://kb.netgear.com/000064136/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0504
|
|
CVE-2021-45638 - https://kb.netgear.com/000064496/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-PSV-2020-0464
|
|
CVE-2021-45643 - https://kb.netgear.com/000064159/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-PSV-2021-0035
|
|
CVE-2021-45653 - https://kb.netgear.com/000064163/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-WiFi-Systems-PSV-2021-0047
|
|
CVE-2021-45657 - https://kb.netgear.com/000064067/Security-Advisory-for-Server-Side-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2019-0141
|
|
CVE-2021-45658 - https://kb.netgear.com/000064062/Security-Advisory-for-Server-Side-Injection-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2019-0125
|
|
CVE-2021-45659 - https://kb.netgear.com/000064063/Security-Advisory-for-Server-Side-Injection-on-Some-WiFi-Systems-PSV-2019-0126
|
|
CVE-2021-45664 - https://kb.netgear.com/000064076/Security-Advisory-for-Stored-Cross-Site-Scripting-on-R7000-PSV-2020-0011
|
|
CVE-2021-45667 - https://kb.netgear.com/000064481/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Router-Extenders-and-WiFi-Systems-PSV-2020-0256
|
|
CVE-2021-45670 - https://kb.netgear.com/000064480/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0255
|
|
CVE-2021-45679 - https://kb.netgear.com/000064528/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Routers-PSV-2021-0043
|
|
CVE-2021-45760 - https://github.com/gpac/gpac/issues/1966
|
|
CVE-2021-45761 - https://github.com/Boyan-MILANOV/ropium/issues/32
|
|
CVE-2021-45762 - https://github.com/gpac/gpac/issues/1978
|
|
CVE-2021-45763 - https://github.com/gpac/gpac/issues/1974
|
|
CVE-2021-45764 - https://github.com/gpac/gpac/issues/1971
|
|
CVE-2021-45767 - https://github.com/gpac/gpac/issues/1982
|
|
CVE-2021-45769 - https://github.com/mz-automation/libiec61850/issues/368
|
|
CVE-2021-45783 - http://packetstormsecurity.com/files/167016/Bookeen-Notea-BK_R_1.0.5_20210608-Directory-Traversal.html
|
|
CVE-2021-45786 - https://github.com/magicblack/maccms10/issues/747
|
|
CVE-2021-45802 - https://gist.github.com/P0cas/5aa55f62781364a750ac4a4d47f319fa#file-cve-2021-45802-md
|
|
CVE-2021-45803 - https://gist.github.com/P0cas/5aa55f62781364a750ac4a4d47f319fa#cve-2021-45803
|
|
CVE-2021-45811 - https://members.backbox.org/osticket-sql-injection/
|
|
CVE-2021-45812 - https://drive.google.com/drive/folders/18YCKzFnS5CZRmzgcwc8g7jvLpmqgy68B?usp=sharing
|
|
CVE-2021-45814 - http://packetstormsecurity.com/files/165438/Nettmp-NNT-5.1-SQL-Injection.html
|
|
CVE-2021-45821 - https://emaragkos.gr/infosec-adventures/xbtit-3-1-sql-njection/
|
|
CVE-2021-45821 - https://github.com/btiteam/xbtit-3.1/issues/6
|
|
CVE-2021-45822 - https://emaragkos.gr/infosec-adventures/xbtit-3-1-xss-stored-amp-reflected/
|
|
CVE-2021-45822 - https://github.com/btiteam/xbtit-3.1/issues/7
|
|
CVE-2021-45829 - https://github.com/HDFGroup/hdf5/issues/1317
|
|
CVE-2021-45830 - https://github.com/HDFGroup/hdf5/issues/1314
|
|
CVE-2021-45832 - https://github.com/HDFGroup/hdf5/issues/1315
|
|
CVE-2021-45833 - https://github.com/HDFGroup/hdf5/issues/1313
|
|
CVE-2021-45835 - https://www.exploit-db.com/exploits/50623
|
|
CVE-2021-45837 - http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html
|
|
CVE-2021-45839 - http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html
|
|
CVE-2021-45841 - http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html
|
|
CVE-2021-45843 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/glfusion/XSS-Reflected
|
|
CVE-2021-45844 - https://forum.freecadweb.org/viewtopic.php?t=64733
|
|
CVE-2021-45844 - https://tracker.freecad.org/view.php?id=4809
|
|
CVE-2021-45846 - https://github.com/slic3r/Slic3r/issues/5117
|
|
CVE-2021-45847 - https://github.com/slic3r/Slic3r/issues/5118
|
|
CVE-2021-45847 - https://github.com/slic3r/Slic3r/issues/5119
|
|
CVE-2021-45847 - https://github.com/slic3r/Slic3r/issues/5120
|
|
CVE-2021-45851 - https://www.youtube.com/watch?v=JE1Kcq3iJpc
|
|
CVE-2021-45856 - https://packetstormsecurity.com/files/165392/Accu-Time-Systems-MAXIMUS-1.0-Buffer-Overflow-Denial-Of-Service.html
|
|
CVE-2021-45860 - https://github.com/justdan96/tsMuxer/issues/510
|
|
CVE-2021-45861 - https://github.com/justdan96/tsMuxer/issues/478
|
|
CVE-2021-45863 - https://github.com/justdan96/tsMuxer/issues/509
|
|
CVE-2021-45864 - https://github.com/justdan96/tsMuxer/issues/476
|
|
CVE-2021-45868 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3
|
|
CVE-2021-45868 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050
|
|
CVE-2021-45868 - https://www.openwall.com/lists/oss-security/2022/03/17/1
|
|
CVE-2021-45868 - https://www.openwall.com/lists/oss-security/2022/03/17/2
|
|
CVE-2021-45876 - https://github.com/delikely/advisory/tree/main/GARO
|
|
CVE-2021-45877 - https://github.com/delikely/advisory/tree/main/GARO
|
|
CVE-2021-45878 - https://github.com/delikely/advisory/tree/main/GARO
|
|
CVE-2021-45884 - https://github.com/brave/brave-core/pull/10742
|
|
CVE-2021-45885 - https://advisories.stormshield.eu
|
|
CVE-2021-45885 - https://advisories.stormshield.eu/2021-069/
|
|
CVE-2021-45886 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-080.txt
|
|
CVE-2021-45887 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-077.txt
|
|
CVE-2021-45888 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-079.txt
|
|
CVE-2021-45889 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-078.txt
|
|
CVE-2021-45891 - https://syss.de
|
|
CVE-2021-45891 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-063.txt
|
|
CVE-2021-45892 - https://syss.de
|
|
CVE-2021-45892 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-064.txt
|
|
CVE-2021-45893 - https://syss.de
|
|
CVE-2021-45893 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-065.txt
|
|
CVE-2021-45894 - https://syss.de
|
|
CVE-2021-45894 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-066.txt
|
|
CVE-2021-45897 - https://github.com/manuelz120/CVE-2021-45897
|
|
CVE-2021-45901 - http://packetstormsecurity.com/files/165989/ServiceNow-Orlando-Username-Enumeration.html
|
|
CVE-2021-45901 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/servicenow-username-enumeration-vulnerability-cve-2021-45901/
|
|
CVE-2021-45901 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/
|
|
CVE-2021-45904 - https://bugs.openwrt.org/index.php?do=details&task_id=4199
|
|
CVE-2021-45905 - https://bugs.openwrt.org/index.php?do=details&task_id=4199
|
|
CVE-2021-45906 - https://bugs.openwrt.org/index.php?do=details&task_id=4199
|
|
CVE-2021-45907 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002669
|
|
CVE-2021-45908 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002669
|
|
CVE-2021-45909 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002668
|
|
CVE-2021-45910 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002667
|
|
CVE-2021-45911 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002687
|
|
CVE-2021-45919 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/from-stored-xss-to-rce-using-beef-and-elfinder-cve-2021-45919/
|
|
CVE-2021-45935 - https://github.com/osamu620/OpenHTJ2K
|
|
CVE-2021-45943 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2021-45966 - https://tutorialboy24.blogspot.com/2022/03/the-story-of-3-bugs-that-lead-to.html
|
|
CVE-2021-45967 - https://tutorialboy24.blogspot.com/2022/03/the-story-of-3-bugs-that-lead-to.html
|
|
CVE-2021-45968 - https://tutorialboy24.blogspot.com/2022/03/the-story-of-3-bugs-that-lead-to.html
|
|
CVE-2021-45972 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002739
|
|
CVE-2021-45978 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-45979 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-45980 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2021-45998 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46005 - https://www.exploit-db.com/exploits/49546
|
|
CVE-2021-46006 - https://hackmd.io/vS-OfUEzSqqKh8e1PKce5A
|
|
CVE-2021-46007 - https://hackmd.io/t_nRWxS2Q2O7GV2E5BhQMg
|
|
CVE-2021-46008 - https://hackmd.io/ZkeEB-VvRiWBS53rFKG8DQ
|
|
CVE-2021-46009 - https://hackmd.io/-riYp6Q-ReCx-dKKWFBTLg
|
|
CVE-2021-46010 - https://hackmd.io/Ynwm8NnQSiK0xm7QKuNteg
|
|
CVE-2021-46013 - https://www.exploit-db.com/exploits/50587
|
|
CVE-2021-46019 - https://lists.gnu.org/archive/html/bug-recutils/2021-12/msg00009.html
|
|
CVE-2021-46020 - https://github.com/mruby/mruby/issues/5613
|
|
CVE-2021-46021 - https://lists.gnu.org/archive/html/bug-recutils/2021-12/msg00008.html
|
|
CVE-2021-46022 - https://lists.gnu.org/archive/html/bug-recutils/2021-12/msg00007.html
|
|
CVE-2021-46023 - https://github.com/mruby/mruby/issues/5613
|
|
CVE-2021-46027 - https://github.com/wangl1989/mysiteforme/issues/40
|
|
CVE-2021-46028 - https://github.com/langhsu/mblog/issues/50
|
|
CVE-2021-46039 - https://github.com/gpac/gpac/issues/1999
|
|
CVE-2021-46061 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/RSMS-1.0
|
|
CVE-2021-46062 - https://github.com/ming-soft/MCMS/issues/59
|
|
CVE-2021-46063 - https://github.com/ming-soft/MCMS/issues/59
|
|
CVE-2021-46088 - https://github.com/paalbra/zabbix-zbxsec-7
|
|
CVE-2021-46089 - https://github.com/jeecgboot/jeecg-boot/issues/3331
|
|
CVE-2021-46097 - https://gist.github.com/w4nd3r-hya/784a86dda91bdcb3071892e56aacdee2
|
|
CVE-2021-46101 - https://github.com/0xADY/git_rce
|
|
CVE-2021-46102 - https://github.com/solana-labs/rbpf/blob/c14764850f0b83b58aa013248eaf6d65836c1218/src/elf.rs#L609-L630
|
|
CVE-2021-46108 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46109 - https://drive.google.com/drive/folders/1GAOuZwPB-upkpjPgjB8qLIKl9Mh3IVfl?usp=sharing
|
|
CVE-2021-46113 - https://gist.github.com/P0cas/5aa55f62781364a750ac4a4d47f319fa#cve-2021-46113
|
|
CVE-2021-46113 - https://www.youtube.com/watch?v=gnSMrvV5e9w
|
|
CVE-2021-46122 - https://k4m1ll0.com/cve-tplink-tlwr840n-euV620-password-reset.html
|
|
CVE-2021-46167 - http://wizplat.com/PRODUCT1_3/?idx=217
|
|
CVE-2021-46168 - https://github.com/nimble-code/Spin/issues/56
|
|
CVE-2021-46169 - https://github.com/nimble-code/Modex/issues/10
|
|
CVE-2021-46170 - https://github.com/jerryscript-project/jerryscript/issues/4917
|
|
CVE-2021-46171 - https://github.com/nimble-code/Modex/issues/8
|
|
CVE-2021-46179 - https://github.com/upx/upx/issues/545
|
|
CVE-2021-46195 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
|
|
CVE-2021-46198 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Courier-Management-System
|
|
CVE-2021-46200 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Music-Cloud-Community-System
|
|
CVE-2021-46201 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Resort-Management-System-1.0
|
|
CVE-2021-46203 - https://github.com/taogogo/taocms/issues/13
|
|
CVE-2021-46204 - https://github.com/taogogo/taocms/issues/14
|
|
CVE-2021-46226 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46227 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46228 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46229 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46230 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46231 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46232 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46233 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46242 - https://github.com/HDFGroup/hdf5/issues/1329
|
|
CVE-2021-46243 - https://github.com/HDFGroup/hdf5/issues/1326
|
|
CVE-2021-46244 - https://github.com/HDFGroup/hdf5/issues/1327
|
|
CVE-2021-46247 - https://drive.google.com/drive/folders/1lSaxWKiNKRkeZxQanEMpt906aUgDGUk_?usp=sharing
|
|
CVE-2021-46255 - https://github.com/eyoucms/eyoucms/issues/21
|
|
CVE-2021-46262 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/7
|
|
CVE-2021-46263 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/11
|
|
CVE-2021-46264 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/9
|
|
CVE-2021-46265 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/13
|
|
CVE-2021-46283 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
|
|
CVE-2021-46283 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad9f151e560b016b6ad3280b48e42fa11e1a5440
|
|
CVE-2021-46307 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Projectworlds/2022/Online%20Examination%20System
|
|
CVE-2021-46308 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Railway-Reservation
|
|
CVE-2021-46309 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Employee-and-Visitor-Gate-Pass-Logging
|
|
CVE-2021-46310 - https://sourceforge.net/p/djvu/bugs/345/
|
|
CVE-2021-46312 - https://sourceforge.net/p/djvu/bugs/344/
|
|
CVE-2021-46314 - https://github.com/doudoudedi/DIR-846_Command_Injection/blob/main/DIR-846_Command_Injection1.md
|
|
CVE-2021-46314 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46315 - https://github.com/doudoudedi/DIR-846_Command_Injection/blob/main/DIR-846_Command_Injection1.md
|
|
CVE-2021-46315 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46319 - https://github.com/doudoudedi/DIR-846_Command_Injection/blob/main/DIR-846_Command_Injection1.md
|
|
CVE-2021-46319 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46321 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/15
|
|
CVE-2021-46322 - https://github.com/svaarala/duktape/issues/2448
|
|
CVE-2021-46323 - https://github.com/espruino/Espruino/issues/2122
|
|
CVE-2021-46324 - https://github.com/espruino/Espruino/issues/2121
|
|
CVE-2021-46325 - https://github.com/espruino/Espruino/issues/2114
|
|
CVE-2021-46326 - https://github.com/Moddable-OpenSource/moddable/issues/759
|
|
CVE-2021-46327 - https://github.com/Moddable-OpenSource/moddable/issues/766
|
|
CVE-2021-46329 - https://github.com/Moddable-OpenSource/moddable/issues/768
|
|
CVE-2021-46330 - https://github.com/Moddable-OpenSource/moddable/issues/774
|
|
CVE-2021-46331 - https://github.com/Moddable-OpenSource/moddable/issues/750
|
|
CVE-2021-46332 - https://github.com/Moddable-OpenSource/moddable/issues/749
|
|
CVE-2021-46332 - https://github.com/Moddable-OpenSource/moddable/issues/752
|
|
CVE-2021-46333 - https://github.com/Moddable-OpenSource/moddable/issues/769
|
|
CVE-2021-46334 - https://github.com/Moddable-OpenSource/moddable/issues/760
|
|
CVE-2021-46335 - https://github.com/Moddable-OpenSource/moddable/issues/748
|
|
CVE-2021-46335 - https://github.com/Moddable-OpenSource/moddable/issues/767
|
|
CVE-2021-46336 - https://github.com/jerryscript-project/jerryscript/issues/4927
|
|
CVE-2021-46337 - https://github.com/jerryscript-project/jerryscript/issues/4930
|
|
CVE-2021-46338 - https://github.com/jerryscript-project/jerryscript/issues/4900
|
|
CVE-2021-46339 - https://github.com/jerryscript-project/jerryscript/issues/4935
|
|
CVE-2021-46340 - https://github.com/jerryscript-project/jerryscript/issues/4924
|
|
CVE-2021-46342 - https://github.com/jerryscript-project/jerryscript/issues/4934
|
|
CVE-2021-46343 - https://github.com/jerryscript-project/jerryscript/issues/4921
|
|
CVE-2021-46344 - https://github.com/jerryscript-project/jerryscript/issues/4928
|
|
CVE-2021-46345 - https://github.com/jerryscript-project/jerryscript/issues/4920
|
|
CVE-2021-46346 - https://github.com/jerryscript-project/jerryscript/issues/4939
|
|
CVE-2021-46347 - https://github.com/jerryscript-project/jerryscript/issues/4938
|
|
CVE-2021-46348 - https://github.com/jerryscript-project/jerryscript/issues/4941
|
|
CVE-2021-46349 - https://github.com/jerryscript-project/jerryscript/issues/4937
|
|
CVE-2021-46350 - https://github.com/jerryscript-project/jerryscript/issues/4936
|
|
CVE-2021-46351 - https://github.com/jerryscript-project/jerryscript/issues/4940
|
|
CVE-2021-46353 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46354 - http://packetstormsecurity.com/files/166069/Thinfinity-VirtualUI-2.5.26.2-Information-Disclosure.html
|
|
CVE-2021-46355 - https://medium.com/@windsormoreira/ocs-inventory-2-9-1-cross-site-scripting-xss-cve-2021-46355-a88d72606b7e
|
|
CVE-2021-46360 - http://packetstormsecurity.com/files/171489/Composr-CMS-10.0.39-Remote-Code-Execution.html
|
|
CVE-2021-46361 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46361-FreeMarker%20Bypass-Magnolia%20CMS
|
|
CVE-2021-46362 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46362-Unauthenticated%20SSTI-Magnolia%20CMS
|
|
CVE-2021-46363 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46363-Formula%20Injection-Magnolia%20CMS
|
|
CVE-2021-46364 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46364-YAML%20Deserialization-Magnolia%20CMS
|
|
CVE-2021-46365 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46365-Unsafe%20XML%20Parsing-Magnolia%20CMS
|
|
CVE-2021-46366 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46366-CSRF%2BOpen%20Redirect-Magnolia%20CMS
|
|
CVE-2021-46367 - https://gist.github.com/faisalfs10x/bd12e9abefb0d44f020bf297a14a4597
|
|
CVE-2021-46367 - https://packetstormsecurity.com/files/165430/RiteCMS-3.1.0-Shell-Upload-Remote-Code-Execution.html
|
|
CVE-2021-46367 - https://www.exploit-db.com/exploits/50616
|
|
CVE-2021-46368 - https://packetstormsecurity.com/files/165404/TRIGONE-Remote-System-Monitor-3.61-Unquoted-Service-Path.html
|
|
CVE-2021-46368 - https://www.exploit-db.com/exploits/50633
|
|
CVE-2021-46371 - https://github.com/zuiidea/antd-admin/issues/1127
|
|
CVE-2021-46372 - https://www.huntr.dev/bounties/eb681144-04f2-4eaa-98b6-c8cffbcb1601/
|
|
CVE-2021-46378 - http://packetstormsecurity.com/files/167042/DLINK-DIR850-Insecure-Direct-Object-Reference.html
|
|
CVE-2021-46378 - https://drive.google.com/file/d/1S69wOovVa8NRVUXcB0PkVvZHFxREcD4Y/view?usp=sharing
|
|
CVE-2021-46378 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46379 - http://packetstormsecurity.com/files/167041/DLINK-DIR850-Open-Redirection.html
|
|
CVE-2021-46379 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46381 - http://packetstormsecurity.com/files/167070/DLINK-DAP-1620-A1-1.01-Directory-Traversal.html
|
|
CVE-2021-46381 - https://drive.google.com/drive/folders/19OP09msw8l7CJ622nkvnvnt7EKun1eCG?usp=sharing
|
|
CVE-2021-46381 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46382 - https://drive.google.com/drive/folders/1NOIoT8yE_HDoLVYhchml5E2Za3Oo6V9Y?usp=sharing
|
|
CVE-2021-46387 - http://packetstormsecurity.com/files/166189/Zyxel-ZyWALL-2-Plus-Cross-Site-Scripting.html
|
|
CVE-2021-46387 - https://drive.google.com/drive/folders/1_XfWBLqxT2Mqt7uB663Sjlc62pE8-rcN?usp=sharing
|
|
CVE-2021-46388 - https://drive.google.com/drive/folders/1FDtxZayLeSITcqP72c7FsTOpAFGFePVE
|
|
CVE-2021-46393 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX3/3
|
|
CVE-2021-46394 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX3/4
|
|
CVE-2021-46398 - http://packetstormsecurity.com/files/165885/FileBrowser-2.17.2-Code-Execution-Cross-Site-Request-Forgery.html
|
|
CVE-2021-46398 - https://febin0x4e4a.blogspot.com/2022/01/critical-csrf-in-filebrowser.html
|
|
CVE-2021-46398 - https://febin0x4e4a.wordpress.com/2022/01/19/critical-csrf-in-filebrowser/
|
|
CVE-2021-46398 - https://febinj.medium.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7
|
|
CVE-2021-46398 - https://systemweakness.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7
|
|
CVE-2021-46408 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/2
|
|
CVE-2021-46416 - http://packetstormsecurity.com/files/166670/SAM-SUNNY-TRIPOWER-5.0-Insecure-Direct-Object-Reference.html
|
|
CVE-2021-46416 - https://drive.google.com/drive/folders/1BPULhDC_g__seH_VnQlVtkrKdOLkXdzV?usp=sharing
|
|
CVE-2021-46417 - http://packetstormsecurity.com/files/166610/FFS-Colibri-Controller-Module-1.8.19.8580-Directory-Traversal.html
|
|
CVE-2021-46417 - http://packetstormsecurity.com/files/166671/Franklin-Fueling-Systems-Colibri-Controller-Module-1.8.19.8580-Local-File-Inclusion.html
|
|
CVE-2021-46417 - https://drive.google.com/drive/folders/1Yu4aVDdrgvs-F9jP3R8Cw7qo_TC7VB-R
|
|
CVE-2021-46418 - http://packetstormsecurity.com/files/166674/Telesquare-TLR-2855KS6-Arbitrary-File-Creation.html
|
|
CVE-2021-46419 - http://packetstormsecurity.com/files/166675/Telesquare-TLR-2855KS6-Arbitrary-File-Deletion.html
|
|
CVE-2021-46421 - https://drive.google.com/file/d/17y764rRfgab2EhYMEqCIYh__5sOTigqe/view?usp=sharing
|
|
CVE-2021-46422 - http://packetstormsecurity.com/files/167201/SDT-CW3B1-1.1.0-Command-Injection.html
|
|
CVE-2021-46422 - http://packetstormsecurity.com/files/167387/Telesquare-SDT-CW3B1-1.1.0-Command-Injection.html
|
|
CVE-2021-46422 - https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?usp=sharing
|
|
CVE-2021-46423 - https://drive.google.com/drive/folders/1iY4QqzZLdYgwD0LYc74M4Gm2wSC6Be1u?usp=sharing
|
|
CVE-2021-46424 - http://packetstormsecurity.com/files/167127/TLR-2005KSH-Arbitrary-File-Delete.html
|
|
CVE-2021-46426 - http://packetstormsecurity.com/files/167227/PHPIPAM-1.4.4-Cross-Site-Request-Forgery-Cross-Site-Scripting.html
|
|
CVE-2021-46427 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple%20ChatBot
|
|
CVE-2021-46427 - https://www.exploit-db.com/exploits/50673
|
|
CVE-2021-46428 - https://cxsecurity.com/issue/WLB-2022010093
|
|
CVE-2021-46428 - https://www.exploit-db.com/exploits/50672
|
|
CVE-2021-46436 - https://github.com/xunyang1/ZZCMS/issues/1
|
|
CVE-2021-46437 - https://github.com/xunyang1/ZZCMS/issues/2
|
|
CVE-2021-46440 - http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html
|
|
CVE-2021-46440 - https://github.com/strapi/strapi/pull/12246
|
|
CVE-2021-46441 - https://github.com/tgp-top/D-Link-DIR-825
|
|
CVE-2021-46441 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46442 - https://github.com/tgp-top/D-Link-DIR-825
|
|
CVE-2021-46442 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46451 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Project-Time-Management
|
|
CVE-2021-46452 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46453 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46454 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46455 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46456 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46457 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2021-46461 - https://github.com/nginx/njs/issues/450
|
|
CVE-2021-46462 - https://github.com/nginx/njs/issues/449
|
|
CVE-2021-46463 - https://github.com/nginx/njs/issues/447
|
|
CVE-2021-46474 - https://github.com/pcmacdon/jsish/issues/57
|
|
CVE-2021-46475 - https://github.com/pcmacdon/jsish/issues/64
|
|
CVE-2021-46477 - https://github.com/pcmacdon/jsish/issues/63
|
|
CVE-2021-46478 - https://github.com/pcmacdon/jsish/issues/60
|
|
CVE-2021-46480 - https://github.com/pcmacdon/jsish/issues/61
|
|
CVE-2021-46481 - https://github.com/pcmacdon/jsish/issues/55
|
|
CVE-2021-46482 - https://github.com/pcmacdon/jsish/issues/66
|
|
CVE-2021-46483 - https://github.com/pcmacdon/jsish/issues/62
|
|
CVE-2021-46484 - https://github.com/pcmacdon/jsish/issues/73
|
|
CVE-2021-46485 - https://github.com/pcmacdon/jsish/issues/70
|
|
CVE-2021-46486 - https://github.com/pcmacdon/jsish/issues/65
|
|
CVE-2021-46487 - https://github.com/pcmacdon/jsish/issues/72
|
|
CVE-2021-46488 - https://github.com/pcmacdon/jsish/issues/68
|
|
CVE-2021-46489 - https://github.com/pcmacdon/jsish/issues/74
|
|
CVE-2021-46490 - https://github.com/pcmacdon/jsish/issues/67
|
|
CVE-2021-46491 - https://github.com/pcmacdon/jsish/issues/69
|
|
CVE-2021-46494 - https://github.com/pcmacdon/jsish/issues/78
|
|
CVE-2021-46495 - https://github.com/pcmacdon/jsish/issues/82
|
|
CVE-2021-46496 - https://github.com/pcmacdon/jsish/issues/83
|
|
CVE-2021-46497 - https://github.com/pcmacdon/jsish/issues/84
|
|
CVE-2021-46498 - https://github.com/pcmacdon/jsish/issues/81
|
|
CVE-2021-46499 - https://github.com/pcmacdon/jsish/issues/76
|
|
CVE-2021-46500 - https://github.com/pcmacdon/jsish/issues/85
|
|
CVE-2021-46501 - https://github.com/pcmacdon/jsish/issues/86
|
|
CVE-2021-46502 - https://github.com/pcmacdon/jsish/issues/87
|
|
CVE-2021-46503 - https://github.com/pcmacdon/jsish/issues/88
|
|
CVE-2021-46504 - https://github.com/pcmacdon/jsish/issues/51
|
|
CVE-2021-46505 - https://github.com/pcmacdon/jsish/issues/53
|
|
CVE-2021-46506 - https://github.com/pcmacdon/jsish/issues/52
|
|
CVE-2021-46507 - https://github.com/pcmacdon/jsish/issues/54
|
|
CVE-2021-46508 - https://github.com/cesanta/mjs/issues/188
|
|
CVE-2021-46509 - https://github.com/cesanta/mjs/issues/200
|
|
CVE-2021-46510 - https://github.com/cesanta/mjs/issues/185
|
|
CVE-2021-46511 - https://github.com/cesanta/mjs/issues/183
|
|
CVE-2021-46512 - https://github.com/cesanta/mjs/issues/202
|
|
CVE-2021-46513 - https://github.com/cesanta/mjs/issues/189
|
|
CVE-2021-46514 - https://github.com/cesanta/mjs/issues/187
|
|
CVE-2021-46515 - https://github.com/cesanta/mjs/issues/186
|
|
CVE-2021-46516 - https://github.com/cesanta/mjs/issues/201
|
|
CVE-2021-46517 - https://github.com/cesanta/mjs/issues/184
|
|
CVE-2021-46518 - https://github.com/cesanta/mjs/issues/195
|
|
CVE-2021-46519 - https://github.com/cesanta/mjs/issues/194
|
|
CVE-2021-46520 - https://github.com/cesanta/mjs/issues/193
|
|
CVE-2021-46521 - https://github.com/cesanta/mjs/issues/190
|
|
CVE-2021-46522 - https://github.com/cesanta/mjs/issues/196
|
|
CVE-2021-46523 - https://github.com/cesanta/mjs/issues/198
|
|
CVE-2021-46524 - https://github.com/cesanta/mjs/issues/192
|
|
CVE-2021-46525 - https://github.com/cesanta/mjs/issues/199
|
|
CVE-2021-46526 - https://github.com/cesanta/mjs/issues/191
|
|
CVE-2021-46527 - https://github.com/cesanta/mjs/issues/197
|
|
CVE-2021-46528 - https://github.com/cesanta/mjs/issues/208
|
|
CVE-2021-46529 - https://github.com/cesanta/mjs/issues/210
|
|
CVE-2021-46530 - https://github.com/cesanta/mjs/issues/206
|
|
CVE-2021-46531 - https://github.com/cesanta/mjs/issues/211
|
|
CVE-2021-46532 - https://github.com/cesanta/mjs/issues/203
|
|
CVE-2021-46534 - https://github.com/cesanta/mjs/issues/204
|
|
CVE-2021-46535 - https://github.com/cesanta/mjs/issues/209
|
|
CVE-2021-46537 - https://github.com/cesanta/mjs/issues/212
|
|
CVE-2021-46538 - https://github.com/cesanta/mjs/issues/216
|
|
CVE-2021-46539 - https://github.com/cesanta/mjs/issues/217
|
|
CVE-2021-46540 - https://github.com/cesanta/mjs/issues/214
|
|
CVE-2021-46541 - https://github.com/cesanta/mjs/issues/222
|
|
CVE-2021-46542 - https://github.com/cesanta/mjs/issues/215
|
|
CVE-2021-46543 - https://github.com/cesanta/mjs/issues/219
|
|
CVE-2021-46544 - https://github.com/cesanta/mjs/issues/220
|
|
CVE-2021-46545 - https://github.com/cesanta/mjs/issues/218
|
|
CVE-2021-46546 - https://github.com/cesanta/mjs/issues/213
|
|
CVE-2021-46547 - https://github.com/cesanta/mjs/issues/221
|
|
CVE-2021-46548 - https://github.com/cesanta/mjs/issues/228
|
|
CVE-2021-46549 - https://github.com/cesanta/mjs/issues/224
|
|
CVE-2021-46550 - https://github.com/cesanta/mjs/issues/230
|
|
CVE-2021-46553 - https://github.com/cesanta/mjs/issues/226
|
|
CVE-2021-46554 - https://github.com/cesanta/mjs/issues/229
|
|
CVE-2021-46556 - https://github.com/cesanta/mjs/issues/227
|
|
CVE-2021-46557 - https://github.com/Zeyad-Azima/Vicidial-stored-XSS
|
|
CVE-2021-46558 - https://github.com/Zeyad-Azima/Issabel-stored-XSS
|
|
CVE-2021-46562 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46563 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46564 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46565 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46566 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46567 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46568 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46569 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46570 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46571 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46572 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46573 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46574 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46575 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-46576 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46577 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46578 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46579 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46580 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46581 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46585 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46586 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-46587 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-46588 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46590 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46591 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46592 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-46595 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-46597 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46598 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46600 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46601 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46602 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-46607 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-46610 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46621 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46623 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004
|
|
CVE-2021-46625 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46634 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46655 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46656 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
|
|
CVE-2021-46700 - https://github.com/saitoha/libsixel/issues/158
|
|
CVE-2021-46702 - https://www.sciencedirect.com/science/article/pii/S0167404821001358
|
|
CVE-2021-46708 - https://security.snyk.io/vuln/SNYK-JS-SWAGGERUIDIST-2314884
|
|
CVE-2021-46743 - https://github.com/firebase/php-jwt/issues/351
|
|
CVE-2021-46780 - https://wpscan.com/vulnerability/cba4ccdd-9331-4ca0-b910-8f427ed9b540
|
|
CVE-2021-46781 - https://wpscan.com/vulnerability/49589867-f764-4c4a-b640-84973c673b23
|
|
CVE-2021-46782 - https://wpscan.com/vulnerability/39e69487-aa53-4b78-a422-12515a6449bf
|
|
CVE-2021-46820 - https://github.com/XOS-Shop/xos_shop_system/issues/1
|
|
CVE-2021-46824 - https://packetstormsecurity.com/files/161394/School-File-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2021-46824 - https://www.exploit-db.com/exploits/49559
|
|
CVE-2021-46829 - http://www.openwall.com/lists/oss-security/2022/07/25/1
|
|
CVE-2021-46829 - https://github.com/pedrib/PoC/blob/master/fuzzing/CVE-2021-46829/CVE-2021-46829.md
|
|
CVE-2021-46829 - https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/190
|
|
CVE-2021-46850 - https://www.exploit-db.com/exploits/49674
|
|
CVE-2021-46888 - https://www.youtube.com/watch?v=QnRO-VkfIic
|
|
CVE-2021-46889 - https://packetstormsecurity.com/files/162227/WordPress-Photo-Gallery-1.5.69-Cross-Site-Scripting.html
|
|
CVE-2021-46898 - https://github.com/sehmaschine/django-grappelli/issues/975
|
|
CVE-2022-0001 - https://www.kb.cert.org/vuls/id/155143
|
|
CVE-2022-0001 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-0002 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-0020 - http://packetstormsecurity.com/files/171782/Palo-Alto-Cortex-XSOAR-6.5.0-Cross-Site-Scripting.html
|
|
CVE-2022-0070 - https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities
|
|
CVE-2022-0071 - https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities
|
|
CVE-2022-0079 - https://huntr.dev/bounties/b37f0e26-355a-4d50-8495-a567c10828ee
|
|
CVE-2022-0080 - https://huntr.dev/bounties/59a70392-4864-4ce3-8e35-6ac2111d1e2e
|
|
CVE-2022-0083 - https://huntr.dev/bounties/4c477440-3b03-42eb-a6e2-a31b55090736
|
|
CVE-2022-0085 - https://huntr.dev/bounties/73dbcc78-5ba9-492f-9133-13bbc9f31236
|
|
CVE-2022-0086 - https://huntr.dev/bounties/c1c03ef6-3f18-4976-a9ad-08c251279122
|
|
CVE-2022-0087 - https://huntr.dev/bounties/c9d7374f-2cb9-4bac-9c90-a965942f413e
|
|
CVE-2022-0088 - https://huntr.dev/bounties/d01f0726-1a0f-4575-ae17-4b5319b11c29
|
|
CVE-2022-0090 - https://gitlab.com/gitlab-org/gitaly/-/issues/3948
|
|
CVE-2022-0121 - https://huntr.dev/bounties/b70a6191-8226-4ac6-b817-cae7332a68ee
|
|
CVE-2022-0122 - https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae
|
|
CVE-2022-0125 - https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0125.json
|
|
CVE-2022-0128 - https://huntr.dev/bounties/63f51299-008a-4112-b85b-1e904aadd4ba
|
|
CVE-2022-0132 - https://huntr.dev/bounties/77ec5308-5561-4664-af21-d780df2d1e4b
|
|
CVE-2022-0133 - https://huntr.dev/bounties/80aabdc1-89fe-47b8-87ca-9d68107fc0b4
|
|
CVE-2022-0134 - https://wpscan.com/vulnerability/fa09ea9b-d5a0-4773-a692-9ff0200bcd85
|
|
CVE-2022-0137 - https://github.com/michaelrsweet/htmldoc/issues/461
|
|
CVE-2022-0139 - https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0
|
|
CVE-2022-0140 - https://wpscan.com/vulnerability/9fa2b3b6-2fe3-40f0-8f71-371dd58fe336
|
|
CVE-2022-0141 - https://wpscan.com/vulnerability/2adc8390-bb19-4adf-9805-e9c462d14d22
|
|
CVE-2022-0142 - https://wpscan.com/vulnerability/03210390-2054-40c0-9508-39d168087878
|
|
CVE-2022-0144 - https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c
|
|
CVE-2022-0145 - https://huntr.dev/bounties/b5b8c680-3cd9-4477-bcd9-3a29657ba7ba
|
|
CVE-2022-0147 - https://wpscan.com/vulnerability/2c735365-69c0-4652-b48e-c4a192dfe0d1
|
|
CVE-2022-0148 - https://wpscan.com/vulnerability/37665ee1-c57f-4445-9596-df4f7d72c8cd
|
|
CVE-2022-0149 - https://wpscan.com/vulnerability/e47c288a-2ea3-4926-93cc-113867cbc77c
|
|
CVE-2022-0150 - https://wpscan.com/vulnerability/7142a538-7c3d-4dd0-bd2c-cbd2efaf53c5
|
|
CVE-2022-0153 - https://huntr.dev/bounties/841503dd-311c-470a-a8ec-d4579b3274eb
|
|
CVE-2022-0156 - https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
|
|
CVE-2022-0157 - https://huntr.dev/bounties/2c0fe81b-0977-4e1e-b5d8-7646c9a7ebbd
|
|
CVE-2022-0158 - https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b
|
|
CVE-2022-0159 - https://huntr.dev/bounties/00937280-e2ab-49fe-8d43-8235b3c3db4b
|
|
CVE-2022-0161 - https://wpscan.com/vulnerability/6b37fa17-0dcb-47a7-b1eb-f9f6abb458c0
|
|
CVE-2022-0163 - https://wpscan.com/vulnerability/2b6b0731-4515-498a-82bd-d416f5885268
|
|
CVE-2022-0164 - https://wpscan.com/vulnerability/942535f9-73bf-4467-872a-20075f03bc51
|
|
CVE-2022-0165 - https://wpscan.com/vulnerability/906d0c31-370e-46b4-af1f-e52fbddd00cb
|
|
CVE-2022-0166 - https://kc.mcafee.com/corporate/index?page=content&id=SB10378
|
|
CVE-2022-0168 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d6f5e358452479fa8a773b5c6ccc9e4ec5a20880
|
|
CVE-2022-0169 - https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709c
|
|
CVE-2022-0170 - https://huntr.dev/bounties/f2a003fc-b911-43b6-81ec-f856cdfeaefc
|
|
CVE-2022-0171 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=683412ccf61294d727ead4a73d97397396e69a6b
|
|
CVE-2022-0173 - https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5
|
|
CVE-2022-0174 - https://huntr.dev/bounties/ed3ed4ce-3968-433c-a350-351c8f8b60db
|
|
CVE-2022-0176 - https://wpscan.com/vulnerability/564a66d5-7fab-4de0-868a-e19466a507af
|
|
CVE-2022-0178 - https://huntr.dev/bounties/81c6b974-d0b3-410b-a902-8324a55b1368
|
|
CVE-2022-0179 - https://huntr.dev/bounties/efdf2ead-f9d1-4767-9f02-d11f762d15e7
|
|
CVE-2022-0185 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2
|
|
CVE-2022-0185 - https://www.willsroot.io/2022/01/cve-2022-0185.html
|
|
CVE-2022-0186 - https://wpscan.com/vulnerability/3a9c44c0-866e-4fdf-b53d-666db2e11720
|
|
CVE-2022-0188 - https://wpscan.com/vulnerability/50b6f770-6f53-41ef-b2f3-2a58e9afd332
|
|
CVE-2022-0189 - https://wpscan.com/vulnerability/52a71bf1-b8bc-479e-b741-eb8fb9685014
|
|
CVE-2022-0190 - https://wpscan.com/vulnerability/ae322f11-d8b4-4b69-9efa-0fb87475fa44
|
|
CVE-2022-0191 - https://wpscan.com/vulnerability/d4c32a02-810f-43d8-946a-b7e18ac54f55
|
|
CVE-2022-0193 - https://plugins.trac.wordpress.org/changeset/2654225
|
|
CVE-2022-0193 - https://wpscan.com/vulnerability/30d1d328-9f19-4c4c-b90a-04937d617864
|
|
CVE-2022-0196 - https://huntr.dev/bounties/3675eec7-bbce-4dfd-a2d3-d6862dce9ea6
|
|
CVE-2022-0197 - https://huntr.dev/bounties/5abb7915-32f4-4fb1-afa7-bb6d8c4c5ad2
|
|
CVE-2022-0198 - https://huntr.dev/bounties/3d7e70fe-dddd-4b79-af62-8e058c4d5763
|
|
CVE-2022-0199 - https://wpscan.com/vulnerability/1ab1748f-c939-4953-83fc-9df878da7714
|
|
CVE-2022-0200 - https://wpscan.com/vulnerability/bbc0b812-7b30-4ab4-bac8-27c706b3f146
|
|
CVE-2022-0201 - https://wpscan.com/vulnerability/f274b0d8-74bf-43de-9051-29ce36d78ad4
|
|
CVE-2022-0203 - https://huntr.dev/bounties/395fc553-2b90-4e69-ba07-a316e1c06406
|
|
CVE-2022-0204 - https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q
|
|
CVE-2022-0205 - https://wpscan.com/vulnerability/446de364-720e-41ec-b80e-7678c8f4ad80
|
|
CVE-2022-0206 - https://wpscan.com/vulnerability/ce12437a-d440-4c4a-9247-95a8f39d00b9
|
|
CVE-2022-0208 - https://wpscan.com/vulnerability/59a2abd0-4aee-47aa-ad3a-865f624fa0fc
|
|
CVE-2022-0209 - https://wpscan.com/vulnerability/1e4af9be-5c88-4a3e-89ff-dd2b1bc131fe
|
|
CVE-2022-0211 - https://wpscan.com/vulnerability/0d276cca-d6eb-4f4c-83dd-fbc03254c679
|
|
CVE-2022-0212 - https://wpscan.com/vulnerability/15be2d2b-baa3-4845-82cf-3c351c695b47
|
|
CVE-2022-0213 - https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
|
|
CVE-2022-0214 - https://wpscan.com/vulnerability/ca2e8feb-15d6-4965-ad9c-8da1bc01e0f4
|
|
CVE-2022-0216 - https://starlabs.sg/advisories/22/22-0216/
|
|
CVE-2022-0217 - https://prosody.im/security/advisory_20220113/
|
|
CVE-2022-0217 - https://prosody.im/security/advisory_20220113/1.patch
|
|
CVE-2022-0219 - https://huntr.dev/bounties/0d093863-29e8-4dd7-a885-64f76d50bf5e
|
|
CVE-2022-0220 - https://wpscan.com/vulnerability/a91a01b9-7e36-4280-bc50-f6cff3e66059
|
|
CVE-2022-0224 - https://huntr.dev/bounties/f1d1ce3e-ca92-4c7b-b1b8-934e28eaa486
|
|
CVE-2022-0226 - https://huntr.dev/bounties/635d0abf-7680-47f6-a277-d9a91471c73f
|
|
CVE-2022-0228 - https://wpscan.com/vulnerability/22facac2-52f4-4e5f-be59-1d2934b260d9
|
|
CVE-2022-0229 - https://wpscan.com/vulnerability/d70c5335-4c01-448d-85fc-f8e75b104351
|
|
CVE-2022-0230 - https://wpscan.com/vulnerability/c73316d2-ae6a-42db-935b-b8b03a7e4363
|
|
CVE-2022-0231 - https://huntr.dev/bounties/adaf98cf-60ab-40e0-aa3b-42ba0d3b7cbf
|
|
CVE-2022-0234 - https://wpscan.com/vulnerability/fd568a1f-bd51-41bb-960d-f8573b84527b
|
|
CVE-2022-0236 - https://github.com/qurbat/CVE-2022-0236
|
|
CVE-2022-0238 - https://huntr.dev/bounties/63f24b24-4af2-47b8-baea-7ad5f4db3633
|
|
CVE-2022-0239 - https://huntr.dev/bounties/a717aec2-5646-4a5f-ade0-dadc25736ae3
|
|
CVE-2022-0240 - https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb
|
|
CVE-2022-0242 - https://huntr.dev/bounties/19f3e5f7-b419-44b1-9c37-7e4404cbec94
|
|
CVE-2022-0243 - https://huntr.dev/bounties/fa538421-ae55-4288-928f-4e96aaed5803
|
|
CVE-2022-0245 - https://huntr.dev/bounties/6a6aca72-32b7-45b3-a8ba-9b400b2d669c
|
|
CVE-2022-0246 - https://wpscan.com/vulnerability/892802b1-26e2-4ce1-be6f-71ce29687776
|
|
CVE-2022-0248 - https://wpscan.com/vulnerability/d02cf542-2d75-46bc-a0df-67bbe501cc89
|
|
CVE-2022-0250 - https://wpscan.com/vulnerability/05700942-3143-4978-89eb-814ceff74867
|
|
CVE-2022-0252 - https://wpscan.com/vulnerability/b0e551af-087b-43e7-bdb7-11d7f639028a
|
|
CVE-2022-0253 - https://huntr.dev/bounties/ac7f7eba-ee0b-4a50-bd89-29fd9b3e8303
|
|
CVE-2022-0254 - https://wpscan.com/vulnerability/ae54681f-7b89-408c-b0ee-ba4a520db997
|
|
CVE-2022-0255 - https://wpscan.com/vulnerability/684bb06d-864f-4cba-ab0d-f83974d026fa
|
|
CVE-2022-0256 - https://huntr.dev/bounties/8d88e48a-7124-4aaf-9f1d-6cfe4f9a79c1
|
|
CVE-2022-0257 - https://huntr.dev/bounties/bad2073c-bbd5-4425-b3e9-c336b73ddda6
|
|
CVE-2022-0258 - https://huntr.dev/bounties/0df891e4-6412-4d9a-a9b7-d9df50311802
|
|
CVE-2022-0261 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0261 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-0261 - https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
|
|
CVE-2022-0262 - https://huntr.dev/bounties/b38a4e14-5dcb-4e49-9990-494dc2a8fa0d
|
|
CVE-2022-0263 - https://huntr.dev/bounties/96506857-06bc-4c84-88b7-4f397715bcf6
|
|
CVE-2022-0265 - https://huntr.dev/bounties/d63972a2-b910-480a-a86b-d1f75d24d563
|
|
CVE-2022-0267 - https://wpscan.com/vulnerability/7df70f49-547f-4bdb-bf9b-2e06f93488c6
|
|
CVE-2022-0268 - https://huntr.dev/bounties/67085545-331e-4469-90f3-a1a46a078d39
|
|
CVE-2022-0269 - https://huntr.dev/bounties/a0470915-f6df-45b8-b3a2-01aebe764df0
|
|
CVE-2022-0271 - https://wpscan.com/vulnerability/ad07d9cd-8a75-4f7c-bbbe-3b6b89b699f2
|
|
CVE-2022-0272 - https://huntr.dev/bounties/23e37ba7-96d5-4037-a90a-8c8f4a70ce44
|
|
CVE-2022-0273 - https://huntr.dev/bounties/8f27686f-d698-4ab6-8ef0-899125792f13
|
|
CVE-2022-0274 - https://huntr.dev/bounties/a82a714a-9b71-475e-bfc3-43326fcaf764
|
|
CVE-2022-0277 - https://huntr.dev/bounties/0e776f3d-35b1-4a9e-8fe8-91e46c0d6316
|
|
CVE-2022-0278 - https://huntr.dev/bounties/64495d0f-d5ec-4542-9693-32372c18d030
|
|
CVE-2022-0279 - https://wpscan.com/vulnerability/43a4b2d3-1bd5-490c-982c-bb7120595865
|
|
CVE-2022-0281 - https://huntr.dev/bounties/315f5ac6-1b5e-4444-ad8f-802371da3505
|
|
CVE-2022-0282 - https://huntr.dev/bounties/8815b642-bd9b-4737-951b-bde7319faedd
|
|
CVE-2022-0284 - https://github.com/ImageMagick/ImageMagick/issues/4729
|
|
CVE-2022-0285 - https://huntr.dev/bounties/321918b2-aa01-410e-9f7c-dca5f286bc9c
|
|
CVE-2022-0286 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40
|
|
CVE-2022-0286 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-0287 - https://wpscan.com/vulnerability/6cd7cd6d-1cc1-472c-809b-b66389f149b0
|
|
CVE-2022-0288 - https://wpscan.com/vulnerability/27b64412-33a4-462c-bc45-f81697e4fe42
|
|
CVE-2022-0289 - http://packetstormsecurity.com/files/166547/Chrome-safe_browsing-ThreatDetails-OnReceivedThreatDOMDetails-Use-After-Free.html
|
|
CVE-2022-0290 - http://packetstormsecurity.com/files/166080/Chrome-RenderFrameHostImpl-Use-After-Free.html
|
|
CVE-2022-0306 - http://packetstormsecurity.com/files/166367/Chrome-chrome_pdf-PDFiumEngine-RequestThumbnail-Heap-Buffer-Overflow.html
|
|
CVE-2022-0313 - https://wpscan.com/vulnerability/1ce6c8f4-6f4b-4d56-8d11-43355ef32e8c
|
|
CVE-2022-0314 - https://wpscan.com/vulnerability/17585f16-c62c-422d-ad9c-9138b6da97b7
|
|
CVE-2022-0316 - https://wpscan.com/vulnerability/9ab3d6cf-aad7-41bc-9aae-dc5313f12f7c
|
|
CVE-2022-0318 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0318 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-0318 - https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
|
|
CVE-2022-0319 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0319 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-0319 - https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b
|
|
CVE-2022-0320 - https://wpscan.com/vulnerability/0d02b222-e672-4ac0-a1d4-d34e1ecf4a95
|
|
CVE-2022-0321 - https://wpscan.com/vulnerability/286b81a0-6f6d-4024-9bbc-6cb373990a7a
|
|
CVE-2022-0322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c
|
|
CVE-2022-0322 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-0323 - https://huntr.dev/bounties/a5f5a988-aa52-4443-839d-299a63f44fb7
|
|
CVE-2022-0326 - https://huntr.dev/bounties/795dcbd9-1695-44bb-8c59-ad327c97c976
|
|
CVE-2022-0327 - https://wpscan.com/vulnerability/df38cc99-da3c-4cc0-b179-1e52e841b883
|
|
CVE-2022-0328 - https://wpscan.com/vulnerability/44532b7c-4d0d-4959-ada4-733f377d6ec9
|
|
CVE-2022-0339 - https://huntr.dev/bounties/499688c4-6ac4-4047-a868-7922c3eab369
|
|
CVE-2022-0341 - https://huntr.dev/bounties/fa546b57-bc15-4705-824e-9474b616f628
|
|
CVE-2022-0345 - https://wpscan.com/vulnerability/b3b523b9-6c92-4091-837a-d34e3174eb19
|
|
CVE-2022-0346 - https://wpscan.com/vulnerability/4b339390-d71a-44e0-8682-51a12bd2bfe6
|
|
CVE-2022-0347 - https://wpscan.com/vulnerability/a5084367-842b-496a-a23c-24dbebac1e8b
|
|
CVE-2022-0348 - https://huntr.dev/bounties/250e79be-7e5d-4ba3-9c34-655e39ade2f4
|
|
CVE-2022-0349 - https://wpscan.com/vulnerability/1d0dd7be-29f3-4043-a9c6-67d02746463a
|
|
CVE-2022-0350 - https://huntr.dev/bounties/8202aa06-4b49-45ff-aa0f-00982f62005c
|
|
CVE-2022-0351 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0351 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-0351 - https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
|
|
CVE-2022-0352 - https://huntr.dev/bounties/a577ff17-2ded-4c41-84ae-6ac02440f717
|
|
CVE-2022-0359 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0359 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-0359 - https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
|
|
CVE-2022-0360 - https://wpscan.com/vulnerability/d718b993-4de5-499c-84c9-69801396f51f
|
|
CVE-2022-0361 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0361 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-0361 - https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
|
|
CVE-2022-0362 - https://huntr.dev/bounties/e7c72417-eb8f-416c-8480-be76ac0a9091
|
|
CVE-2022-0363 - https://wpscan.com/vulnerability/a438a951-497c-43cd-822f-1a48d4315191
|
|
CVE-2022-0364 - https://wpscan.com/vulnerability/0eb40cd5-838e-4b53-994d-22cf7c8a6c50
|
|
CVE-2022-0367 - https://github.com/stephane/libmodbus/issues/614
|
|
CVE-2022-0368 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0368 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-0368 - https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
|
|
CVE-2022-0370 - https://huntr.dev/bounties/fbe4b376-57ce-42cd-a9a9-049c4099b3ca
|
|
CVE-2022-0372 - https://huntr.dev/bounties/563232b9-5a93-4f4d-8389-ed805b262ef1
|
|
CVE-2022-0374 - https://huntr.dev/bounties/f8b560a6-aa19-4262-8ae4-cf88204310ef
|
|
CVE-2022-0376 - https://wpscan.com/vulnerability/a3ca2ed4-11ea-4d78-aa4c-4ed58f258932
|
|
CVE-2022-0377 - https://wpscan.com/vulnerability/0d95ada6-53e3-4a80-a395-eacd7b090f26
|
|
CVE-2022-0378 - https://huntr.dev/bounties/529b65c0-5be7-49d4-9419-f905b8153d31
|
|
CVE-2022-0379 - https://huntr.dev/bounties/933f94b8-c5e7-4c3a-92e0-4d1577d5fee6
|
|
CVE-2022-0381 - https://gist.github.com/Xib3rR4dAr/4b3ea7960914e23c3a875b973a5b37a3
|
|
CVE-2022-0383 - https://wpscan.com/vulnerability/e0402753-3a80-455b-9fab-a7d2a7687193
|
|
CVE-2022-0384 - https://wpscan.com/vulnerability/91c44c45-994b-4aed-b9f9-7db45924eeb4
|
|
CVE-2022-0385 - https://wpscan.com/vulnerability/60067b8b-9fa5-40d1-817a-929779947891
|
|
CVE-2022-0387 - https://huntr.dev/bounties/2e09035b-8f98-4930-b7e8-7abe5f722b98
|
|
CVE-2022-0388 - https://wpscan.com/vulnerability/7d4ad1f3-6d27-4655-9796-ce370ef5fced
|
|
CVE-2022-0389 - https://wpscan.com/vulnerability/788ead78-9aa2-49a3-b191-12114be8270b
|
|
CVE-2022-0391 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-0392 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0392 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-0392 - https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
|
|
CVE-2022-0393 - https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba
|
|
CVE-2022-0394 - https://huntr.dev/bounties/e13823d0-271c-448b-a0c5-8549ea7ea272
|
|
CVE-2022-0397 - https://wpscan.com/vulnerability/c8091254-1ced-4363-ab7f-5b880447713d
|
|
CVE-2022-0398 - https://wpscan.com/vulnerability/21aec131-91ff-4300-ac7a-0bf31d6b2b24
|
|
CVE-2022-0399 - https://wpscan.com/vulnerability/5e5fdcf4-ec2b-4e73-8009-05606b2d5164
|
|
CVE-2022-0401 - https://huntr.dev/bounties/d93259aa-ad03-43d6-8846-a00b9f58876d
|
|
CVE-2022-0402 - https://wpscan.com/vulnerability/2e2e2478-2488-4c91-8af8-69b07783854f/
|
|
CVE-2022-0403 - https://wpscan.com/vulnerability/997a7fbf-98c6-453e-ad84-75c1e91d5a1e
|
|
CVE-2022-0404 - https://wpscan.com/vulnerability/6d0932bb-d515-4432-b67b-16aba34bd285
|
|
CVE-2022-0405 - https://huntr.dev/bounties/370538f6-5312-4c15-9fc0-b4c36ac236fe
|
|
CVE-2022-0406 - https://huntr.dev/bounties/d7498799-4797-4751-b5e2-b669e729d5db
|
|
CVE-2022-0407 - https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c
|
|
CVE-2022-0408 - https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
|
|
CVE-2022-0409 - https://huntr.dev/bounties/c25bfad1-2611-4226-954f-009e50f966f7
|
|
CVE-2022-0410 - https://wpscan.com/vulnerability/0d6b89f5-cf12-4ad4-831b-fed26763ba20
|
|
CVE-2022-0411 - https://wpscan.com/vulnerability/35272197-c973-48ad-8405-538bfbafa172
|
|
CVE-2022-0412 - https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682
|
|
CVE-2022-0413 - https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38
|
|
CVE-2022-0414 - https://huntr.dev/bounties/76f3b405-9f5d-44b1-8434-b52b56ee395f
|
|
CVE-2022-0415 - https://huntr.dev/bounties/b4928cfe-4110-462f-a180-6d5673797902
|
|
CVE-2022-0417 - https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
|
|
CVE-2022-0418 - https://wpscan.com/vulnerability/74888a9f-fb75-443d-bb85-0120cbb764a0
|
|
CVE-2022-0419 - https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa
|
|
CVE-2022-0420 - https://wpscan.com/vulnerability/056b5167-3cbc-47d1-9917-52a434796151
|
|
CVE-2022-0421 - https://wpscan.com/vulnerability/145e8d3c-cd6f-4827-86e5-ea2d395a80b9
|
|
CVE-2022-0422 - https://wpscan.com/vulnerability/429be4eb-8a6b-4531-9465-9ef0d35c12cc
|
|
CVE-2022-0423 - https://wpscan.com/vulnerability/7dde0b9d-9b86-4961-b005-a11b6ffba952
|
|
CVE-2022-0424 - https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f
|
|
CVE-2022-0426 - https://wpscan.com/vulnerability/de69bcd1-b0b1-4b16-9655-776ee57ad90a
|
|
CVE-2022-0427 - https://gitlab.com/gitlab-org/gitlab/-/issues/347284
|
|
CVE-2022-0428 - https://wpscan.com/vulnerability/071a2f69-9cd6-42a8-a56c-264a589784ab
|
|
CVE-2022-0429 - https://wpscan.com/vulnerability/d1b6f438-f737-4b18-89cf-161238a7421b
|
|
CVE-2022-0430 - https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f
|
|
CVE-2022-0431 - https://wpscan.com/vulnerability/52bd94df-8816-48fd-8788-38d045eb57ca
|
|
CVE-2022-0432 - https://huntr.dev/bounties/d06da292-7716-4d74-a129-dd04773398d7
|
|
CVE-2022-0434 - https://wpscan.com/vulnerability/be895016-7365-4ce4-a54f-f36d0ef2d6f1
|
|
CVE-2022-0436 - https://huntr.dev/bounties/f55315e9-9f6d-4dbb-8c40-bae50c1ae92b
|
|
CVE-2022-0437 - https://huntr.dev/bounties/64b67ea1-5487-4382-a5f6-e8a95f798885
|
|
CVE-2022-0439 - https://wpscan.com/vulnerability/729d3e67-d081-4a4e-ac1e-f6b0a184f095
|
|
CVE-2022-0440 - https://wpscan.com/vulnerability/2239095f-8a66-4a5d-ab49-1662a40fddf1
|
|
CVE-2022-0441 - https://wpscan.com/vulnerability/173c2efe-ee9c-4539-852f-c242b4f728ed
|
|
CVE-2022-0442 - https://wpscan.com/vulnerability/9cf0822a-c9d6-4ebc-b905-95b143d1a692
|
|
CVE-2022-0443 - https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
|
|
CVE-2022-0444 - https://wpscan.com/vulnerability/9567d295-43c7-4e59-9283-c7726f16d40b
|
|
CVE-2022-0445 - https://wpscan.com/vulnerability/d9f28255-0026-4c42-9e67-d17b618c2285
|
|
CVE-2022-0446 - https://wpscan.com/vulnerability/3fc7986e-3b38-4e16-9516-2ae00bc7a581
|
|
CVE-2022-0447 - https://wpscan.com/vulnerability/91ca2cc9-951e-4e96-96ff-3bf131209dbe
|
|
CVE-2022-0448 - https://wpscan.com/vulnerability/d4ff63ee-28e6-486e-9aa7-c878b97f707c
|
|
CVE-2022-0449 - https://wpscan.com/vulnerability/3cc1bb3c-e124-43d3-bc84-a493561a1387
|
|
CVE-2022-0450 - https://wpscan.com/vulnerability/612f9273-acc8-4be6-b372-33f1e687f54a
|
|
CVE-2022-0471 - https://wpscan.com/vulnerability/499bfee4-b481-4276-b6ad-0eead6680f66
|
|
CVE-2022-0472 - https://huntr.dev/bounties/cb5b8563-15cf-408c-9f79-4871ea0a8713
|
|
CVE-2022-0476 - https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d
|
|
CVE-2022-0478 - https://wpscan.com/vulnerability/d881d725-d06b-464f-a25e-88f41b1f431f
|
|
CVE-2022-0479 - https://wpscan.com/vulnerability/0d2bbbaf-fbfd-4921-ba4e-684e2e77e816
|
|
CVE-2022-0480 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f12156dff2862ac54235fc72703f18770769042
|
|
CVE-2022-0480 - https://github.com/kata-containers/kata-containers/issues/3373
|
|
CVE-2022-0480 - https://ubuntu.com/security/CVE-2022-0480
|
|
CVE-2022-0481 - https://huntr.dev/bounties/54725c8c-87f4-41b6-878c-01d8e0ee7027
|
|
CVE-2022-0482 - http://packetstormsecurity.com/files/166701/Easy-Appointments-Information-Disclosure.html
|
|
CVE-2022-0482 - https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466
|
|
CVE-2022-0482 - https://huntr.dev/bounties/2fe771ef-b615-45ef-9b4d-625978042e26
|
|
CVE-2022-0487 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39
|
|
CVE-2022-0489 - https://gitlab.com/gitlab-org/gitlab/-/issues/341832
|
|
CVE-2022-0492 - http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
|
|
CVE-2022-0492 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
|
|
CVE-2022-0492 - http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html
|
|
CVE-2022-0492 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af
|
|
CVE-2022-0493 - https://wpscan.com/vulnerability/21e2e5fc-03d2-4791-beef-07af6bf985ed
|
|
CVE-2022-0496 - https://github.com/openscad/openscad/issues/4037
|
|
CVE-2022-0497 - https://github.com/openscad/openscad/issues/4043
|
|
CVE-2022-0499 - https://wpscan.com/vulnerability/e9ccf1fc-1dbf-4a41-bf4a-90af20b286d6
|
|
CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4
|
|
CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20
|
|
CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821
|
|
CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861
|
|
CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1
|
|
CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841
|
|
CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57
|
|
CVE-2022-0503 - https://wpscan.com/vulnerability/b6d38e23-3761-4447-a794-1e5077fd953a
|
|
CVE-2022-0505 - https://huntr.dev/bounties/65b5a243-3f0c-4df3-9bab-898332180968
|
|
CVE-2022-0506 - https://huntr.dev/bounties/0a5ec24c-343e-4cc4-b27b-2beb19a1c35f
|
|
CVE-2022-0507 - https://khoori.org/posts/cve-2022-0507/
|
|
CVE-2022-0509 - https://huntr.dev/bounties/26cdf86c-8edc-4af6-8411-d569699ecd1b
|
|
CVE-2022-0510 - https://huntr.dev/bounties/bb3525d5-dedc-48b8-ab04-ad4c72499abe
|
|
CVE-2022-0511 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
|
CVE-2022-0512 - https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b
|
|
CVE-2022-0514 - https://huntr.dev/bounties/af08000d-9f4a-4743-865d-5d5cdaf7fb27
|
|
CVE-2022-0515 - https://huntr.dev/bounties/efb93f1f-1896-4a4c-a059-9ecadac1c4de
|
|
CVE-2022-0516 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55
|
|
CVE-2022-0518 - https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184
|
|
CVE-2022-0519 - https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3
|
|
CVE-2022-0520 - https://huntr.dev/bounties/ce13c371-e5ef-4993-97f3-3d33dcd943a6
|
|
CVE-2022-0521 - https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca
|
|
CVE-2022-0522 - https://huntr.dev/bounties/2d45e589-d614-4875-bba1-be0f729e7ca9
|
|
CVE-2022-0523 - https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69
|
|
CVE-2022-0524 - https://huntr.dev/bounties/bfffae58-b3cd-4e0e-b1f2-3db387a22c3d
|
|
CVE-2022-0525 - https://huntr.dev/bounties/e19e109f-acf0-4048-8ee8-1b10a870f1e9
|
|
CVE-2022-0526 - https://huntr.dev/bounties/d8f5ce74-2a00-4813-b220-70af771b0edd
|
|
CVE-2022-0529 - https://bugzilla.redhat.com/show_bug.cgi?id=2051402
|
|
CVE-2022-0529 - https://github.com/ByteHackr/unzip_poc
|
|
CVE-2022-0530 - https://bugzilla.redhat.com/show_bug.cgi?id=2051395
|
|
CVE-2022-0530 - https://github.com/ByteHackr/unzip_poc
|
|
CVE-2022-0531 - https://wpscan.com/vulnerability/ac5c2a5d-09b6-470b-a598-2972183413ca
|
|
CVE-2022-0533 - https://wpscan.com/vulnerability/40f36692-c898-4441-ad24-2dc17856bd74
|
|
CVE-2022-0534 - https://github.com/michaelrsweet/htmldoc/issues/463
|
|
CVE-2022-0535 - https://wpscan.com/vulnerability/a4162e96-a3c5-4f38-a60b-aa3ed9508985
|
|
CVE-2022-0537 - https://wpscan.com/vulnerability/abfbba70-5158-4990-98e5-f302361db367
|
|
CVE-2022-0539 - https://huntr.dev/bounties/5f41b182-dda2-4c6f-9668-2a9afaed53af
|
|
CVE-2022-0541 - https://wpscan.com/vulnerability/822cac2c-decd-4aa4-9e8e-1ba2d0c080ce
|
|
CVE-2022-0542 - https://huntr.dev/bounties/e6469ba6-03a2-4b17-8b4e-8932ecd0f7ac
|
|
CVE-2022-0543 - http://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html
|
|
CVE-2022-0543 - https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce
|
|
CVE-2022-0554 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0554 - https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
|
|
CVE-2022-0557 - http://packetstormsecurity.com/files/166077/Microweber-1.2.11-Shell-Upload.html
|
|
CVE-2022-0557 - https://huntr.dev/bounties/660c89af-2de5-41bc-aada-9e4e78142db8
|
|
CVE-2022-0557 - https://www.exploit-db.com/exploits/50768
|
|
CVE-2022-0558 - https://huntr.dev/bounties/8fffc95f-14ae-457b-aecc-be4716a8b91c
|
|
CVE-2022-0559 - https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e
|
|
CVE-2022-0560 - https://huntr.dev/bounties/c9d586e7-0fa1-47ab-a2b3-b890e8dc9b25
|
|
CVE-2022-0561 - https://gitlab.com/libtiff/libtiff/-/issues/362
|
|
CVE-2022-0562 - https://gitlab.com/libtiff/libtiff/-/issues/362
|
|
CVE-2022-0565 - https://huntr.dev/bounties/b0b29656-4bbe-41cf-92f6-8579df0b6de5
|
|
CVE-2022-0570 - https://huntr.dev/bounties/65a7632e-f95b-4836-b1a7-9cb95e5124f1
|
|
CVE-2022-0571 - https://huntr.dev/bounties/a5039485-6e48-4313-98ad-915506c19ae8
|
|
CVE-2022-0572 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0572 - https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf
|
|
CVE-2022-0574 - https://huntr.dev/bounties/6f322c84-9e20-4df6-97e8-92bc271ede3f
|
|
CVE-2022-0575 - https://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d
|
|
CVE-2022-0576 - https://huntr.dev/bounties/114ba055-a2f0-4db9-aafb-95df944ba177
|
|
CVE-2022-0578 - https://huntr.dev/bounties/02c81928-eb47-476f-8000-e93dc796dbcc
|
|
CVE-2022-0579 - https://huntr.dev/bounties/70a99cf4-3241-4ffc-b9ed-5c54932f3849
|
|
CVE-2022-0580 - https://huntr.dev/bounties/2494106c-7703-4558-bb1f-1eae59d264e3
|
|
CVE-2022-0583 - https://gitlab.com/wireshark/wireshark/-/issues/17840
|
|
CVE-2022-0586 - https://gitlab.com/wireshark/wireshark/-/issues/17813
|
|
CVE-2022-0587 - https://huntr.dev/bounties/0c7c9ecd-33ac-4865-b05b-447ced735469
|
|
CVE-2022-0588 - https://huntr.dev/bounties/caab3310-0d70-4c8a-8768-956f8dd3326d
|
|
CVE-2022-0589 - https://huntr.dev/bounties/d943d95c-076f-441a-ab21-cbf6b15f6768
|
|
CVE-2022-0590 - https://wpscan.com/vulnerability/08b66b69-3c69-4a1e-9c0a-5697e31bc04e
|
|
CVE-2022-0591 - https://wpscan.com/vulnerability/b5303e63-d640-4178-9237-d0f524b13d47
|
|
CVE-2022-0592 - https://wpscan.com/vulnerability/5d8d53ad-dc88-4b50-a292-fc447484c27b
|
|
CVE-2022-0593 - https://wpscan.com/vulnerability/76a50157-04b5-43e8-afbc-a6ddf6d1cba3
|
|
CVE-2022-0594 - https://wpscan.com/vulnerability/4de9451e-2c8d-4d99-a255-b027466d29b1
|
|
CVE-2022-0595 - https://wpscan.com/vulnerability/1b849957-eaca-47ea-8f84-23a3a98cc8de
|
|
CVE-2022-0596 - https://huntr.dev/bounties/f68b994e-2b8b-49f5-af2a-8cd99e8048a5
|
|
CVE-2022-0597 - https://huntr.dev/bounties/68c22eab-cc69-4e9f-bcb6-2df3db626813
|
|
CVE-2022-0598 - https://wpscan.com/vulnerability/4688d39e-ac9b-47f5-a4c1-f9548b63c68c
|
|
CVE-2022-0599 - https://wpscan.com/vulnerability/4f1d45bc-d3bd-472c-959d-05abeff32765
|
|
CVE-2022-0600 - https://wpscan.com/vulnerability/5dd6f625-6738-4e6a-81dc-21c0add4368d
|
|
CVE-2022-0601 - https://wpscan.com/vulnerability/6ec62eae-2072-4098-8f77-b22d61a89cbf
|
|
CVE-2022-0602 - https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010
|
|
CVE-2022-0611 - https://huntr.dev/bounties/7b7447fc-f1b0-446c-b016-ee3f6511010b
|
|
CVE-2022-0613 - https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083
|
|
CVE-2022-0614 - https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879
|
|
CVE-2022-0616 - https://wpscan.com/vulnerability/7c63d76e-34ca-4778-8784-437d446c16e0
|
|
CVE-2022-0617 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee
|
|
CVE-2022-0617 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f
|
|
CVE-2022-0619 - https://wpscan.com/vulnerability/d18892c6-2b19-4037-bc39-5d170adaf3d9
|
|
CVE-2022-0620 - https://wpscan.com/vulnerability/77b92130-167c-4e8a-bde5-3fd1bd6982c6
|
|
CVE-2022-0621 - https://wpscan.com/vulnerability/b5578747-298d-4f4b-867e-46b767485a98
|
|
CVE-2022-0623 - https://huntr.dev/bounties/5b908ac7-d8f1-4fcd-9355-85df565f7580
|
|
CVE-2022-0624 - https://huntr.dev/bounties/afffb2bd-fb06-4144-829e-ecbbcbc85388
|
|
CVE-2022-0625 - https://wpscan.com/vulnerability/ec5c331c-fb74-4ccc-a4d4-446c2b4e703a
|
|
CVE-2022-0626 - https://wpscan.com/vulnerability/d72164e2-8449-4fb1-aad3-bfa86d645e47
|
|
CVE-2022-0627 - https://wpscan.com/vulnerability/fd8c720a-a94a-438f-b686-3a734e3c24e4
|
|
CVE-2022-0628 - https://wpscan.com/vulnerability/af9787ee-c496-4f02-a22c-c8f8a97ad902
|
|
CVE-2022-0629 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0629 - https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877
|
|
CVE-2022-0630 - https://huntr.dev/bounties/f7cdd680-1a7f-4992-b4b8-44b5e4ba3e32
|
|
CVE-2022-0631 - https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40
|
|
CVE-2022-0632 - https://huntr.dev/bounties/3e5bb8f6-30fd-4553-86dd-761e9459ce1b
|
|
CVE-2022-0633 - http://packetstormsecurity.com/files/166059/WordPress-UpdraftPlus-1.22.2-Backup-Disclosure.html
|
|
CVE-2022-0633 - https://wpscan.com/vulnerability/d257c28f-3c7e-422b-a5c2-e618ed3c0bf3
|
|
CVE-2022-0634 - https://wpscan.com/vulnerability/7e11aeb0-b231-407d-86ec-9018c2c7eee3
|
|
CVE-2022-0637 - https://bugzilla.mozilla.org/show_bug.cgi?id=1753838
|
|
CVE-2022-0637 - https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2022-0637
|
|
CVE-2022-0639 - https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155
|
|
CVE-2022-0640 - https://wpscan.com/vulnerability/f8405e06-9cf3-4acb-aebb-e80fb402daa9
|
|
CVE-2022-0641 - https://wpscan.com/vulnerability/0a9830df-5f5d-40a3-9841-40994275136f
|
|
CVE-2022-0642 - https://wpscan.com/vulnerability/099cf9b4-0b3a-43c6-8ca9-7c2d50f86425
|
|
CVE-2022-0643 - https://wpscan.com/vulnerability/5be0de93-9625-419a-8c37-521c1bd9c24c
|
|
CVE-2022-0645 - https://huntr.dev/bounties/c13258a2-30e3-4261-9a3b-2f39c49a8bd6
|
|
CVE-2022-0647 - https://wpscan.com/vulnerability/4a585d5f-72ba-43e3-b04f-8b3e1b84444a
|
|
CVE-2022-0648 - https://wpscan.com/vulnerability/90f9ad6a-4855-4a8e-97f6-5f403eb6455d
|
|
CVE-2022-0649 - https://wpscan.com/vulnerability/284fbc98-803d-4da5-8920-411eeae4bac8
|
|
CVE-2022-0651 - https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042
|
|
CVE-2022-0654 - https://huntr.dev/bounties/a779faf5-c2cc-48be-a31d-4ddfac357afc
|
|
CVE-2022-0656 - https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151
|
|
CVE-2022-0657 - https://wpscan.com/vulnerability/e7fe8218-4ef5-4ef9-9850-8567c207e8e6
|
|
CVE-2022-0658 - https://wpscan.com/vulnerability/d7f0805a-61ce-454a-96fb-5ecacd767578
|
|
CVE-2022-0659 - https://wpscan.com/vulnerability/22dc2661-ba64-49e7-af65-892a617ab02c
|
|
CVE-2022-0660 - https://huntr.dev/bounties/01fd2e0d-b8cf-487f-a16c-7b088ef3a291
|
|
CVE-2022-0661 - https://wpscan.com/vulnerability/3c5a7b03-d4c3-46b9-af65-fb50e58b0bfd
|
|
CVE-2022-0662 - https://wpscan.com/vulnerability/27ad58ba-b648-41d9-8074-16e4feeaee69
|
|
CVE-2022-0663 - https://wpscan.com/vulnerability/b586b217-f91e-42d3-81f1-cc3ee3a4b01e
|
|
CVE-2022-0664 - https://huntr.dev/bounties/29898a42-fd4f-4b5b-a8e3-ab573cb87eac
|
|
CVE-2022-0665 - https://huntr.dev/bounties/423df64d-c591-4ad9-bf1c-411bcbc06ba3
|
|
CVE-2022-0666 - https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55
|
|
CVE-2022-0674 - https://wpscan.com/vulnerability/332e1e1e-7420-4605-99bc-4074e212ff9b
|
|
CVE-2022-0676 - https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485
|
|
CVE-2022-0678 - https://huntr.dev/bounties/d707137a-aace-44c5-b15c-1807035716c0
|
|
CVE-2022-0679 - https://wpscan.com/vulnerability/0ea79eb1-6561-4c21-a20b-a1870863b0a8
|
|
CVE-2022-0680 - https://wpscan.com/vulnerability/7cede02e-9af7-4f50-95a8-84ef4c7f7ded
|
|
CVE-2022-0681 - https://wpscan.com/vulnerability/c5765816-4439-4c14-a847-044248ada0ef
|
|
CVE-2022-0684 - https://wpscan.com/vulnerability/69b178f3-5951-4879-9bbe-183951d002ec
|
|
CVE-2022-0685 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0685 - https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782
|
|
CVE-2022-0686 - https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c
|
|
CVE-2022-0687 - https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c
|
|
CVE-2022-0689 - https://huntr.dev/bounties/fa5dbbd3-97fe-41a9-8797-2e54d9a9c649
|
|
CVE-2022-0690 - https://huntr.dev/bounties/4999a0f4-6efb-4681-b4ba-b36babc366f9
|
|
CVE-2022-0691 - https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4
|
|
CVE-2022-0692 - https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203
|
|
CVE-2022-0693 - https://wpscan.com/vulnerability/a72bf075-fd4b-4aa5-b4a4-5f62a0620643
|
|
CVE-2022-0694 - https://wpscan.com/vulnerability/990d1b0a-dbd1-42d0-9a40-c345407c6fe0
|
|
CVE-2022-0695 - https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea
|
|
CVE-2022-0696 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0696 - https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f
|
|
CVE-2022-0697 - https://huntr.dev/bounties/2d0301a2-10ff-48f4-a346-5a0e8707835b
|
|
CVE-2022-0700 - https://wpscan.com/vulnerability/1bf1f255-1571-425c-92b1-02833f6a44a7
|
|
CVE-2022-0701 - https://wpscan.com/vulnerability/68882f81-12d3-4e98-82ff-6754ac4ccfa1
|
|
CVE-2022-0702 - https://wpscan.com/vulnerability/bf6f897b-af65-4122-802c-ae6d4f2346f9
|
|
CVE-2022-0703 - https://wpscan.com/vulnerability/fa34beff-c8ab-4297-9c59-b3b0c52f0536
|
|
CVE-2022-0704 - https://huntr.dev/bounties/4142a8b4-b439-4328-aaa3-52f6fedfd0a6
|
|
CVE-2022-0705 - https://huntr.dev/bounties/0e1b6836-e5b5-4e47-b9ab-2f6a4790ee7b
|
|
CVE-2022-0706 - https://wpscan.com/vulnerability/598d5c1b-7930-46a6-9a31-5e08a5f14907
|
|
CVE-2022-0707 - https://wpscan.com/vulnerability/50680797-61e4-4737-898f-e5b394d89117
|
|
CVE-2022-0708 - https://mattermost.com/security-updates/
|
|
CVE-2022-0709 - https://wpscan.com/vulnerability/3cd1d8d2-d2a4-45a9-9b5f-c2a56f08be85
|
|
CVE-2022-0712 - https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466
|
|
CVE-2022-0713 - https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c
|
|
CVE-2022-0714 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0714 - https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3
|
|
CVE-2022-0715 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-02
|
|
CVE-2022-0717 - https://huntr.dev/bounties/27a851a5-7ebf-409b-854f-b2614771e8f9
|
|
CVE-2022-0719 - https://huntr.dev/bounties/bcdce15b-7f40-4971-a061-c25c6053c312
|
|
CVE-2022-0720 - https://wpscan.com/vulnerability/435ef99c-9210-46c7-80a4-09cd4d3d00cf
|
|
CVE-2022-0721 - https://huntr.dev/bounties/ae267d39-9750-4c69-be8b-4f915da089fb
|
|
CVE-2022-0723 - https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5
|
|
CVE-2022-0724 - https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062
|
|
CVE-2022-0725 - https://bugzilla.redhat.com/show_bug.cgi?id=2052696
|
|
CVE-2022-0726 - https://huntr.dev/bounties/8928ab08-7fcb-475e-8da7-18e8412c1ac3
|
|
CVE-2022-0727 - https://huntr.dev/bounties/d1faa10f-0640-480c-bb52-089adb351e6e
|
|
CVE-2022-0728 - https://wpscan.com/vulnerability/c6d3d308-4bf1-493f-86e9-dd623526e3c6
|
|
CVE-2022-0729 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0729 - https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea
|
|
CVE-2022-0731 - https://huntr.dev/bounties/e242ab4e-fc70-4b2c-a42d-5b3ee4895de8
|
|
CVE-2022-0732 - https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/
|
|
CVE-2022-0737 - https://wpscan.com/vulnerability/a5c9fa61-e6f1-4460-84fe-977a203bd4bc
|
|
CVE-2022-0739 - https://wpscan.com/vulnerability/388cd42d-b61a-42a4-8604-99b812db2357
|
|
CVE-2022-0742 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2d3916f3189172d5c69d33065c3c21119fe539fc
|
|
CVE-2022-0743 - https://huntr.dev/bounties/32ea4ddb-5b41-4bf9-b5a1-ef455fe2d293
|
|
CVE-2022-0745 - https://wpscan.com/vulnerability/180f8e87-1463-43bb-a901-80031127723a
|
|
CVE-2022-0746 - https://huntr.dev/bounties/b812ea22-0c02-46fe-b89f-04519dfb1ebd
|
|
CVE-2022-0747 - https://wpscan.com/vulnerability/a8575322-c2cf-486a-9c37-71a22167aac3
|
|
CVE-2022-0748 - https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737
|
|
CVE-2022-0749 - https://github.com/SinGooCMS/SinGooCMSUtility/issues/1
|
|
CVE-2022-0749 - https://snyk.io/vuln/SNYK-DOTNET-SINGOOCMSUTILITY-2312979
|
|
CVE-2022-0751 - https://gitlab.com/gitlab-org/gitlab/-/issues/349382
|
|
CVE-2022-0752 - https://huntr.dev/bounties/49940dd2-72c2-4607-857a-1fade7e8f080
|
|
CVE-2022-0753 - https://huntr.dev/bounties/8ce4b776-1c53-45ec-bc5f-783077e2d324
|
|
CVE-2022-0754 - https://huntr.dev/bounties/8afb7991-c6ed-42d9-bd9b-1cc83418df88
|
|
CVE-2022-0755 - https://huntr.dev/bounties/cc767dbc-c676-44c1-a9d1-cd17ae77ee7e
|
|
CVE-2022-0756 - https://huntr.dev/bounties/55164a63-62e4-4fb6-b4ca-87eca14f6f31
|
|
CVE-2022-0760 - https://wpscan.com/vulnerability/1c83ed73-ef02-45c0-a9ab-68a3468d2210
|
|
CVE-2022-0762 - https://huntr.dev/bounties/125b5244-5099-485e-bf75-e5f1ed80dd48
|
|
CVE-2022-0763 - https://huntr.dev/bounties/6de9c621-740d-4d7a-9d77-d90c6c87f3b6
|
|
CVE-2022-0764 - https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c
|
|
CVE-2022-0764 - https://github.com/strapi/strapi/issues/12879
|
|
CVE-2022-0764 - https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5
|
|
CVE-2022-0765 - https://wpscan.com/vulnerability/58838f51-323d-41e0-8c85-8e113dc2c587
|
|
CVE-2022-0766 - https://huntr.dev/bounties/7f2a5bb4-e6c7-4b6a-b8eb-face9e3add7b
|
|
CVE-2022-0767 - https://huntr.dev/bounties/b26fc127-9b6a-4be7-a455-58aefbb62d9e
|
|
CVE-2022-0768 - https://huntr.dev/bounties/9b14cc46-ec08-4940-83cc-9f986b2a5903
|
|
CVE-2022-0769 - https://wpscan.com/vulnerability/05eab45d-ebe9-440f-b9c3-73ec40ef1141
|
|
CVE-2022-0770 - https://wpscan.com/vulnerability/49abe79c-ab1c-4dbf-824c-8daaac7e079d
|
|
CVE-2022-0771 - https://wpscan.com/vulnerability/6139e732-88f2-42cb-9dc3-42ad49731e75
|
|
CVE-2022-0773 - https://wpscan.com/vulnerability/55b89de0-30ed-4f98-935e-51f069faf6fc
|
|
CVE-2022-0775 - https://wpscan.com/vulnerability/b76dbf37-a0a2-48cf-bd85-3ebbc2f394dd/
|
|
CVE-2022-0776 - https://huntr.dev/bounties/be2b7ee4-f487-42e1-874a-6bcc410e4001
|
|
CVE-2022-0777 - https://huntr.dev/bounties/b36be8cd-544f-42bd-990d-aa1a46df44d7
|
|
CVE-2022-0778 - http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
|
|
CVE-2022-0778 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-0778 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-0779 - https://wpscan.com/vulnerability/9d4a3f09-b011-4d87-ab63-332e505cf1cd
|
|
CVE-2022-0780 - https://wpscan.com/vulnerability/0ee7d1a8-9782-4db5-b055-e732f2763825
|
|
CVE-2022-0781 - https://wpscan.com/vulnerability/1a8f9c7b-a422-4f45-a516-c3c14eb05161
|
|
CVE-2022-0782 - https://wpscan.com/vulnerability/b81e824c-d2b1-4381-abee-18c42bb5c2f5
|
|
CVE-2022-0783 - https://wpscan.com/vulnerability/4d594424-8048-482d-b61c-45be1e97a8ba
|
|
CVE-2022-0784 - https://wpscan.com/vulnerability/6672b59f-14bc-4a22-9e0b-fcab4e01d97f
|
|
CVE-2022-0785 - https://wpscan.com/vulnerability/e1e09f56-89a4-4d6f-907b-3fb2cb825255
|
|
CVE-2022-0786 - https://wpscan.com/vulnerability/53f493e9-273b-4349-8a59-f2207e8f8f30
|
|
CVE-2022-0787 - https://wpscan.com/vulnerability/69329a8a-2cbe-4f99-a367-b152bd85b3dd
|
|
CVE-2022-0788 - https://wpscan.com/vulnerability/fbc71710-123f-4c61-9796-a6a4fd354828
|
|
CVE-2022-0812 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=912288442cb2f431bf3c8cb097a5de83bc6dbac1
|
|
CVE-2022-0812 - https://ubuntu.com/security/CVE-2022-0812
|
|
CVE-2022-0814 - https://wpscan.com/vulnerability/fd84dc08-0079-4fcf-81c3-a61d652e3269
|
|
CVE-2022-0817 - https://wpscan.com/vulnerability/69263610-f454-4f27-80af-be523d25659e
|
|
CVE-2022-0818 - https://wpscan.com/vulnerability/c43fabb4-b388-462c-adc4-c6b25af7043b
|
|
CVE-2022-0819 - https://huntr.dev/bounties/b03d4415-d4f9-48c8-9ae2-d3aa248027b5
|
|
CVE-2022-0821 - https://huntr.dev/bounties/0019eb1c-8bf9-4bd0-a27f-aadc173515cb
|
|
CVE-2022-0822 - https://huntr.dev/bounties/06971613-b6ab-4b96-8aa6-4982bfcfeb73
|
|
CVE-2022-0824 - http://packetstormsecurity.com/files/166240/Webmin-1.984-Remote-Code-Execution.html
|
|
CVE-2022-0824 - http://packetstormsecurity.com/files/169700/Webmin-1.984-File-Manager-Remote-Code-Execution.html
|
|
CVE-2022-0824 - https://huntr.dev/bounties/d0049a96-de90-4b1a-9111-94de1044f295
|
|
CVE-2022-0824 - https://notes.netbytesec.com/2022/03/webmin-broken-access-control-to-post-auth-rce.html
|
|
CVE-2022-0825 - https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e
|
|
CVE-2022-0826 - https://wpscan.com/vulnerability/7a3eed3b-c643-4e24-b833-eba60ab631c5
|
|
CVE-2022-0827 - https://wpscan.com/vulnerability/0d208ebc-7805-457b-aa5f-ffd5adb2f3be
|
|
CVE-2022-0828 - https://wpscan.com/vulnerability/7f0742ad-6fd7-4258-9e44-d42e138789bb
|
|
CVE-2022-0829 - https://huntr.dev/bounties/f2d0389f-d7d1-4f34-9f9d-268b0a0da05e
|
|
CVE-2022-0829 - https://notes.netbytesec.com/2022/03/webmin-broken-access-control-to-post-auth-rce.html
|
|
CVE-2022-0830 - https://wpscan.com/vulnerability/114c0202-39f8-4748-ac0d-013d2d6f02f7
|
|
CVE-2022-0833 - https://wpscan.com/vulnerability/b2c7c1e8-d72c-4b1e-b5cb-dc2a6538965d
|
|
CVE-2022-0836 - https://wpscan.com/vulnerability/2a226ae8-7d9c-4f47-90af-8a399a08f03f
|
|
CVE-2022-0837 - https://wpscan.com/vulnerability/0882e5c0-f319-4994-9346-aa18438fda6a
|
|
CVE-2022-0838 - https://huntr.dev/bounties/bd2fb1f1-cc8b-4ef7-8e2b-4ca686d8d614
|
|
CVE-2022-0839 - https://huntr.dev/bounties/f1ae5779-b406-4594-a8a3-d089c68d6e70
|
|
CVE-2022-0839 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-0840 - https://wpscan.com/vulnerability/9da884a9-b4dd-4de0-9afa-722f772cf2df
|
|
CVE-2022-0841 - https://huntr.dev/bounties/4f806dc9-2ecd-4e79-997e-5292f1bea9f1
|
|
CVE-2022-0845 - https://huntr.dev/bounties/a795bf93-c91e-4c79-aae8-f7d8bda92e2a
|
|
CVE-2022-0846 - https://wpscan.com/vulnerability/b030296d-688e-44a4-a48a-140375f2c5f4
|
|
CVE-2022-0847 - http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html
|
|
CVE-2022-0847 - http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html
|
|
CVE-2022-0847 - http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html
|
|
CVE-2022-0847 - http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html
|
|
CVE-2022-0847 - https://dirtypipe.cm4all.com/
|
|
CVE-2022-0848 - http://packetstormsecurity.com/files/166217/part-db-0.5.11-Remote-Code-Execution.html
|
|
CVE-2022-0848 - https://huntr.dev/bounties/3e91685f-cfb9-4ee4-abaf-9b712a8fd5a6
|
|
CVE-2022-0849 - https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24
|
|
CVE-2022-0849 - https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6
|
|
CVE-2022-0850 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe
|
|
CVE-2022-0854 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
|
|
CVE-2022-0856 - https://github.com/cacalabs/libcaca/issues/65
|
|
CVE-2022-0860 - https://huntr.dev/bounties/c458b868-63df-414e-af10-47e3745caa1d
|
|
CVE-2022-0863 - https://wpscan.com/vulnerability/a30212a0-c910-4657-aee1-4a2d72c77983
|
|
CVE-2022-0864 - http://packetstormsecurity.com/files/166631/WordPress-UpdraftPlus-Cross-Site-Scripting.html
|
|
CVE-2022-0864 - https://wpscan.com/vulnerability/7337543f-4c2c-4365-aebf-3423e9d2f872
|
|
CVE-2022-0865 - https://gitlab.com/libtiff/libtiff/-/issues/385
|
|
CVE-2022-0867 - https://wpscan.com/vulnerability/62803aae-9896-410b-9398-3497a838e494
|
|
CVE-2022-0868 - https://huntr.dev/bounties/5f4db013-64bd-4a6b-9dad-870c296b0b02
|
|
CVE-2022-0869 - https://huntr.dev/bounties/ed335a88-f68c-4e4d-ac85-f29a51b03342
|
|
CVE-2022-0870 - https://huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531
|
|
CVE-2022-0871 - https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62
|
|
CVE-2022-0873 - https://wpscan.com/vulnerability/d5ce4b8a-9aa5-4df8-b521-c2105990a87e
|
|
CVE-2022-0874 - https://wpscan.com/vulnerability/36cdd130-9bb7-4274-bac6-07d00008d810
|
|
CVE-2022-0875 - https://wpscan.com/vulnerability/fefc1411-594d-465b-aeb9-78c141b23762
|
|
CVE-2022-0876 - https://wpscan.com/vulnerability/73be6e92-ea37-4416-977d-52ee2afa022a
|
|
CVE-2022-0877 - https://huntr.dev/bounties/b04df4e3-ae5a-4dc6-81ec-496248b15f3c
|
|
CVE-2022-0879 - https://wpscan.com/vulnerability/c12f6087-1875-4edf-ac32-bec6f712968d
|
|
CVE-2022-0881 - https://huntr.dev/bounties/2628431e-6a98-4063-a0e3-a8b1d9ebaa9c
|
|
CVE-2022-0884 - https://wpscan.com/vulnerability/af06b96c-105f-429c-b2ad-c8c823897dba
|
|
CVE-2022-0885 - https://wpscan.com/vulnerability/8b08b72e-5584-4f25-ab73-5ab0f47412df
|
|
CVE-2022-0887 - https://wpscan.com/vulnerability/a6c1676d-9dcb-45f6-833a-9545bccd0ad6
|
|
CVE-2022-0888 - https://gist.github.com/Xib3rR4dAr/5f0accbbfdee279c68ed144da9cd8607
|
|
CVE-2022-0890 - https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276
|
|
CVE-2022-0891 - https://gitlab.com/libtiff/libtiff/-/issues/380
|
|
CVE-2022-0891 - https://gitlab.com/libtiff/libtiff/-/issues/382
|
|
CVE-2022-0892 - https://wpscan.com/vulnerability/e5d95261-a243-493f-be6a-3c15ccb65435
|
|
CVE-2022-0893 - https://huntr.dev/bounties/2859a1c1-941c-4efc-a3ad-a0657c7a77e9
|
|
CVE-2022-0894 - https://huntr.dev/bounties/18f8e85e-3cbf-4915-b649-8cffe99daa95
|
|
CVE-2022-0895 - https://huntr.dev/bounties/3c070828-fd00-476c-be33-9c877172363d
|
|
CVE-2022-0896 - https://huntr.dev/bounties/113056f1-7a78-4205-9f42-940ad41d8df0
|
|
CVE-2022-0898 - https://wpscan.com/vulnerability/f51d8345-3927-4be2-8145-e201371c8c43
|
|
CVE-2022-0899 - https://wpscan.com/vulnerability/1772417a-1abb-4d97-9694-1254840defd1
|
|
CVE-2022-0901 - http://packetstormsecurity.com/files/166626/WordPress-Ad-Inserter-Cross-Site-Scripting.html
|
|
CVE-2022-0901 - https://wpscan.com/vulnerability/85582b4f-a40a-4394-9834-0c88c5dc57ba
|
|
CVE-2022-0903 - https://mattermost.com/security-updates/
|
|
CVE-2022-0904 - https://mattermost.com/security-updates/
|
|
CVE-2022-0905 - https://huntr.dev/bounties/8d221f92-b2b1-4878-bc31-66ff272e5ceb
|
|
CVE-2022-0906 - https://huntr.dev/bounties/87ed3b42-9824-49b0-91a5-fd908a0601e8
|
|
CVE-2022-0907 - https://gitlab.com/libtiff/libtiff/-/issues/392
|
|
CVE-2022-0908 - https://gitlab.com/libtiff/libtiff/-/issues/383
|
|
CVE-2022-0909 - https://gitlab.com/libtiff/libtiff/-/issues/393
|
|
CVE-2022-0911 - https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77
|
|
CVE-2022-0912 - https://huntr.dev/bounties/ae5bb359-7e53-498b-848e-540c05b44c54
|
|
CVE-2022-0913 - https://huntr.dev/bounties/f5f3e468-663b-4df0-8340-a2d77e4cc75f
|
|
CVE-2022-0914 - https://wpscan.com/vulnerability/c328be28-75dd-43db-a5b9-c1ba0636c930
|
|
CVE-2022-0919 - https://wpscan.com/vulnerability/e8f32e0b-4a89-460b-bb78-7c83ef5e16b4
|
|
CVE-2022-0920 - https://wpscan.com/vulnerability/5a5ab7a8-be67-4f70-925c-9cb1eff2fbe0
|
|
CVE-2022-0921 - https://huntr.dev/bounties/e368be37-1cb4-4292-8d48-07132725f622
|
|
CVE-2022-0924 - https://gitlab.com/libtiff/libtiff/-/issues/278
|
|
CVE-2022-0926 - https://huntr.dev/bounties/dc5d1555-0108-4627-b542-93352f35fa17
|
|
CVE-2022-0928 - https://huntr.dev/bounties/085aafdd-ba50-44c7-9650-fa573da29bcd
|
|
CVE-2022-0929 - https://huntr.dev/bounties/66abf7ec-2dd7-4cb7-87f5-e91375883f03
|
|
CVE-2022-0930 - https://huntr.dev/bounties/d184ce19-9608-42f1-bc3d-06ece2d9a993
|
|
CVE-2022-0935 - https://huntr.dev/bounties/a7e40fdf-a333-4a50-8a53-d11b16ce3ec2
|
|
CVE-2022-0936 - https://huntr.dev/bounties/90701766-bfed-409e-b3dd-6ff884373968
|
|
CVE-2022-0937 - https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5
|
|
CVE-2022-0938 - https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e
|
|
CVE-2022-0939 - https://huntr.dev/bounties/768fd7e2-a767-4d8d-a517-e9dda849c6e4
|
|
CVE-2022-0940 - https://huntr.dev/bounties/856bd2e2-db4f-4b7d-9927-222261ae3782
|
|
CVE-2022-0941 - https://huntr.dev/bounties/040a910e-e689-4fcb-9e4f-95206515d1bc
|
|
CVE-2022-0942 - https://huntr.dev/bounties/a412707c-18da-4c84-adc0-9801ed8068c9
|
|
CVE-2022-0943 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-0943 - https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1
|
|
CVE-2022-0944 - https://huntr.dev/bounties/46630727-d923-4444-a421-537ecd63e7fb
|
|
CVE-2022-0945 - https://huntr.dev/bounties/8702e2bf-4af2-4391-b651-c8c89e7d089e
|
|
CVE-2022-0946 - https://huntr.dev/bounties/1f8f0021-396e-428e-9748-dd4e359715e1
|
|
CVE-2022-0948 - https://wpscan.com/vulnerability/daad48df-6a25-493f-9d1d-17b897462576
|
|
CVE-2022-0949 - https://wpscan.com/vulnerability/a0fbb79a-e160-49df-9cf2-18ab64ea66cb
|
|
CVE-2022-0950 - https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc
|
|
CVE-2022-0951 - https://huntr.dev/bounties/b3a983a3-17f9-4aa8-92d7-8a0c92a93932
|
|
CVE-2022-0952 - https://wpscan.com/vulnerability/0f694961-afab-44f9-846c-e80a0f6c768b
|
|
CVE-2022-0953 - https://wpscan.com/vulnerability/29ab3c7b-58e0-4a72-b7b4-ab12a6d54f5a
|
|
CVE-2022-0954 - https://huntr.dev/bounties/b99517c0-37fc-4efa-ab1a-3591da7f4d26
|
|
CVE-2022-0955 - https://huntr.dev/bounties/708971a6-1e6c-4c51-a411-255caeba51df
|
|
CVE-2022-0956 - https://huntr.dev/bounties/5b0e3f02-309f-4b59-8020-d7ac0f1999f2
|
|
CVE-2022-0957 - https://huntr.dev/bounties/b4918d45-b635-40db-bb4b-34035e1aca21
|
|
CVE-2022-0958 - https://wpscan.com/vulnerability/05034521-6eb9-43b9-8f03-7e0de60e3022
|
|
CVE-2022-0960 - https://huntr.dev/bounties/462cd8a7-b1a9-4e93-af71-b56ba1d7ad4e
|
|
CVE-2022-0961 - https://huntr.dev/bounties/cdf00e14-38a7-4b6b-9bb4-3a71bf24e436
|
|
CVE-2022-0962 - https://huntr.dev/bounties/7ebe3e5f-2c86-44de-b83e-2ddb6bbda908
|
|
CVE-2022-0963 - https://huntr.dev/bounties/a89a4198-0880-4aa2-8439-a463f39f244c
|
|
CVE-2022-0964 - https://huntr.dev/bounties/dbe39998-8eb7-46ea-997f-7b27f6f16ea0
|
|
CVE-2022-0965 - https://huntr.dev/bounties/d66c88ce-63e2-4515-a429-8e43a42aa347
|
|
CVE-2022-0966 - https://huntr.dev/bounties/e06c0d55-00a3-4f82-a009-0310b2e402fe
|
|
CVE-2022-0967 - http://packetstormsecurity.com/files/167198/Showdoc-2.10.3-Cross-Site-Scripting.html
|
|
CVE-2022-0967 - https://huntr.dev/bounties/9dea3c98-7609-480d-902d-149067bd1e2a
|
|
CVE-2022-0968 - https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e
|
|
CVE-2022-0969 - https://wpscan.com/vulnerability/59a7a441-7384-4006-89b4-15345f70fabf
|
|
CVE-2022-0970 - https://huntr.dev/bounties/dd436c44-cbf4-48ac-8817-3a24872534ec
|
|
CVE-2022-0986 - https://huntr.dev/bounties/57635c78-303f-412f-b75a-623df9fa9edd
|
|
CVE-2022-0989 - https://wpscan.com/vulnerability/a6bfc150-8e3f-4b2d-a6e1-09406af41dd4
|
|
CVE-2022-0990 - https://huntr.dev/bounties/31649903-c19c-4dae-aee0-a04b095855c5
|
|
CVE-2022-0991 - https://huntr.dev/bounties/1c406a4e-15d0-4920-8495-731c48473ba4
|
|
CVE-2022-0994 - https://wpscan.com/vulnerability/e9dd62fc-bb79-4a6b-b99c-60e40f010d7a
|
|
CVE-2022-0995 - http://packetstormsecurity.com/files/166770/Linux-watch_queue-Filter-Out-Of-Bounds-Write.html
|
|
CVE-2022-0995 - http://packetstormsecurity.com/files/166815/Watch-Queue-Out-Of-Bounds-Write.html
|
|
CVE-2022-0995 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93ce93587d36493f2f86921fa79921b3cba63fbb
|
|
CVE-2022-0996 - https://github.com/ByteHackr/389-ds-base
|
|
CVE-2022-1000 - https://huntr.dev/bounties/5995a93f-0c4b-4f7d-aa59-a64424219424
|
|
CVE-2022-1001 - https://wpscan.com/vulnerability/34a7b3cd-e2b5-4891-ab33-af6a2a0eeceb
|
|
CVE-2022-1002 - https://mattermost.com/security-updates/
|
|
CVE-2022-1003 - https://mattermost.com/security-updates/
|
|
CVE-2022-1005 - https://wpscan.com/vulnerability/f37d1d55-10cc-4202-8d16-9ec2128f54f9
|
|
CVE-2022-1006 - https://wpscan.com/vulnerability/c5569317-b8c8-4524-8375-3e2369bdcc68
|
|
CVE-2022-1007 - https://wpscan.com/vulnerability/6f5b764b-d13b-4371-9cc5-91204d9d6358
|
|
CVE-2022-1008 - https://wpscan.com/vulnerability/0c2e2b4d-49eb-4fd9-b9f0-3feae80c1082
|
|
CVE-2022-1009 - https://wpscan.com/vulnerability/bb5af08f-bb19-46a1-a7ac-8381f428c11e
|
|
CVE-2022-1010 - https://wpscan.com/vulnerability/e9e4dfbe-01b2-4003-80ed-db1e45f38b2b
|
|
CVE-2022-1011 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-1013 - https://wpscan.com/vulnerability/eed70659-9e3e-42a2-b427-56c52e0fbc0d
|
|
CVE-2022-1014 - https://wpscan.com/vulnerability/eb9e202d-04aa-4343-86a2-4aa2edaa7f6b
|
|
CVE-2022-1015 - http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
|
|
CVE-2022-1015 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
|
|
CVE-2022-1015 - http://www.openwall.com/lists/oss-security/2023/01/13/2
|
|
CVE-2022-1015 - http://www.openwall.com/lists/oss-security/2023/02/23/1
|
|
CVE-2022-1016 - http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
|
|
CVE-2022-1020 - https://wpscan.com/vulnerability/04fe89b3-8ad1-482f-a96d-759d1d3a0dd5
|
|
CVE-2022-1021 - https://huntr.dev/bounties/a8187478-75e1-4d62-b894-651269401ca3
|
|
CVE-2022-1022 - https://huntr.dev/bounties/2e4ac6b5-7357-415d-9633-65c636b20e94
|
|
CVE-2022-1023 - https://wpscan.com/vulnerability/163069cd-98a8-4cfb-8b58-a6727a7d5c48
|
|
CVE-2022-1026 - https://www.rapid7.com/blog/post/2022/03/29/cve-2022-1026-kyocera-net-view-address-book-exposure/
|
|
CVE-2022-1027 - https://wpscan.com/vulnerability/9dbb0d6d-bc84-4b85-8aa5-fa2a8e6fa5e3
|
|
CVE-2022-1028 - https://wpscan.com/vulnerability/16fc08ec-8476-4f3c-93ea-6a51ed880dd5
|
|
CVE-2022-1029 - https://wpscan.com/vulnerability/0e74eeb4-89e2-4873-904f-ad4f25c4a8ba
|
|
CVE-2022-1031 - https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457
|
|
CVE-2022-1032 - https://huntr.dev/bounties/cb9a0393-be34-4021-a06c-00c7791c7622
|
|
CVE-2022-1033 - https://huntr.dev/bounties/4d7d4fc9-e0cf-42d3-b89c-6ea57a769045
|
|
CVE-2022-1034 - https://huntr.dev/bounties/d205c489-3266-4ac4-acb7-c8ee570887f7
|
|
CVE-2022-1037 - https://wpscan.com/vulnerability/bd8555bd-8086-41d0-a1f7-3557bc3af957
|
|
CVE-2022-1040 - http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html
|
|
CVE-2022-1040 - https://www.exploit-db.com/exploits/51006
|
|
CVE-2022-1043 - http://packetstormsecurity.com/files/170834/io_uring-Same-Type-Object-Reuse-Privilege-Escalation.html
|
|
CVE-2022-1044 - https://huntr.dev/bounties/ff878be9-563a-4d0e-99c1-fc3c767f6d3e
|
|
CVE-2022-1045 - https://huntr.dev/bounties/b0c4f992-4ac8-4479-82f4-367ed1a2a826
|
|
CVE-2022-1046 - https://wpscan.com/vulnerability/a1ae4512-0b5b-4f36-8334-14633bf24758
|
|
CVE-2022-1047 - https://wpscan.com/vulnerability/078bd5f6-64f7-4665-825b-9fd0c2b7b91b
|
|
CVE-2022-1049 - https://huntr.dev/bounties/7aa921fc-a568-4fd8-96f4-7cd826246aa5
|
|
CVE-2022-1049 - https://huntr.dev/bounties/7aa921fc-a568-4fd8-96f4-7cd826246aa5/
|
|
CVE-2022-1051 - https://wpscan.com/vulnerability/cb2fa587-da2f-460e-a402-225df7744765
|
|
CVE-2022-1052 - https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7
|
|
CVE-2022-1054 - https://wpscan.com/vulnerability/95a5fad1-e823-4571-8640-19bf5436578d
|
|
CVE-2022-1055 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
|
|
CVE-2022-1055 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
|
|
CVE-2022-1056 - https://gitlab.com/libtiff/libtiff/-/issues/391
|
|
CVE-2022-1057 - https://wpscan.com/vulnerability/7c33ffc3-84d1-4a0f-a837-794cdc3ad243
|
|
CVE-2022-1058 - https://huntr.dev/bounties/4fb42144-ac70-4f76-a5e1-ef6b5e55dc0d
|
|
CVE-2022-1061 - https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522
|
|
CVE-2022-1061 - https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7
|
|
CVE-2022-1062 - https://wpscan.com/vulnerability/e770ba87-95d2-40c9-89cc-5d7390e9cbb0
|
|
CVE-2022-1063 - https://wpscan.com/vulnerability/f90c528b-8c3a-4f9a-aa36-099c24abe082
|
|
CVE-2022-1064 - https://huntr.dev/bounties/2f664985-c5fc-485b-b4fc-4c401be2cf40
|
|
CVE-2022-1065 - https://www.redguard.ch/advisories/abacus_mfa_bypass.txt
|
|
CVE-2022-1071 - https://huntr.dev/bounties/6597ece9-07af-415b-809b-919ce0a17cf3
|
|
CVE-2022-1073 - https://vuldb.com/?id.194839
|
|
CVE-2022-1074 - https://vuldb.com/?id.194845
|
|
CVE-2022-1075 - https://vuldb.com/?id.194846
|
|
CVE-2022-1077 - https://vuldb.com/?id.194848
|
|
CVE-2022-1078 - https://vuldb.com/?id.194856
|
|
CVE-2022-1079 - https://vuldb.com/?id.195426
|
|
CVE-2022-1081 - https://vuldb.com/?id.195640
|
|
CVE-2022-1082 - https://vuldb.com/?id.195641
|
|
CVE-2022-1083 - https://vuldb.com/?id.195642
|
|
CVE-2022-1084 - https://vuldb.com/?id.195643
|
|
CVE-2022-1085 - https://vuldb.com/?id.194857
|
|
CVE-2022-1086 - https://github.com/xiahao90/CVEproject/blob/main/DolphinPHPV1.5.0_xss.md
|
|
CVE-2022-1086 - https://vuldb.com/?id.195368
|
|
CVE-2022-1087 - https://github.com/liaojia-99/project/blob/main/htmly/1.md
|
|
CVE-2022-1087 - https://vuldb.com/?id.195203
|
|
CVE-2022-1088 - https://wpscan.com/vulnerability/e86d456d-7a54-43e8-acf1-0b6a0a8bb41b
|
|
CVE-2022-1089 - https://wpscan.com/vulnerability/75a9fd23-7fa9-4cb1-a55b-ec5deae5d6fa
|
|
CVE-2022-1090 - https://wpscan.com/vulnerability/3993fa42-b4c3-462b-b568-0a08fe112c19
|
|
CVE-2022-1091 - https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3
|
|
CVE-2022-1092 - https://wpscan.com/vulnerability/95759d5c-8802-4493-b7e5-7f2bc546af61
|
|
CVE-2022-1093 - https://wpscan.com/vulnerability/57017050-811e-474d-8256-33d19d4c0553
|
|
CVE-2022-1094 - https://wpscan.com/vulnerability/3c03816b-e381-481c-b9f5-63d0c24ff329
|
|
CVE-2022-1095 - https://wpscan.com/vulnerability/bf476a3e-05ba-4b54-8a65-3d261ad5337b
|
|
CVE-2022-1103 - https://wpscan.com/vulnerability/9ddeef95-7c7f-4296-a55b-fd3304c91c18
|
|
CVE-2022-1104 - https://wpscan.com/vulnerability/4d4709f3-ad38-4519-a24a-73bc04b20e52
|
|
CVE-2022-1106 - https://huntr.dev/bounties/16b9d0ea-71ed-41bc-8a88-2deb4c20be8f
|
|
CVE-2022-1112 - https://wpscan.com/vulnerability/746c7cf2-0902-461a-a364-285505d73505
|
|
CVE-2022-1113 - https://wpscan.com/vulnerability/ea438e84-f842-4cb9-b6c0-550cd8187701
|
|
CVE-2022-1115 - https://github.com/ImageMagick/ImageMagick/issues/4974
|
|
CVE-2022-1116 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
|
|
CVE-2022-1119 - https://docs.google.com/document/d/1qIZXTzEpI4tO6832vk1KfsSAroT0FY2l--THlhJ8z3c/edit
|
|
CVE-2022-1119 - https://wpscan.com/vulnerability/075a3cc5-1970-4b64-a16f-3ec97e22b606
|
|
CVE-2022-1122 - https://github.com/uclouvain/openjpeg/issues/1368
|
|
CVE-2022-1123 - https://wpscan.com/vulnerability/03e0d4d5-0184-4a15-b8ac-fdc2010e4812
|
|
CVE-2022-1134 - http://packetstormsecurity.com/files/172851/Chrome-Renderer-Type-Confusion-Remote-Code-Execution.html
|
|
CVE-2022-1148 - https://gitlab.com/gitlab-org/gitlab/-/issues/350687
|
|
CVE-2022-1152 - https://wpscan.com/vulnerability/1c55fda9-e938-4267-be77-a6d73ee46af3
|
|
CVE-2022-1153 - https://wpscan.com/vulnerability/1d9d5516-f1c3-4134-b6bf-7f2f890533c4
|
|
CVE-2022-1154 - https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
|
|
CVE-2022-1154 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-1155 - https://huntr.dev/bounties/ebc26354-2414-4f72-88aa-f044aec2b2e1
|
|
CVE-2022-1156 - https://wpscan.com/vulnerability/76ad4273-6bf4-41e9-99a8-bf6d634608ac
|
|
CVE-2022-1160 - https://huntr.dev/bounties/a6f3222d-2472-439d-8881-111138a5694c
|
|
CVE-2022-1162 - http://packetstormsecurity.com/files/166828/Gitlab-14.9-Authentication-Bypass.html
|
|
CVE-2022-1163 - http://packetstormsecurity.com/files/166629/minewebcms-1.15.2-Cross-Site-Scripting.html
|
|
CVE-2022-1163 - https://huntr.dev/bounties/44d40f34-c391-40c0-a517-12a2c0258149
|
|
CVE-2022-1163 - https://www.exploit-db.com/exploits/50853
|
|
CVE-2022-1164 - https://wpscan.com/vulnerability/157a9a76-3e5f-4d27-aefc-cb9cb88b3286
|
|
CVE-2022-1165 - https://wpscan.com/vulnerability/10d85913-ea8c-4c2e-a32e-fa61cf191710
|
|
CVE-2022-1166 - https://wpscan.com/vulnerability/ea6646ac-f71f-4340-965d-fab272da5189
|
|
CVE-2022-1167 - https://wpscan.com/vulnerability/a30a1430-c474-4cd1-877c-35c4ab624170
|
|
CVE-2022-1168 - https://wpscan.com/vulnerability/bcf38e87-011e-4540-8bfb-c93443a4a490
|
|
CVE-2022-1169 - https://wpscan.com/vulnerability/f3a1dcad-528a-4ecc-ac8e-728caa7c9878
|
|
CVE-2022-1170 - https://wpscan.com/vulnerability/2ecb18e6-b575-4a20-bd31-94d24f1d1efc
|
|
CVE-2022-1171 - https://wpscan.com/vulnerability/dc5eace4-542f-47e9-b870-a6aae6a38b0f
|
|
CVE-2022-1172 - https://huntr.dev/bounties/a26cb79c-9257-4fbf-98c5-a5a331efa264
|
|
CVE-2022-1173 - https://huntr.dev/bounties/b6016e95-9f48-4945-89cb-199b6e072218
|
|
CVE-2022-1174 - https://gitlab.com/gitlab-org/gitlab/-/issues/338721
|
|
CVE-2022-1175 - http://packetstormsecurity.com/files/166829/Gitlab-14.9-Cross-Site-Scripting.html
|
|
CVE-2022-1176 - https://huntr.dev/bounties/3e30171b-c9bf-415c-82f1-6f55a44d09d3
|
|
CVE-2022-1182 - https://wpscan.com/vulnerability/01d108bb-d134-4651-9c74-babcc88da177
|
|
CVE-2022-1185 - https://gitlab.com/gitlab-org/gitlab/-/issues/349148
|
|
CVE-2022-1191 - https://huntr.dev/bounties/7264a2e1-17e7-4244-93e4-49ec14f282b3
|
|
CVE-2022-1192 - https://wpscan.com/vulnerability/18660c71-5a89-4ef6-b0dd-7a166e3449d6
|
|
CVE-2022-1193 - https://gitlab.com/gitlab-org/gitlab/-/issues/351823
|
|
CVE-2022-1194 - https://wpscan.com/vulnerability/62be0991-f095-43cf-a167-3daaed254594
|
|
CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b9111922b1f399aba6ed1e1b8f2079c3da1aed8
|
|
CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e0588c291d6ce225f2b891753ca41d45ba42469
|
|
CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71
|
|
CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b2f37aead1b82a770c48b5d583f35ec22aabb61e
|
|
CVE-2022-1196 - https://bugzilla.mozilla.org/show_bug.cgi?id=1750679
|
|
CVE-2022-1201 - https://huntr.dev/bounties/6f930add-c9d8-4870-ae56-d4bd8354703b
|
|
CVE-2022-1202 - https://wpscan.com/vulnerability/53c8190c-baef-4807-970b-f01ab440576a
|
|
CVE-2022-1203 - https://wpscan.com/vulnerability/3c9969e5-ca8e-4e5d-a482-c6b5c4257820
|
|
CVE-2022-1207 - https://huntr.dev/bounties/7b979e76-ae54-4132-b455-0833e45195eb
|
|
CVE-2022-1210 - https://gitlab.com/libtiff/libtiff/-/issues/402
|
|
CVE-2022-1210 - https://vuldb.com/?id.196363
|
|
CVE-2022-1211 - https://github.com/tildearrow/furnace/issues/325
|
|
CVE-2022-1211 - https://vuldb.com/?id.196371
|
|
CVE-2022-1212 - https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe
|
|
CVE-2022-1213 - https://huntr.dev/bounties/084387f6-5b9c-4017-baa2-5fcf65b051e1
|
|
CVE-2022-1216 - https://wpscan.com/vulnerability/31a5b138-3d9e-4cd6-b85c-d20406ab51bd
|
|
CVE-2022-1217 - https://wpscan.com/vulnerability/15875f52-7a49-44c7-8a36-b49ddf37c20c
|
|
CVE-2022-1218 - https://wpscan.com/vulnerability/fc1e8681-9229-4645-bc22-4897522d0c65
|
|
CVE-2022-1219 - https://huntr.dev/bounties/f700bd18-1fd3-4a05-867f-07176aebc7f6
|
|
CVE-2022-1220 - https://wpscan.com/vulnerability/eb58f43e-4304-40e7-9e0f-d0d6fe049724
|
|
CVE-2022-1221 - https://wpscan.com/vulnerability/641be9f6-2f74-4386-b16e-4b9488f0d2a9
|
|
CVE-2022-1222 - https://huntr.dev/bounties/f8cb85b8-7ff3-47f1-a9a6-7080eb371a3d
|
|
CVE-2022-1223 - https://huntr.dev/bounties/baec4c23-2466-4b13-b3c0-eaf1d000d4ab
|
|
CVE-2022-1224 - https://huntr.dev/bounties/cd9e1508-5682-427e-a921-14b4f520b85a
|
|
CVE-2022-1225 - https://huntr.dev/bounties/49b44cfa-d142-4d79-b529-7805507169d2
|
|
CVE-2022-1231 - https://huntr.dev/bounties/27db9509-6cd3-4148-8d70-5942f3837604
|
|
CVE-2022-1233 - https://huntr.dev/bounties/228d5548-1109-49f8-8aee-91038e88371c
|
|
CVE-2022-1235 - https://huntr.dev/bounties/92f7b2d4-fa88-4c62-a2ee-721eebe01705
|
|
CVE-2022-1237 - https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40
|
|
CVE-2022-1238 - https://huntr.dev/bounties/47422cdf-aad2-4405-a6a1-6f63a3a93200
|
|
CVE-2022-1239 - https://wpscan.com/vulnerability/4ad2bb96-87a4-4590-a058-b03b33d2fcee
|
|
CVE-2022-1240 - https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc
|
|
CVE-2022-1241 - https://wpscan.com/vulnerability/3258393a-eafb-4356-994e-2ff8ce223c9b
|
|
CVE-2022-1243 - https://huntr.dev/bounties/8c5afc47-1553-4eba-a98e-024e4cc3dfb7
|
|
CVE-2022-1244 - https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82
|
|
CVE-2022-1247 - https://bugzilla.redhat.com/show_bug.cgi?id=2066799
|
|
CVE-2022-1248 - http://packetstormsecurity.com/files/166609/SAP-Information-System-1.0.0-Missing-Authorization.html
|
|
CVE-2022-1248 - https://vuldb.com/?id.196550
|
|
CVE-2022-1250 - https://wpscan.com/vulnerability/1f8cb0b9-7447-44db-8d13-292db5b17718
|
|
CVE-2022-1251 - https://wpscan.com/vulnerability/34b3fc35-381a-4bd7-87e3-f1ef0a15a349
|
|
CVE-2022-1252 - https://0g.vc/posts/insecure-cipher-gnuboard5/
|
|
CVE-2022-1252 - https://huntr.dev/bounties/c8c2c3e1-67d0-4a11-a4d4-11af567a9ebb
|
|
CVE-2022-1253 - https://huntr.dev/bounties/1-other-strukturag/libde265
|
|
CVE-2022-1255 - https://wpscan.com/vulnerability/22fe68c4-8f47-491e-be87-5e8e40535a82
|
|
CVE-2022-1256 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382
|
|
CVE-2022-1257 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382
|
|
CVE-2022-1258 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382
|
|
CVE-2022-1263 - https://www.openwall.com/lists/oss-security/2022/04/07/1
|
|
CVE-2022-1265 - https://wpscan.com/vulnerability/9b66819d-8479-4c0b-b206-7f7ff769f758
|
|
CVE-2022-1266 - https://wpscan.com/vulnerability/7800d583-fcfc-4360-9dc3-af3f73e12ab4
|
|
CVE-2022-1267 - https://wpscan.com/vulnerability/ed2971c2-b99c-4320-ac46-bea5a0a493ed
|
|
CVE-2022-1268 - https://wpscan.com/vulnerability/6d596afb-cac3-4ef2-9742-235c068d1006
|
|
CVE-2022-1269 - https://wpscan.com/vulnerability/65ff0e71-0fcd-4357-9b00-143cb18901bf
|
|
CVE-2022-1273 - https://wpscan.com/vulnerability/ad99b9ba-5f24-4682-a787-00f0e8e32603
|
|
CVE-2022-1274 - https://herolab.usd.de/security-advisories/usd-2021-0033/
|
|
CVE-2022-1275 - https://wpscan.com/vulnerability/bc2e5be3-cd2b-4ee9-8d7a-cabce46b7092
|
|
CVE-2022-1276 - https://huntr.dev/bounties/6ea041d1-e2aa-472c-bf3e-da5fa8726c25
|
|
CVE-2022-1280 - https://www.openwall.com/lists/oss-security/2022/04/12/3
|
|
CVE-2022-1281 - https://wpscan.com/vulnerability/2b4866f2-f511-41c6-8135-cf1e0263d8de
|
|
CVE-2022-1282 - https://wpscan.com/vulnerability/37a58f4e-d2bc-4825-8e1b-4aaf0a1cf1b6
|
|
CVE-2022-1283 - https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013
|
|
CVE-2022-1284 - https://huntr.dev/bounties/e98ad92c-3a64-48fb-84d4-d13afdbcbdd7
|
|
CVE-2022-1285 - https://huntr.dev/bounties/da1fbd6e-7a02-458e-9c2e-6d226c47046d
|
|
CVE-2022-1286 - https://huntr.dev/bounties/f918376e-b488-4113-963d-ffe8716e4189
|
|
CVE-2022-1287 - https://vuldb.com/?id.196750
|
|
CVE-2022-1288 - https://vuldb.com/?id.196751
|
|
CVE-2022-1289 - https://github.com/tildearrow/furnace/issues/325#issuecomment-1094139655
|
|
CVE-2022-1290 - https://huntr.dev/bounties/da6d03e6-053f-43b6-99a7-78c2e386e3ed
|
|
CVE-2022-1291 - https://huntr.dev/bounties/49a14371-6058-47dd-9801-ec38a7459fc5
|
|
CVE-2022-1292 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-1294 - https://wpscan.com/vulnerability/205a24b8-6d14-4458-aecd-79748e1324c7
|
|
CVE-2022-1295 - https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a
|
|
CVE-2022-1296 - https://huntr.dev/bounties/52b57274-0e1a-4d61-ab29-1373b555fea0
|
|
CVE-2022-1297 - https://huntr.dev/bounties/ec538fa4-06c6-4050-a141-f60153ddeaac
|
|
CVE-2022-1298 - https://wpscan.com/vulnerability/e124d1ab-3e02-4ca5-8218-ce635e8bf074
|
|
CVE-2022-1299 - https://wpscan.com/vulnerability/8c46adb1-82d7-4621-a8c3-15cd90e98b96
|
|
CVE-2022-1301 - https://wpscan.com/vulnerability/69b75983-1010-453e-bf67-27b4a2a327a8
|
|
CVE-2022-1303 - https://wpscan.com/vulnerability/590b446d-f8bc-49b0-93e7-2a6f2e6f62f1
|
|
CVE-2022-1316 - https://huntr.dev/bounties/e7835226-1b20-4546-b256-3f625badb022
|
|
CVE-2022-1320 - https://wpscan.com/vulnerability/43581d6b-333a-48d9-a1ae-b9479da8ff87
|
|
CVE-2022-1321 - https://wpscan.com/vulnerability/b8784995-0deb-4c83-959f-52b37881e05c
|
|
CVE-2022-1322 - https://wpscan.com/vulnerability/e1724471-26bd-4cb3-a279-51783102ed0c
|
|
CVE-2022-1323 - https://wpscan.com/vulnerability/2d8020e1-6489-4555-9956-2dc190aaa61b
|
|
CVE-2022-1324 - https://wpscan.com/vulnerability/2ce2a387-acc8-482a-9452-a4d9acb187fd
|
|
CVE-2022-1325 - https://github.com/GreycLab/CImg/issues/343
|
|
CVE-2022-1325 - https://huntr.dev/bounties/a5e4fc45-8f14-4dd1-811b-740fc50c95d2/
|
|
CVE-2022-1326 - https://wpscan.com/vulnerability/f57615d9-a567-4c2a-9f06-2c6b61f56074
|
|
CVE-2022-1327 - https://wpscan.com/vulnerability/6b71eb38-0a4a-49d1-96bc-84bbe675be1e
|
|
CVE-2022-1328 - http://packetstormsecurity.com/files/167717/Mutt-mutt_decode_uuencoded-Memory-Disclosure.html
|
|
CVE-2022-1329 - http://packetstormsecurity.com/files/168615/WordPress-Elementor-3.6.2-Shell-Upload.html
|
|
CVE-2022-1332 - https://mattermost.com/security-updates/
|
|
CVE-2022-1333 - https://mattermost.com/security-updates/
|
|
CVE-2022-1334 - https://wpscan.com/vulnerability/af3b32c9-f386-4bb6-a362-86a27f49a739
|
|
CVE-2022-1335 - https://wpscan.com/vulnerability/cfc80857-8674-478f-9604-7a8849e5b85e
|
|
CVE-2022-1336 - https://wpscan.com/vulnerability/39e127f1-c36e-4699-892f-3755ee17bab6
|
|
CVE-2022-1337 - https://mattermost.com/security-updates/
|
|
CVE-2022-1338 - https://wpscan.com/vulnerability/51b91d0e-33af-41ce-b95f-d422586f1d5f
|
|
CVE-2022-1339 - https://huntr.dev/bounties/ae8dc737-844e-40da-a9f7-e72d8e50f6f9
|
|
CVE-2022-1340 - https://huntr.dev/bounties/4746f149-fc55-48a1-a7ab-fd7c7412c05a
|
|
CVE-2022-1344 - https://huntr.dev/bounties/35f66966-af13-4f07-9734-0c50fdfc3a8c
|
|
CVE-2022-1345 - https://huntr.dev/bounties/781b5c2a-bc98-41a0-a276-ea12399e5a25
|
|
CVE-2022-1346 - https://huntr.dev/bounties/8fe435b0-192f-41ca-b41e-580fcd34892f
|
|
CVE-2022-1347 - https://huntr.dev/bounties/6059501f-05d2-4e76-ae03-5eb64835e6bf
|
|
CVE-2022-1349 - https://wpscan.com/vulnerability/7ee95a53-5fe9-404c-a77a-d1218265e4aa
|
|
CVE-2022-1351 - https://huntr.dev/bounties/c23ae6c2-2e53-4bf5-85b0-e90418476615
|
|
CVE-2022-1354 - https://gitlab.com/libtiff/libtiff/-/issues/319
|
|
CVE-2022-1355 - https://gitlab.com/libtiff/libtiff/-/issues/400
|
|
CVE-2022-1379 - https://huntr.dev/bounties/0d737527-86e1-41d1-9d37-b2de36bc063a
|
|
CVE-2022-1380 - https://huntr.dev/bounties/3d45cfca-3a72-4578-b735-98837b998a12
|
|
CVE-2022-1381 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1381 - https://huntr.dev/bounties/55f9c0e8-c221-48b6-a00e-bdcaebaba4a4
|
|
CVE-2022-1382 - https://huntr.dev/bounties/d8b6d239-6d7b-4783-b26b-5be848c01aa1
|
|
CVE-2022-1383 - https://huntr.dev/bounties/02b4b563-b946-4343-9092-38d1c5cd60c9
|
|
CVE-2022-1384 - https://mattermost.com/security-updates/
|
|
CVE-2022-1385 - https://mattermost.com/security-updates/
|
|
CVE-2022-1386 - https://wpscan.com/vulnerability/bf7034ab-24c4-461f-a709-3f73988b536b
|
|
CVE-2022-1386 - https://www.rootshellsecurity.net/rootshell-discovered-a-critical-vulnerability-in-top-wordpress-theme/
|
|
CVE-2022-1387 - https://wpscan.com/vulnerability/48252ffb-f21c-4e2a-8f78-bdc7164e7347
|
|
CVE-2022-1388 - http://packetstormsecurity.com/files/167007/F5-BIG-IP-Remote-Code-Execution.html
|
|
CVE-2022-1388 - http://packetstormsecurity.com/files/167118/F5-BIG-IP-16.0.x-Remote-Code-Execution.html
|
|
CVE-2022-1388 - http://packetstormsecurity.com/files/167150/F5-BIG-IP-iControl-Remote-Code-Execution.html
|
|
CVE-2022-1390 - https://packetstormsecurity.com/files/166476/
|
|
CVE-2022-1390 - https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990
|
|
CVE-2022-1391 - https://packetstormsecurity.com/files/166533/
|
|
CVE-2022-1391 - https://wpscan.com/vulnerability/680121fe-6668-4c1a-a30d-e70dd9be5aac
|
|
CVE-2022-1392 - https://packetstormsecurity.com/files/166534/
|
|
CVE-2022-1392 - https://wpscan.com/vulnerability/fe3da8c1-ae21-4b70-b3f5-a7d014aa3815
|
|
CVE-2022-1393 - https://wpscan.com/vulnerability/3491b889-94dd-4507-9fed-58f48d8275cf
|
|
CVE-2022-1394 - https://wpscan.com/vulnerability/f7a0df37-3204-4926-84ec-2204a2f22de3
|
|
CVE-2022-1395 - https://wpscan.com/vulnerability/e5c06b38-fab8-44af-84dc-df94eb72ce80
|
|
CVE-2022-1396 - https://packetstormsecurity.com/files/166531/
|
|
CVE-2022-1396 - https://wpscan.com/vulnerability/721ddc3e-ab24-4834-bd47-4eb6700439a9
|
|
CVE-2022-1397 - https://huntr.dev/bounties/5f69e094-ab8c-47a3-b01d-8c12a3b14c61
|
|
CVE-2022-1398 - https://wpscan.com/vulnerability/5440d177-e995-403e-b2c9-42ceda14579e
|
|
CVE-2022-1399 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/
|
|
CVE-2022-1400 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/
|
|
CVE-2022-1401 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/
|
|
CVE-2022-1407 - https://wpscan.com/vulnerability/19a9e266-daf6-4cc5-a300-2b5436b6d07d
|
|
CVE-2022-1408 - https://wpscan.com/vulnerability/48dccf4c-07e0-4877-867d-f8f43aeb5705
|
|
CVE-2022-1409 - https://wpscan.com/vulnerability/1330f8f7-4a59-4e9d-acae-21656a4101fe
|
|
CVE-2022-1410 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/
|
|
CVE-2022-1411 - https://huntr.dev/bounties/75c7cf09-d118-4f91-9686-22b142772529
|
|
CVE-2022-1412 - https://wpscan.com/vulnerability/ee10f21f-4476-4f3d-85ed-94d438c61ec2
|
|
CVE-2022-1416 - https://gitlab.com/gitlab-org/gitlab/-/issues/342988
|
|
CVE-2022-1417 - https://hackerone.com/reports/1075586
|
|
CVE-2022-1418 - https://wpscan.com/vulnerability/3851e61e-f462-4259-af0a-8d832809d559
|
|
CVE-2022-1420 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1420 - https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326
|
|
CVE-2022-1421 - https://wpscan.com/vulnerability/a7a24e8e-9056-4967-bcad-b96cc0c5b249
|
|
CVE-2022-1422 - https://wpscan.com/vulnerability/29aff4bf-1691-4dc1-a670-1f2c9a765a3b
|
|
CVE-2022-1424 - https://wpscan.com/vulnerability/147b4097-dec8-4542-b122-7b237db81c05
|
|
CVE-2022-1425 - https://wpscan.com/vulnerability/b110e2f7-4aa3-47b5-a8f2-0a7fe53cc467
|
|
CVE-2022-1427 - https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301
|
|
CVE-2022-1429 - https://huntr.dev/bounties/cfba30b4-85fa-4499-9160-cd6e3119310e
|
|
CVE-2022-1430 - https://huntr.dev/bounties/0cd30d71-1e32-4a0b-b4c3-faaa1907b541
|
|
CVE-2022-1432 - https://huntr.dev/bounties/cb545c63-a3c1-4d57-8f06-e4593ab389bf
|
|
CVE-2022-1435 - https://wpscan.com/vulnerability/ef5aa8a7-23a7-4ce0-bb09-d9c986386114
|
|
CVE-2022-1436 - https://wpscan.com/vulnerability/d5c6f894-6ad1-46f4-bd77-17ad9234cfc3
|
|
CVE-2022-1437 - https://huntr.dev/bounties/af6c3e9e-b7df-4d80-b48f-77fdd17b4038
|
|
CVE-2022-1439 - https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0
|
|
CVE-2022-1440 - https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1
|
|
CVE-2022-1441 - https://github.com/gpac/gpac/issues/2175
|
|
CVE-2022-1442 - https://gist.github.com/Xib3rR4dAr/6e6c6e5fa1f8818058c7f03de1eda6bf
|
|
CVE-2022-1444 - https://huntr.dev/bounties/b438a940-f8a4-4872-b030-59bdd1ab72aa
|
|
CVE-2022-1445 - https://huntr.dev/bounties/f4420149-5236-4051-a458-5d4f1d5b7abd
|
|
CVE-2022-1451 - https://huntr.dev/bounties/229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7
|
|
CVE-2022-1452 - https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6
|
|
CVE-2022-1455 - https://wpscan.com/vulnerability/8267046e-870e-4ccd-b920-340233ed3b93
|
|
CVE-2022-1456 - https://wpscan.com/vulnerability/1f41fc5c-18d0-493d-9a7d-8b521ab49f85
|
|
CVE-2022-1457 - https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046
|
|
CVE-2022-1458 - https://huntr.dev/bounties/78674078-0796-4102-a81e-f699cd6981b0
|
|
CVE-2022-1462 - https://seclists.org/oss-sec/2022/q2/155
|
|
CVE-2022-1464 - https://huntr.dev/bounties/34a12146-3a5d-4efc-a0f8-7a3ae04b198d
|
|
CVE-2022-1465 - https://wpscan.com/vulnerability/6781033a-f166-4198-874f-3e142854daf7
|
|
CVE-2022-1466 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-076.txt
|
|
CVE-2022-1466 - https://www.syss.de/pentest-blog/fehlerhafte-autorisierung-bei-red-hat-single-sign-on-750ga-syss-2021-076
|
|
CVE-2022-1467 - https://www.aveva.com/en/support-and-success/cyber-security-updates/
|
|
CVE-2022-1469 - https://wpscan.com/vulnerability/88869380-173d-4d4f-81d8-3c20add5f98d
|
|
CVE-2022-1470 - https://wpscan.com/vulnerability/13bb796f-7a17-47c9-a46f-a1d6ca4b6b91
|
|
CVE-2022-1471 - http://packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html
|
|
CVE-2022-1471 - https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2
|
|
CVE-2022-1472 - https://wpscan.com/vulnerability/9c608b14-dc5e-469e-b97a-84696fae804c
|
|
CVE-2022-1474 - https://wpscan.com/vulnerability/2d821464-c502-4f71-afee-97b3dea16612
|
|
CVE-2022-1503 - https://github.com/joinia/project/blob/main/GetSimple/GetSimplereadme.md
|
|
CVE-2022-1503 - https://vuldb.com/?id.198542
|
|
CVE-2022-1504 - https://huntr.dev/bounties/b8e5c324-3dfe-46b4-8095-1697c6b0a6d6
|
|
CVE-2022-1506 - https://wpscan.com/vulnerability/ee4f6786-27e4-474c-85e0-715b0c0f2776
|
|
CVE-2022-1507 - https://huntr.dev/bounties/104d8c5d-cac5-4baa-9ac9-291ea0bcab95
|
|
CVE-2022-1508 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110
|
|
CVE-2022-1509 - https://huntr.dev/bounties/09e69dff-f281-4e51-8312-ed7ab7606338
|
|
CVE-2022-1511 - https://huntr.dev/bounties/4a1723e9-5bc4-4c4b-bceb-1c45964cc71d
|
|
CVE-2022-1512 - https://packetstormsecurity.com/files/166820/
|
|
CVE-2022-1512 - https://wpscan.com/vulnerability/a754a516-07fc-44f1-9c34-31e963460301
|
|
CVE-2022-1514 - https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c
|
|
CVE-2022-1526 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/emlog%3C=pro-1.2.2%20Stored%20Cross-Site%20Scripting(XSS).md
|
|
CVE-2022-1527 - https://wpscan.com/vulnerability/0260d5c0-52a9-44ce-b7be-aff642056d16
|
|
CVE-2022-1528 - https://wpscan.com/vulnerability/d1e59894-382f-4151-8c4c-5608f3d8ac1f
|
|
CVE-2022-1529 - https://bugzilla.mozilla.org/show_bug.cgi?id=1770048
|
|
CVE-2022-1530 - https://huntr.dev/bounties/8fd8de01-7e83-4324-9cc8-a97acb9b70d6
|
|
CVE-2022-1531 - https://huntr.dev/bounties/fc4eb544-ef1e-412d-9fdb-0ceb04e038fe
|
|
CVE-2022-1532 - https://wpscan.com/vulnerability/d106cd93-cb9b-4558-9a29-0d556fd7c9e1
|
|
CVE-2022-1533 - https://huntr.dev/bounties/cb574ce1-fbf7-42ea-9e6a-91e17adecdc3
|
|
CVE-2022-1534 - https://huntr.dev/bounties/9a90ffa1-38f5-4685-9c00-68ba9068ce3d
|
|
CVE-2022-1536 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/automad%3C%3D1.10.9%20Stored%20Cross-Site%20Scripting(XSS).md
|
|
CVE-2022-1536 - https://vuldb.com/?id.198706
|
|
CVE-2022-1537 - https://huntr.dev/bounties/0179c3e5-bc02-4fc9-8491-a1a319b51b4d
|
|
CVE-2022-1538 - https://wpscan.com/vulnerability/b19adf7c-3983-487b-9b46-0f2922b08c1c/
|
|
CVE-2022-1539 - https://wpscan.com/vulnerability/50f70927-9677-4ba4-a388-0a41ed356523
|
|
CVE-2022-1540 - https://wpscan.com/vulnerability/77a524d8-0b1a-407a-98d2-d8d0ed78fa0f
|
|
CVE-2022-1541 - https://wpscan.com/vulnerability/053a9815-cf0a-472e-844a-3dea407ce022
|
|
CVE-2022-1542 - https://wpscan.com/vulnerability/40916242-df03-49a1-9a6a-9af33907e359
|
|
CVE-2022-1543 - https://huntr.dev/bounties/9889d435-3b9c-4e9d-93bc-5272e0723f9f
|
|
CVE-2022-1544 - https://huntr.dev/bounties/fa6d6e75-bc7a-40f6-9bdd-2541318912d4
|
|
CVE-2022-1546 - https://wpscan.com/vulnerability/5ec6182c-6917-4c48-90ce-e0ebe38e7595
|
|
CVE-2022-1547 - https://wpscan.com/vulnerability/83eca346-7045-414e-81fc-e0d9b735f0bd
|
|
CVE-2022-1548 - https://mattermost.com/security-updates/
|
|
CVE-2022-1549 - https://wpscan.com/vulnerability/afef06f5-71a6-4372-9648-0db59f9b254f
|
|
CVE-2022-1551 - https://wpscan.com/vulnerability/51b4752a-7922-444d-a022-f1c7159b5d84
|
|
CVE-2022-1553 - https://huntr.dev/bounties/b398e4c9-6cdf-4973-ad86-da796cde221f
|
|
CVE-2022-1554 - https://huntr.dev/bounties/7acac778-5ba4-4f02-99e2-e4e17a81e600
|
|
CVE-2022-1555 - https://huntr.dev/bounties/d9f9b5bd-16f3-4eaa-9e36-d4958b557687
|
|
CVE-2022-1556 - https://packetstormsecurity.com/files/166918/
|
|
CVE-2022-1556 - https://wpscan.com/vulnerability/04890549-6bd1-44dd-8bce-7125c01be5d4
|
|
CVE-2022-1557 - https://packetstormsecurity.com/files/166564/
|
|
CVE-2022-1557 - https://wpscan.com/vulnerability/e2b6dbf5-8709-4a2c-90be-3214ff55ed56
|
|
CVE-2022-1558 - https://packetstormsecurity.com/files/166839/
|
|
CVE-2022-1558 - https://wpscan.com/vulnerability/0414dad4-e90b-4122-8b77-a8a958ab824d
|
|
CVE-2022-1559 - https://packetstormsecurity.com/files/166530/
|
|
CVE-2022-1559 - https://wpscan.com/vulnerability/99059337-c3cd-4e91-9a03-df32a05b719c
|
|
CVE-2022-1560 - https://wpscan.com/vulnerability/5c5fbbea-92d2-46bb-9a70-75155fffb6de
|
|
CVE-2022-1562 - https://wpscan.com/vulnerability/8e5b1e4f-c132-42ee-b2d0-7306ab4ab615
|
|
CVE-2022-1563 - https://wpscan.com/vulnerability/19138092-50d3-4d63-97c5-aa8e1ce39456/
|
|
CVE-2022-1564 - https://wpscan.com/vulnerability/a487c7e7-667c-4c92-a427-c43cc13b348d
|
|
CVE-2022-1565 - http://packetstormsecurity.com/files/171578/WordPress-WP-All-Import-3.6.7-Remote-Code-Execution.html
|
|
CVE-2022-1566 - https://wpscan.com/vulnerability/0af030d8-b676-4826-91c0-98706b816f3c
|
|
CVE-2022-1568 - https://wpscan.com/vulnerability/88328d17-ffc9-4b94-8b01-ad2fd3047fbc
|
|
CVE-2022-1569 - https://wpscan.com/vulnerability/5a2756c1-9abf-4fd6-8ce2-9f840514dfcc
|
|
CVE-2022-1570 - https://wpscan.com/vulnerability/c0257564-48ee-4d02-865f-82c8b5e793c9
|
|
CVE-2022-1571 - https://huntr.dev/bounties/4578a690-73e5-4313-840c-ee15e5329741
|
|
CVE-2022-1572 - https://wpscan.com/vulnerability/9afd1805-d449-4551-986a-f92cb47c95c5
|
|
CVE-2022-1573 - https://wpscan.com/vulnerability/9c1acd9c-999f-4a35-a272-1ad31552e685
|
|
CVE-2022-1574 - https://wpscan.com/vulnerability/c36d0ea8-bf5c-4af9-bd3d-911eb02adc14
|
|
CVE-2022-1575 - https://huntr.dev/bounties/033d3423-eb05-4b53-a747-1bfcba873127
|
|
CVE-2022-1576 - https://wpscan.com/vulnerability/68deab46-1c16-46ae-a912-a104958ca4cf
|
|
CVE-2022-1577 - https://wpscan.com/vulnerability/39388900-266d-4308-88e7-d40ca6bbe346
|
|
CVE-2022-1578 - https://wpscan.com/vulnerability/c280da92-4ac2-43ea-93a2-6c583b79b98b
|
|
CVE-2022-1579 - https://wpscan.com/vulnerability/6f3d40fa-458b-44f0-9407-763e80b29668
|
|
CVE-2022-1580 - https://wpscan.com/vulnerability/7b6f91cd-5a00-49ca-93ff-db7220d2630a
|
|
CVE-2022-1582 - https://wpscan.com/vulnerability/cbb75383-4351-4488-aaca-ddb0f6f120cd
|
|
CVE-2022-1583 - https://wpscan.com/vulnerability/aa9d727c-4d17-4220-b8cb-e6dec30361a9
|
|
CVE-2022-1584 - https://huntr.dev/bounties/69f4ca67-d615-4f25-b2d1-19df7bf1107d
|
|
CVE-2022-1585 - https://wpscan.com/vulnerability/e709958c-7bce-45d7-9a0a-6e0ed12cd03f
|
|
CVE-2022-1589 - https://wpscan.com/vulnerability/257f9e14-4f43-4852-8384-80c15d087633
|
|
CVE-2022-1590 - https://github.com/joinia/webray.com.cn/blob/main/Bludit/Bluditreadme.md
|
|
CVE-2022-1590 - https://vuldb.com/?id.199060
|
|
CVE-2022-1591 - https://wpscan.com/vulnerability/b1a52c7e-3422-40dd-af5a-ea4c622a87aa
|
|
CVE-2022-1592 - https://huntr.dev/bounties/352b39da-0f2e-415a-9793-5480cae8bd27
|
|
CVE-2022-1593 - https://wpscan.com/vulnerability/67678666-402b-4010-ac56-7067a0f40185
|
|
CVE-2022-1594 - https://wpscan.com/vulnerability/bb0efc5e-044b-47dc-9101-9aae40cdbaa5
|
|
CVE-2022-1595 - https://wpscan.com/vulnerability/0218c90c-8f79-4f37-9a6f-60cf2f47d47b
|
|
CVE-2022-1597 - https://wpscan.com/vulnerability/faff9484-9fc7-4300-bdad-9cd8a30a9a4e
|
|
CVE-2022-1598 - https://wpscan.com/vulnerability/0416ae2f-5670-4080-a88d-3484bb19d8c8
|
|
CVE-2022-1599 - https://wpscan.com/vulnerability/4a36e876-7e3b-4a81-9f16-9ff5fbb20dd6
|
|
CVE-2022-1600 - https://wpscan.com/vulnerability/2b7445fd-0992-47cd-9a48-f5f18d8171f7
|
|
CVE-2022-1601 - https://wpscan.com/vulnerability/f6d3408c-2ceb-4a89-822b-13f5272a5fce
|
|
CVE-2022-1603 - https://wpscan.com/vulnerability/0e12ba6f-a86f-4cc6-9013-8a15586098d0
|
|
CVE-2022-1604 - https://wpscan.com/vulnerability/557c1c49-7195-4085-b67a-9fd8aca57845
|
|
CVE-2022-1605 - https://wpscan.com/vulnerability/a1b69615-690a-423b-afdf-729dcd32bc2f
|
|
CVE-2022-1608 - https://wpscan.com/vulnerability/56d2d55b-bd09-47af-988c-7f47eec4151f
|
|
CVE-2022-1609 - https://wpscan.com/vulnerability/e2d546c9-85b6-47a4-b951-781b9ae5d0f2/
|
|
CVE-2022-1610 - https://wpscan.com/vulnerability/88014da6-6179-4527-8f67-fbb610804d93
|
|
CVE-2022-1611 - https://wpscan.com/vulnerability/3843b867-7784-4976-b5ab-8a1e7d45618a
|
|
CVE-2022-1612 - https://wpscan.com/vulnerability/a8cec792-6435-4047-bca8-597c104dbc1f
|
|
CVE-2022-1613 - https://wpscan.com/vulnerability/c03863ef-9ac9-402b-8f8d-9559c9988e2b
|
|
CVE-2022-1614 - https://wpscan.com/vulnerability/a5940d0b-6b88-4418-87e2-02c0897bc2f1
|
|
CVE-2022-1616 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1616 - https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2
|
|
CVE-2022-1617 - https://wpscan.com/vulnerability/7e40e506-ad02-44ca-9d21-3634f3907aad/
|
|
CVE-2022-1618 - https://wpscan.com/vulnerability/ddafcab2-b5db-4839-8ae1-188383f4250d/
|
|
CVE-2022-1619 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1619 - https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
|
|
CVE-2022-1620 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1620 - https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51
|
|
CVE-2022-1621 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1621 - https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
|
|
CVE-2022-1622 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1624 - https://wpscan.com/vulnerability/06e547fd-cddf-4294-87be-54f58d6138a7
|
|
CVE-2022-1625 - https://wpscan.com/vulnerability/e1693318-900c-47f1-bb77-008b0d33327f
|
|
CVE-2022-1626 - https://wpscan.com/vulnerability/3d1f90d9-45da-42f8-93f8-15c8a4ff90ca
|
|
CVE-2022-1627 - https://wpscan.com/vulnerability/70ce3654-8fd9-4c33-b594-fac13ec26137
|
|
CVE-2022-1629 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1629 - https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee
|
|
CVE-2022-1630 - https://wpscan.com/vulnerability/178d0c49-3a93-4948-8734-f3d7518361b3
|
|
CVE-2022-1631 - http://packetstormsecurity.com/files/167376/Microweber-CMS-1.2.15-Account-Takeover.html
|
|
CVE-2022-1631 - https://huntr.dev/bounties/5494e258-5c7b-44b4-b443-85cff7ae0ba4
|
|
CVE-2022-1643 - https://wpscan.com/vulnerability/73111c7e-c772-4bed-b282-854c1ae57444
|
|
CVE-2022-1644 - https://wpscan.com/vulnerability/0184d70a-548c-4258-b01d-7477f03cc346
|
|
CVE-2022-1645 - https://wpscan.com/vulnerability/915b7d79-f9dd-451d-bf8f-6d14ec3e67d2
|
|
CVE-2022-1646 - https://wpscan.com/vulnerability/8a32896d-bf1b-4d7b-8d84-dc38b877928b
|
|
CVE-2022-1647 - https://wpscan.com/vulnerability/8e8f6b08-90ab-466a-9828-dca0c0da2c9c
|
|
CVE-2022-1649 - https://huntr.dev/bounties/c07e4918-cf86-4d2e-8969-5fb63575b449
|
|
CVE-2022-1650 - https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e
|
|
CVE-2022-1651 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b
|
|
CVE-2022-1653 - https://wpscan.com/vulnerability/52eff451-8ce3-4ac4-b530-3196aa82db48
|
|
CVE-2022-1663 - https://wpscan.com/vulnerability/30820be1-e96a-4ff6-b1ec-efda14069e70
|
|
CVE-2022-1671 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ff8376ade4f668130385839cef586a0990f8ef87
|
|
CVE-2022-1672 - https://wpscan.com/vulnerability/5c5955d7-24f0-45e6-9c27-78ef50446dad
|
|
CVE-2022-1673 - https://wpscan.com/vulnerability/14283389-a6b8-4dd8-9441-f16fcc4ab3c0
|
|
CVE-2022-1674 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1674 - https://huntr.dev/bounties/a74ba4a4-7a39-4a22-bde3-d2f8ee07b385
|
|
CVE-2022-1681 - https://huntr.dev/bounties/591b11e1-7504-4a96-99c6-08f2b419e767
|
|
CVE-2022-1682 - https://huntr.dev/bounties/e962d191-93e2-405e-a6af-b4a4e4d02527
|
|
CVE-2022-1683 - https://wpscan.com/vulnerability/359d145b-c365-4e7c-a12e-c26b7b8617ce
|
|
CVE-2022-1684 - https://bulletin.iese.de/post/cube-slider_1-2
|
|
CVE-2022-1684 - https://wpscan.com/vulnerability/db7fb815-945a-41c7-8932-834cc646a806
|
|
CVE-2022-1685 - https://bulletin.iese.de/post/five-minute-webshop_1-3-2_1
|
|
CVE-2022-1685 - https://wpscan.com/vulnerability/86bd28d5-6767-4bca-ab59-710c1c4ecd97
|
|
CVE-2022-1686 - https://bulletin.iese.de/post/five-minute-webshop_1-3-2_2
|
|
CVE-2022-1686 - https://wpscan.com/vulnerability/1a5ce0dd-6847-42e7-8d88-3b63053fab71
|
|
CVE-2022-1687 - https://bulletin.iese.de/post/logo-slider_1-4-8
|
|
CVE-2022-1687 - https://wpscan.com/vulnerability/e7506906-5c3d-4963-ae24-55f18c3e5081
|
|
CVE-2022-1688 - https://bulletin.iese.de/post/note-press_0-1-10_1
|
|
CVE-2022-1688 - https://wpscan.com/vulnerability/63d4444b-9b04-47f5-a692-c6c6c8ea7d92
|
|
CVE-2022-1689 - https://bulletin.iese.de/post/note-press_0-1-10_2
|
|
CVE-2022-1689 - https://wpscan.com/vulnerability/982f84a1-216d-41ed-87bd-433b695cec28
|
|
CVE-2022-1690 - https://bulletin.iese.de/post/note-press_0-1-10_3
|
|
CVE-2022-1690 - https://wpscan.com/vulnerability/54e16f0a-667c-44ea-98ad-0306c4a35d9d
|
|
CVE-2022-1691 - https://bulletin.iese.de/post/realty-workstation_1-0-6
|
|
CVE-2022-1691 - https://wpscan.com/vulnerability/f9363b4c-c434-4f15-93f8-46162d2d7049
|
|
CVE-2022-1692 - https://bulletin.iese.de/post/cp-image-store_1-0-67
|
|
CVE-2022-1692 - https://wpscan.com/vulnerability/83bae80c-f583-4d89-8282-e6384bbc7571
|
|
CVE-2022-1694 - https://wpscan.com/vulnerability/169a6c81-6c76-4f29-8f60-b2551042b962
|
|
CVE-2022-1695 - https://wpscan.com/vulnerability/2ac5b87b-1390-41ce-af6e-c50e5709baaa
|
|
CVE-2022-1697 - https://help.okta.com/en-us/Content/Topics/Directory/ad-agent-update.htm
|
|
CVE-2022-1698 - https://huntr.dev/bounties/f4ab747b-e89a-4514-9432-ac1ea56639f3
|
|
CVE-2022-1699 - https://huntr.dev/bounties/3024b2bb-50ca-46a2-85db-1cc916791cda
|
|
CVE-2022-1709 - https://wpscan.com/vulnerability/ac290535-d9ec-459a-abc3-27cd78eb54fc
|
|
CVE-2022-1710 - https://wpscan.com/vulnerability/ed162ccc-88e6-41e8-b24d-1b9f77a038b6
|
|
CVE-2022-1711 - https://huntr.dev/bounties/c32afff5-6ad5-4d4d-beea-f55ab4925797
|
|
CVE-2022-1712 - https://wpscan.com/vulnerability/9ab9626f-66d5-47e4-bdb8-d8fb519f9515
|
|
CVE-2022-1713 - https://huntr.dev/bounties/cad3902f-3afb-4ed2-abd0-9f96a248de11
|
|
CVE-2022-1714 - https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0
|
|
CVE-2022-1715 - https://huntr.dev/bounties/58918962-ccb5-47f9-bb43-ffd8cae1ef24
|
|
CVE-2022-1716 - https://fluidattacks.com/advisories/tyler/
|
|
CVE-2022-1717 - https://wpscan.com/vulnerability/79a532e9-bc6e-4722-8d67-9c15720d06a6
|
|
CVE-2022-1718 - https://huntr.dev/bounties/1ff8afe4-6ff7-45aa-a652-d8aac7e5be7e
|
|
CVE-2022-1719 - https://huntr.dev/bounties/790ba3fd-41e9-4393-8e2f-71161b56279b
|
|
CVE-2022-1720 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1720 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-1720 - http://seclists.org/fulldisclosure/2022/Oct/45
|
|
CVE-2022-1720 - https://huntr.dev/bounties/5ccfb386-7eb9-46e5-98e5-243ea4b358a8
|
|
CVE-2022-1721 - https://huntr.dev/bounties/000931cc-6d0e-4a4f-b4d8-4ba46ba0e699
|
|
CVE-2022-1722 - https://huntr.dev/bounties/c903d563-ba97-44e9-b421-22bfab1e0cbd
|
|
CVE-2022-1723 - https://huntr.dev/bounties/619851a4-2a08-4196-80e9-ab41953491d8
|
|
CVE-2022-1724 - https://wpscan.com/vulnerability/96a0a667-9c4b-4ea6-b78a-0681e9a9bbae
|
|
CVE-2022-1725 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1725 - https://huntr.dev/bounties/4363cf07-233e-4d0a-a1d5-c731a400525c
|
|
CVE-2022-1726 - https://huntr.dev/bounties/9b85cc33-0395-4c31-8a42-3a94beb2efea
|
|
CVE-2022-1727 - https://huntr.dev/bounties/b242e806-fc8c-41c0-aad7-e0c9c37ecdee
|
|
CVE-2022-1728 - https://huntr.dev/bounties/3c6cb129-6995-4722-81b5-af052572b519
|
|
CVE-2022-1729 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704
|
|
CVE-2022-1730 - https://huntr.dev/bounties/fded4835-bd49-4533-8311-1d71e0ed7c00
|
|
CVE-2022-1731 - https://www.tenable.com/security/research/tra-2022-17
|
|
CVE-2022-1732 - https://wpscan.com/vulnerability/3620a087-032e-4a5f-99c8-f9e7e9c29813
|
|
CVE-2022-1733 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1733 - https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a
|
|
CVE-2022-1734 - https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098
|
|
CVE-2022-1735 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1735 - https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9
|
|
CVE-2022-1752 - https://huntr.dev/bounties/66e9bfa9-598f-49ab-a472-752911df3f2d
|
|
CVE-2022-1753 - https://vuldb.com/?id.199974
|
|
CVE-2022-1753 - https://www.youtube.com/watch?v=tIzOZtp2fxA
|
|
CVE-2022-1753 - https://youtu.be/tIzOZtp2fxA
|
|
CVE-2022-1754 - https://huntr.dev/bounties/2f65af7c-a74b-46a6-8847-5db6785f1cf2
|
|
CVE-2022-1755 - https://wpscan.com/vulnerability/62b2548e-6b59-48b8-b1c2-9bd47e634982
|
|
CVE-2022-1756 - https://wpscan.com/vulnerability/6ad407fe-db2b-41fb-834b-dd8c4f62b072
|
|
CVE-2022-1757 - https://wpscan.com/vulnerability/e648633e-868b-45b2-870a-308a2f9cb7f5
|
|
CVE-2022-1758 - https://wpscan.com/vulnerability/211816ce-d2bc-469b-9a8e-e0c2a5c4461b
|
|
CVE-2022-1759 - https://wpscan.com/vulnerability/d8e63f78-f38a-4f68-96ba-8059d175cea8
|
|
CVE-2022-1760 - https://wpscan.com/vulnerability/c7906b1d-25c9-4f34-bd02-66824878b88e/
|
|
CVE-2022-1761 - https://wpscan.com/vulnerability/31b413e1-d4b5-463e-9910-37876881c062
|
|
CVE-2022-1762 - https://wpscan.com/vulnerability/03254977-37cc-4365-979b-326f9637be85
|
|
CVE-2022-1763 - https://wpscan.com/vulnerability/bd3aff73-078a-4e5a-b9e3-1604851c6df8
|
|
CVE-2022-1764 - https://wpscan.com/vulnerability/04305e4e-37e3-4f35-bf66-3b79b99d2868
|
|
CVE-2022-1765 - https://wpscan.com/vulnerability/b50e7622-c1dc-485b-a5f5-b010b40eef20
|
|
CVE-2022-1767 - https://huntr.dev/bounties/b1ce040c-9ed1-4d36-9b48-82df42310868
|
|
CVE-2022-1768 - http://packetstormsecurity.com/files/176549/WordPress-RSVPMaker-9.3.2-SQL-Injection.html
|
|
CVE-2022-1768 - https://gist.github.com/Xib3rR4dAr/441d6bb4a5b8ad4b25074a49210a02cc
|
|
CVE-2022-1769 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1769 - https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c
|
|
CVE-2022-1770 - https://huntr.dev/bounties/74a252a2-8bf6-4f88-a180-b90338a239fa
|
|
CVE-2022-1771 - https://huntr.dev/bounties/faa74175-5317-4b71-a363-dfc39094ecbb
|
|
CVE-2022-1772 - https://wpscan.com/vulnerability/02addade-d191-4e45-b7b5-2f3f673679ab
|
|
CVE-2022-1773 - https://wpscan.com/vulnerability/c2cc3d8e-f3ac-46c6-871e-894cf3ba67f6
|
|
CVE-2022-1774 - https://huntr.dev/bounties/6ac07c49-bb7f-47b5-b361-33e6757b8757
|
|
CVE-2022-1775 - https://huntr.dev/bounties/0966043c-602f-463e-a6e5-9a1745f4fbfa
|
|
CVE-2022-1776 - https://wpscan.com/vulnerability/46ed56db-9b9d-4390-80fc-343a01fcc3c9
|
|
CVE-2022-1777 - https://wpscan.com/vulnerability/a50dc7f8-a9e6-41fa-a047-ad1c3bc309b4
|
|
CVE-2022-1779 - https://wpscan.com/vulnerability/45117646-88ff-41d4-8abd-e2f18d4b693e
|
|
CVE-2022-1780 - https://wpscan.com/vulnerability/dd22ea1e-49a9-4b06-8dd9-bb224110f98a
|
|
CVE-2022-1781 - https://wpscan.com/vulnerability/7f2ae2c9-57d4-46a0-a9a1-585ec543b153
|
|
CVE-2022-1782 - https://huntr.dev/bounties/7555693f-94e4-4183-98cb-3497da6df028
|
|
CVE-2022-1784 - https://huntr.dev/bounties/d1330ce8-cccb-4bae-b9a9-a03b97f444a5
|
|
CVE-2022-1785 - https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109
|
|
CVE-2022-1787 - https://wpscan.com/vulnerability/b85920b3-dfc1-4112-abd8-ce6a5d91ae0d
|
|
CVE-2022-1788 - https://wpscan.com/vulnerability/c39719e5-dadd-4414-a96d-5e70a1e3d462
|
|
CVE-2022-1790 - https://wpscan.com/vulnerability/176d5761-4f01-4173-a70c-6052a6a9963e
|
|
CVE-2022-1791 - https://wpscan.com/vulnerability/5c185269-cb3a-4463-8d73-b190813d4431
|
|
CVE-2022-1792 - https://wpscan.com/vulnerability/44555c79-480d-4b6a-9fda-988183c06909
|
|
CVE-2022-1793 - https://wpscan.com/vulnerability/fd8b84b4-6944-4638-bdc1-1cb6aaabd42c
|
|
CVE-2022-1795 - https://huntr.dev/bounties/9c312763-41a6-4fc7-827b-269eb86efcbc
|
|
CVE-2022-1796 - https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e
|
|
CVE-2022-1800 - https://wpscan.com/vulnerability/4267109c-0ca2-441d-889d-fb39c235f128
|
|
CVE-2022-1801 - https://wpscan.com/vulnerability/a5c97809-2ffc-4efb-8c80-1b734361cd06
|
|
CVE-2022-1803 - https://huntr.dev/bounties/47cc6621-2474-40f9-ab68-3cf62389a124
|
|
CVE-2022-1806 - https://huntr.dev/bounties/101a2a31-0b27-433a-ad3a-a216238ca4d1
|
|
CVE-2022-1809 - https://huntr.dev/bounties/0730a95e-c485-4ff2-9a5d-bb3abfda0b17
|
|
CVE-2022-1810 - https://huntr.dev/bounties/9b2d7579-032e-42da-b736-4b10a868eacb
|
|
CVE-2022-1811 - https://huntr.dev/bounties/4d97f665-c9f1-4c38-b774-692255a7c44c
|
|
CVE-2022-1812 - https://huntr.dev/bounties/17d86a50-265c-4ec8-9592-0bd909ddc8f3
|
|
CVE-2022-1813 - https://huntr.dev/bounties/b255cf59-9ecd-4255-b9a2-b40b5ec6c572
|
|
CVE-2022-1814 - https://wpscan.com/vulnerability/b5624fb3-b110-4b36-a00f-20bbc3a8fdb9
|
|
CVE-2022-1815 - https://huntr.dev/bounties/6e856a25-9117-47c6-9375-52f78876902f
|
|
CVE-2022-1816 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Zoo-Management-System/Zoo-Management-System(XSS).md
|
|
CVE-2022-1817 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Badminton%20Center%20Management%20System(XSS).md
|
|
CVE-2022-1817 - https://vuldb.com/?id.200559
|
|
CVE-2022-1818 - https://wpscan.com/vulnerability/9d6c628f-cdea-481c-a2e5-101dc167718d
|
|
CVE-2022-1819 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Student%20Information%20System/SIS_Stored_Cross_Site_Scripting(XSS).md
|
|
CVE-2022-1825 - https://huntr.dev/bounties/c6ad4cef-1b3d-472f-af0e-68e46341dfe5
|
|
CVE-2022-1826 - https://wpscan.com/vulnerability/b9dba241-d94c-4ce5-8730-445ba8005e66
|
|
CVE-2022-1827 - https://wpscan.com/vulnerability/0bd25283-e079-4010-b139-cce9afb1d54d
|
|
CVE-2022-1828 - https://wpscan.com/vulnerability/877ce7a5-b1ff-4d03-9cd8-6beed5595af8
|
|
CVE-2022-1829 - https://wpscan.com/vulnerability/8353aa12-dbb7-433f-9dd9-d61a3f303d4b
|
|
CVE-2022-1830 - https://wpscan.com/vulnerability/a6b3e927-41e2-4e48-b9e1-8c58a1b9a933
|
|
CVE-2022-1831 - https://wpscan.com/vulnerability/91c44a4f-b599-46c0-a8df-d1fb87472abe
|
|
CVE-2022-1832 - https://wpscan.com/vulnerability/e025f821-81c3-4072-a89e-a5b3d0fb1275
|
|
CVE-2022-1837 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_add_register.php_File_Upload_Getshell.md
|
|
CVE-2022-1837 - https://vuldb.com/?id.200582
|
|
CVE-2022-1838 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_admin_SQL_Inject.md
|
|
CVE-2022-1838 - https://vuldb.com/?id.200583
|
|
CVE-2022-1839 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_login_email_SQL_injection.md
|
|
CVE-2022-1839 - https://vuldb.com/?id.200584
|
|
CVE-2022-1840 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/Home%20Clean%20Services%20Management%20System%20Stored%20Cross-Site%20Scripting(XSS).md
|
|
CVE-2022-1842 - https://wpscan.com/vulnerability/77aafeb9-af80-490a-b3d7-4fa973bab61c
|
|
CVE-2022-1843 - https://wpscan.com/vulnerability/aa59f811-2375-4593-93d4-f587f9870ed1
|
|
CVE-2022-1844 - https://wpscan.com/vulnerability/f0b0baac-7f44-44e1-af73-5a72b967858d
|
|
CVE-2022-1845 - https://wpscan.com/vulnerability/6ee3e9e2-ff57-41c4-8cc5-b258801a8a02
|
|
CVE-2022-1846 - https://wpscan.com/vulnerability/5fa5838e-4843-4d9c-9884-e3ebbf56fc6a
|
|
CVE-2022-1847 - https://wpscan.com/vulnerability/d34ed713-4cca-4cef-b431-f132f1b10aa6
|
|
CVE-2022-1848 - https://huntr.dev/bounties/8dfe0877-e44b-4a1a-8eee-5c03c93ae90a
|
|
CVE-2022-1849 - https://huntr.dev/bounties/881f8f36-d5c8-470d-8261-f109e6d5db4b
|
|
CVE-2022-1850 - https://huntr.dev/bounties/07755f07-a412-4911-84a4-2f8c03c8f7ce
|
|
CVE-2022-1851 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1851 - https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d
|
|
CVE-2022-1883 - https://huntr.dev/bounties/a25d15bd-cd23-487e-85cd-587960f1b9e7
|
|
CVE-2022-1885 - https://wpscan.com/vulnerability/8416cbcf-086d-42ff-b2a4-f3954c8ff0c8
|
|
CVE-2022-1886 - https://huntr.dev/bounties/fa0ad526-b608-45b3-9ebc-f2b607834d6a
|
|
CVE-2022-1889 - https://wpscan.com/vulnerability/ee3832e2-ce40-4063-a23e-44c7f7f5f46a
|
|
CVE-2022-1893 - https://huntr.dev/bounties/a1cfe61b-5248-4a73-9a80-0b764edc9b26
|
|
CVE-2022-1894 - https://wpscan.com/vulnerability/68af14ef-ca66-40d6-a1e5-09f74e2cd971
|
|
CVE-2022-1895 - https://wpscan.com/vulnerability/bd9ef7e0-ebbb-4b91-8c58-265218a3c536
|
|
CVE-2022-1896 - https://wpscan.com/vulnerability/3e8bd875-2435-4a15-8ee8-8a00882b499c
|
|
CVE-2022-1897 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1897 - https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118
|
|
CVE-2022-1898 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1898 - https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea
|
|
CVE-2022-1899 - https://huntr.dev/bounties/8a3dc5cb-08b3-4807-82b2-77f08c137a04
|
|
CVE-2022-1903 - https://wpscan.com/vulnerability/28d26aa6-a8db-4c20-9ec7-39821c606a08
|
|
CVE-2022-1904 - https://wpscan.com/vulnerability/92215d07-d129-49b4-a838-0de1a944c06b
|
|
CVE-2022-1905 - https://wpscan.com/vulnerability/ff5fd894-aff3-400a-8eec-fad9d50f788e
|
|
CVE-2022-1906 - https://wpscan.com/vulnerability/af4f459e-e60b-4384-aad9-0dc18aa3b338
|
|
CVE-2022-1907 - https://huntr.dev/bounties/4eb0fa3e-4480-4fb5-8ec0-fbcd71de6012
|
|
CVE-2022-1908 - https://huntr.dev/bounties/a7436e88-0488-4bd4-816f-2e2c803e93e8
|
|
CVE-2022-1909 - https://huntr.dev/bounties/8f83eb8f-51a8-41c0-bc7d-077f48faebdc
|
|
CVE-2022-1910 - https://wpscan.com/vulnerability/8afe1638-66fa-44c7-9d02-c81573193b47
|
|
CVE-2022-1913 - https://wpscan.com/vulnerability/2cafef43-e64a-4897-8c41-f0ed473d7ead
|
|
CVE-2022-1914 - https://wpscan.com/vulnerability/8c8dad47-8591-47dc-b84f-8c5cb18b2d78
|
|
CVE-2022-1915 - https://wpscan.com/vulnerability/c3c28edf-19bc-4f3a-b58e-f1c67557aa29
|
|
CVE-2022-1916 - https://wpscan.com/vulnerability/d16a0c3d-4318-4ecd-9e65-fc4165af8808
|
|
CVE-2022-1921 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1224
|
|
CVE-2022-1922 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225
|
|
CVE-2022-1923 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225
|
|
CVE-2022-1924 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225
|
|
CVE-2022-1925 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225
|
|
CVE-2022-1926 - https://huntr.dev/bounties/3fda8902-68ee-4734-86a3-9551ab17c893
|
|
CVE-2022-1927 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1927 - https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777
|
|
CVE-2022-1928 - https://huntr.dev/bounties/6336ec42-5c4d-4f61-ae38-2bb539f433d2
|
|
CVE-2022-1929 - https://research.jfrog.com/vulnerabilities/devcert-redos-xray-211352/
|
|
CVE-2022-1930 - https://research.jfrog.com/vulnerabilities/eth-account-redos-xray-248681/
|
|
CVE-2022-1931 - https://huntr.dev/bounties/50c4cb63-65db-41c5-a16d-0560d7131fde
|
|
CVE-2022-1932 - https://wpscan.com/vulnerability/005c2300-f6bd-416e-97a6-d42284bbb093
|
|
CVE-2022-1933 - https://wpscan.com/vulnerability/6cedb27f-6140-4cba-836f-63de98e521bf
|
|
CVE-2022-1934 - https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f
|
|
CVE-2022-1937 - https://wpscan.com/vulnerability/eb40ea5d-a463-4947-9a40-d55911ff50e9
|
|
CVE-2022-1938 - https://wpscan.com/vulnerability/70aed824-c53e-4672-84c9-039dc34ed5fa
|
|
CVE-2022-1939 - https://wpscan.com/vulnerability/4d7b62e1-558b-4504-a6e2-78246a8b554f
|
|
CVE-2022-1940 - https://gitlab.com/gitlab-org/gitlab/-/issues/359142
|
|
CVE-2022-1941 - http://www.openwall.com/lists/oss-security/2022/09/27/1
|
|
CVE-2022-1941 - https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf
|
|
CVE-2022-1942 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1942 - https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071
|
|
CVE-2022-1943 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1ad35dd0548ce947d97aaf92f7f2f9a202951cf
|
|
CVE-2022-1945 - https://wpscan.com/vulnerability/4ad297e5-c92d-403c-abf4-9decf7e8378b
|
|
CVE-2022-1946 - https://wpscan.com/vulnerability/0903920c-be2e-4515-901f-87253eb30940
|
|
CVE-2022-1947 - https://huntr.dev/bounties/cb4d0ab3-51ba-4a42-9e38-ac0e544266f1
|
|
CVE-2022-1948 - https://gitlab.com/gitlab-org/security/gitlab/-/issues/673
|
|
CVE-2022-1950 - https://wpscan.com/vulnerability/4352283f-dd43-4827-b417-0c55d0f4637d
|
|
CVE-2022-1951 - https://wpscan.com/vulnerability/f56f7244-e8ec-4a87-9419-643bc13b45a0
|
|
CVE-2022-1952 - https://wpscan.com/vulnerability/ecf61d17-8b07-4cb6-93a8-64c2c4fbbe04
|
|
CVE-2022-1953 - https://wpscan.com/vulnerability/b66d6682-edbc-435f-a73a-dced32a32770
|
|
CVE-2022-1955 - https://fluidattacks.com/advisories/tempest/
|
|
CVE-2022-1955 - https://github.com/oxen-io/session-android/pull/897
|
|
CVE-2022-1956 - https://wpscan.com/vulnerability/ef6d0393-0ce3-465c-84c8-53bf8c58958a
|
|
CVE-2022-1957 - https://wpscan.com/vulnerability/ad3f6f3d-e12c-4867-906c-73aa001c7351
|
|
CVE-2022-1958 - https://vuldb.com/?id.201960
|
|
CVE-2022-1960 - https://wpscan.com/vulnerability/bc97dd57-e9f6-4bc3-a4c2-40303786ae4a
|
|
CVE-2022-1961 - https://gist.github.com/Xib3rR4dAr/02a21cd0ea0b7bf586131c5eebb69f1d
|
|
CVE-2022-1964 - https://wpscan.com/vulnerability/52cf7e3c-2a0c-45c4-be27-be87424f1338
|
|
CVE-2022-1967 - https://wpscan.com/vulnerability/02d25736-c796-49bd-b774-66e0e3fcf4c9
|
|
CVE-2022-1968 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-1968 - https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b
|
|
CVE-2022-1971 - https://wpscan.com/vulnerability/1bffbbef-7876-43a6-9cb0-6e09bb4ff2b0
|
|
CVE-2022-1977 - https://wpscan.com/vulnerability/1b640519-75e1-48cb-944e-b9bff9de6d3d
|
|
CVE-2022-1979 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Product%20Show%20Room%20Site/'Message'%20Stored%20Cross-Site%20Scripting(XSS).md
|
|
CVE-2022-1979 - https://vuldb.com/?id.200950
|
|
CVE-2022-1980 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Product%20Show%20Room%20Site/'Telephone'%20Stored%20Cross-Site%20Scripting(XSS).md
|
|
CVE-2022-1980 - https://vuldb.com/?id.200951
|
|
CVE-2022-1982 - https://mattermost.com/security-updates/
|
|
CVE-2022-1986 - https://huntr.dev/bounties/776e8f29-ff5e-4501-bb9f-0bd335007930
|
|
CVE-2022-1987 - https://huntr.dev/bounties/e8197737-7557-443e-a59f-2a86e8dda75f
|
|
CVE-2022-1988 - https://huntr.dev/bounties/7882a35a-b27e-4d7e-9fcc-e9e009d0b01c
|
|
CVE-2022-1990 - https://wpscan.com/vulnerability/42f1bf1f-95a8-41ee-a637-88deb80ab870
|
|
CVE-2022-1991 - https://cyberthoth.medium.com/fast-food-ordering-system-1-0-cross-site-scripting-7927f4b1edd6
|
|
CVE-2022-1991 - https://vuldb.com/?id.201276
|
|
CVE-2022-1992 - https://huntr.dev/bounties/2e8cdc57-a9cf-46ae-9088-87f09e6c90ab
|
|
CVE-2022-1993 - https://huntr.dev/bounties/22f9c074-cf60-4c67-b5c4-72fdf312609d
|
|
CVE-2022-1994 - https://wpscan.com/vulnerability/114d94be-b567-4b4b-9a44-f2c05cdbe18e
|
|
CVE-2022-1995 - https://wpscan.com/vulnerability/62fb399d-3327-45d0-b10f-769d2d164903
|
|
CVE-2022-1996 - https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1
|
|
CVE-2022-1997 - https://huntr.dev/bounties/28861ae9-7b09-45b7-a003-eccf903db71d
|
|
CVE-2022-1998 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17&id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d
|
|
CVE-2022-2000 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-2000 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-2000 - http://seclists.org/fulldisclosure/2022/Oct/45
|
|
CVE-2022-2000 - https://huntr.dev/bounties/f61a64e2-d163-461b-a77e-46ab38e021f0
|
|
CVE-2022-2014 - https://huntr.dev/bounties/911a4ada-7fd6-467a-a464-b88604b16ffc
|
|
CVE-2022-2015 - https://huntr.dev/bounties/0d32f448-155c-4b71-9291-9e8bcd522b37
|
|
CVE-2022-2016 - https://huntr.dev/bounties/5fa17e9b-c767-46b4-af64-aafb8c2aa521
|
|
CVE-2022-2017 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(SQLI)2.md
|
|
CVE-2022-2017 - https://vuldb.com/?id.201365
|
|
CVE-2022-2018 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(SQLI).md
|
|
CVE-2022-2018 - https://vuldb.com/?id.201366
|
|
CVE-2022-20186 - http://packetstormsecurity.com/files/172852/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html
|
|
CVE-2022-2019 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System--.md
|
|
CVE-2022-2019 - https://vuldb.com/?id.201367
|
|
CVE-2022-2020 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(XSS).md
|
|
CVE-2022-2020 - https://vuldb.com/?id.201368
|
|
CVE-2022-2022 - https://huntr.dev/bounties/f6082949-40d3-411c-b613-23ada2691913
|
|
CVE-2022-2023 - https://huntr.dev/bounties/0f35b1d3-56e6-49e4-bc5a-830f52e094b3
|
|
CVE-2022-2024 - https://huntr.dev/bounties/18cf9256-23ab-4098-a769-85f8da130f97
|
|
CVE-2022-2026 - https://huntr.dev/bounties/dcfa6790-c609-4ed5-ba5e-8f31f98e5e11
|
|
CVE-2022-2027 - https://huntr.dev/bounties/fb99c27c-7eaa-48db-be39-b804cb83871d
|
|
CVE-2022-2028 - https://huntr.dev/bounties/588fb241-bc8f-40fc-82a4-df249956d69f
|
|
CVE-2022-2029 - https://huntr.dev/bounties/9052a874-634c-473e-a2b3-65112181543f
|
|
CVE-2022-2034 - https://wpscan.com/vulnerability/aba3dd58-7a8e-4129-add5-4dd5972c0426
|
|
CVE-2022-2035 - https://www.tenable.com/security/research/tra-2022-21
|
|
CVE-2022-2036 - https://huntr.dev/bounties/c7715149-f99c-4d62-a5c6-c78bfdb41905
|
|
CVE-2022-2037 - https://huntr.dev/bounties/4431ef84-93f2-4bc5-bc1a-97d7f229b28e
|
|
CVE-2022-2040 - https://wpscan.com/vulnerability/ab53a70c-57d5-400f-b11f-b1b7b2b0cf01
|
|
CVE-2022-2041 - https://wpscan.com/vulnerability/8edb11bc-9e8d-4a98-8538-aaff0f072109
|
|
CVE-2022-2042 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-2042 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-2042 - http://seclists.org/fulldisclosure/2022/Oct/45
|
|
CVE-2022-2042 - https://huntr.dev/bounties/8628b4cd-4055-4059-aed4-64f7fdc10eba
|
|
CVE-2022-2046 - https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807
|
|
CVE-2022-2050 - https://wpscan.com/vulnerability/016453e3-803b-4a67-8ea7-2d228c2998d4
|
|
CVE-2022-2054 - https://huntr.dev/bounties/ea4a842c-c48c-4aae-a599-3305125c63a7
|
|
CVE-2022-2056 - https://gitlab.com/libtiff/libtiff/-/issues/415
|
|
CVE-2022-2057 - https://gitlab.com/libtiff/libtiff/-/issues/427
|
|
CVE-2022-2058 - https://gitlab.com/libtiff/libtiff/-/issues/428
|
|
CVE-2022-2060 - https://huntr.dev/bounties/2acfc8fe-247c-4f88-aeaa-042b6b8690a0
|
|
CVE-2022-2061 - https://huntr.dev/bounties/365ab61f-9a63-421c-97e6-21d4653021f0
|
|
CVE-2022-20612 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-20613 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-20614 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-20615 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-2062 - https://huntr.dev/bounties/35593b4c-f127-4699-8ad3-f0b2203a8ef6
|
|
CVE-2022-2063 - https://huntr.dev/bounties/156f405b-21d6-4384-9bff-17ebfe484e20
|
|
CVE-2022-2064 - https://huntr.dev/bounties/39523d51-fc5c-48b8-a082-171da79761bb
|
|
CVE-2022-20659 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-xss-P8fBz2FW
|
|
CVE-2022-2066 - https://huntr.dev/bounties/da4bbbfd-501f-4c7e-be83-47778103cb59
|
|
CVE-2022-20660 - http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html
|
|
CVE-2022-20660 - http://seclists.org/fulldisclosure/2022/Jan/34
|
|
CVE-2022-2067 - https://huntr.dev/bounties/a85a53a4-3009-4f41-ac33-8bed8bbe16a8
|
|
CVE-2022-20699 - http://packetstormsecurity.com/files/167113/Cisco-RV340-SSL-VPN-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2022-20699 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-20700 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-20701 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-20702 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-20703 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-20704 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-20705 - http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html
|
|
CVE-2022-20705 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-20706 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-20707 - http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html
|
|
CVE-2022-20707 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-20708 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-20709 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-2071 - https://wpscan.com/vulnerability/d3653976-9e0a-4f2b-87f7-26b5e7a74b9d
|
|
CVE-2022-20710 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-20711 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-20712 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-20713 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-LOeKsNmO
|
|
CVE-2022-20713 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-LOeKsNmO
|
|
CVE-2022-20718 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-px2c-q384-5wxc
|
|
CVE-2022-20719 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-8v5w-4fhm-gqxj
|
|
CVE-2022-2072 - https://wpscan.com/vulnerability/3014540c-21b3-481c-83a1-ce3017151af4
|
|
CVE-2022-2073 - https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66
|
|
CVE-2022-20738 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swg-fbyps-3z4qT7p
|
|
CVE-2022-20749 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
|
CVE-2022-20759 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-gq88-gqmj-7v24
|
|
CVE-2022-20775 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc
|
|
CVE-2022-20777 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-v56f-9gq3-rx3g
|
|
CVE-2022-20779 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-77vw-2pmg-q492
|
|
CVE-2022-2078 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85
|
|
CVE-2022-20780 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-hrpq-384f-vrpg
|
|
CVE-2022-2079 - https://huntr.dev/bounties/2615adf2-ff40-4623-97fb-2e4a3800202a
|
|
CVE-2022-20791 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imp-afr-YBFLNyzd
|
|
CVE-2022-20795 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vpndtls-dos-TunzLEV
|
|
CVE-2022-2080 - https://wpscan.com/vulnerability/5395d196-a39a-4a58-913e-5b5b9d6123a5
|
|
CVE-2022-20816 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-file-delete-N2VPmOnE
|
|
CVE-2022-20822 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-Dz5dpzyM
|
|
CVE-2022-20822 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-path-traversal/
|
|
CVE-2022-20828 - http://packetstormsecurity.com/files/168256/Cisco-ASA-X-With-FirePOWER-Services-Authenticated-Command-Injection.html
|
|
CVE-2022-20829 - https://github.com/jbaines-r7/theway
|
|
CVE-2022-2083 - https://wpscan.com/vulnerability/2bbfc855-6901-462f-8a93-120d7fb5d268
|
|
CVE-2022-2085 - https://bugs.ghostscript.com/show_bug.cgi?id=704945
|
|
CVE-2022-2086 - https://github.com/joinia/webray.com.cn/blob/main/php-bank/phpbanksql.md
|
|
CVE-2022-2086 - https://vuldb.com/?id.202034
|
|
CVE-2022-2087 - https://github.com/joinia/webray.com.cn/blob/main/php-bank/phpbankxss.md
|
|
CVE-2022-2087 - https://vuldb.com/?id.202035
|
|
CVE-2022-2089 - https://wpscan.com/vulnerability/9fe7e9d5-7bdf-4ade-9a3c-b4af863fa4e8
|
|
CVE-2022-2090 - https://wpscan.com/vulnerability/0201f365-7acb-4640-bd3f-7119432f4917
|
|
CVE-2022-2091 - https://wpscan.com/vulnerability/03e7c2dc-1c6d-4cff-af59-6b41ead74978
|
|
CVE-2022-20917 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-xmpp-Ne9SCM
|
|
CVE-2022-2092 - https://wpscan.com/vulnerability/87546554-276a-45fe-b2aa-b18bfc55db2d
|
|
CVE-2022-20921 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mso-prvesc-BPFp9cZs
|
|
CVE-2022-20929 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-4f6q-86ww-gmcr
|
|
CVE-2022-2093 - https://wpscan.com/vulnerability/a11628e4-f47b-42d8-9c09-7536d49fce4c
|
|
CVE-2022-2094 - https://wpscan.com/vulnerability/c9a106e1-29ae-47ad-907b-01086af3d3fb
|
|
CVE-2022-20956 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx
|
|
CVE-2022-20956 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx
|
|
CVE-2022-20956 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-broken-access-control/
|
|
CVE-2022-20959 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-twLnpy3M
|
|
CVE-2022-20959 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-cross-site-scripting/
|
|
CVE-2022-20964 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx
|
|
CVE-2022-20964 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/
|
|
CVE-2022-20965 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx
|
|
CVE-2022-20965 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/
|
|
CVE-2022-20966 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx
|
|
CVE-2022-20966 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/
|
|
CVE-2022-20967 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx
|
|
CVE-2022-20967 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/
|
|
CVE-2022-20968 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U
|
|
CVE-2022-20968 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U
|
|
CVE-2022-2098 - https://huntr.dev/bounties/a5d6c854-e158-49e9-bf40-bddc93dda7e6
|
|
CVE-2022-2099 - https://wpscan.com/vulnerability/0316e5f3-3302-40e3-8ff4-be3423a3be7b
|
|
CVE-2022-2100 - https://wpscan.com/vulnerability/7d8b7871-baa5-4a54-a9e9-2c9d302cdd12
|
|
CVE-2022-2101 - https://medium.com/%40andreabocchetti88/download-manager-3-2-43-contributor-cross-site-scripting-fa4970fba45c
|
|
CVE-2022-2101 - https://packetstormsecurity.com/files/167573/
|
|
CVE-2022-2111 - https://huntr.dev/bounties/a0e5c68e-0f75-499b-bd7b-d935fb8c0cd1
|
|
CVE-2022-2112 - https://huntr.dev/bounties/e57c36e7-fa39-435f-944a-3a52ee066f73
|
|
CVE-2022-21122 - https://snyk.io/vuln/SNYK-JS-METACALC-2826197
|
|
CVE-2022-21129 - https://security.snyk.io/vuln/SNYK-JS-NEMOAPPIUM-3183747
|
|
CVE-2022-2113 - https://huntr.dev/bounties/4cae8442-c042-43c2-ad89-6f666eaf3d57
|
|
CVE-2022-21134 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1447
|
|
CVE-2022-2114 - https://wpscan.com/vulnerability/59911ba4-fa06-498a-9e7c-0c337cce691c
|
|
CVE-2022-21144 - https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756
|
|
CVE-2022-21145 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1442
|
|
CVE-2022-21147 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1452
|
|
CVE-2022-21149 - https://snyk.io/vuln/SNYK-PHP-SCARTCORE-2389036
|
|
CVE-2022-21149 - https://snyk.io/vuln/SNYK-PHP-SCARTSCART-2389035
|
|
CVE-2022-2115 - https://wpscan.com/vulnerability/1f0ae535-c560-4510-ae9a-059e2435ad39
|
|
CVE-2022-21154 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1464
|
|
CVE-2022-21159 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1467
|
|
CVE-2022-21159 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1467
|
|
CVE-2022-2116 - https://wpscan.com/vulnerability/01568da4-2ecf-4cf9-8030-31868ce0a87a
|
|
CVE-2022-21164 - https://snyk.io/vuln/SNYK-JS-NODELMDB-2400723
|
|
CVE-2022-21165 - https://security.snyk.io/vuln/SNYK-JS-FONTCONVERTER-2976194
|
|
CVE-2022-21169 - https://github.com/AhmedAdelFahim/express-xss-sanitizer/issues/4
|
|
CVE-2022-21169 - https://security.snyk.io/vuln/SNYK-JS-EXPRESSXSSSANITIZER-3027443
|
|
CVE-2022-21178 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1457
|
|
CVE-2022-2118 - https://wpscan.com/vulnerability/9a19af60-d6e6-4fa3-82eb-3636599b814c
|
|
CVE-2022-21182 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1472
|
|
CVE-2022-21184 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1461
|
|
CVE-2022-21186 - https://security.snyk.io/vuln/SNYK-JS-ACRONTUMFILESYSTEMTEMPLATE-2419071
|
|
CVE-2022-21187 - https://snyk.io/vuln/SNYK-PYTHON-LIBVCS-2421204
|
|
CVE-2022-21189 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805308
|
|
CVE-2022-21189 - https://snyk.io/vuln/SNYK-JS-DEXIE-2607042
|
|
CVE-2022-21190 - https://gist.github.com/dellalibera/cebce20e51410acebff1f46afdc89808
|
|
CVE-2022-21190 - https://snyk.io/vuln/SNYK-JS-CONVICT-2774757
|
|
CVE-2022-21191 - https://security.snyk.io/vuln/SNYK-JS-GLOBALMODULESPATH-3167973
|
|
CVE-2022-21192 - https://gist.github.com/lirantal/9ccdfda0edcb95e36d07a04b0b6c2db0
|
|
CVE-2022-21192 - https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149916
|
|
CVE-2022-21195 - https://snyk.io/vuln/SNYK-PYTHON-URLREGEX-2347643
|
|
CVE-2022-21199 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1448
|
|
CVE-2022-21201 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1456
|
|
CVE-2022-21208 - https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988723
|
|
CVE-2022-21210 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1444
|
|
CVE-2022-21211 - https://snyk.io/vuln/SNYK-JS-POSIX-2400719
|
|
CVE-2022-21213 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2870623
|
|
CVE-2022-21213 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2870622
|
|
CVE-2022-21213 - https://snyk.io/vuln/SNYK-JS-MOUT-2342654
|
|
CVE-2022-21217 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1445
|
|
CVE-2022-2122 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225
|
|
CVE-2022-21222 - https://security.snyk.io/vuln/SNYK-JS-CSSWHAT-3035488
|
|
CVE-2022-21223 - https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414280
|
|
CVE-2022-21225 - http://packetstormsecurity.com/files/170180/Intel-Data-Center-Manager-4.1-SQL-Injection.html
|
|
CVE-2022-21225 - http://seclists.org/fulldisclosure/2022/Dec/1
|
|
CVE-2022-21227 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470
|
|
CVE-2022-21227 - https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645
|
|
CVE-2022-2123 - https://wpscan.com/vulnerability/46b634f6-92bc-4e00-a4c0-c25135c61922
|
|
CVE-2022-21231 - https://snyk.io/vuln/SNYK-JS-DEEPGETSET-2342655
|
|
CVE-2022-21234 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1443
|
|
CVE-2022-21235 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMINDSVCS-2437078
|
|
CVE-2022-21236 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1446
|
|
CVE-2022-21238 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1469
|
|
CVE-2022-2124 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-2124 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-2124 - http://seclists.org/fulldisclosure/2022/Oct/45
|
|
CVE-2022-2124 - https://huntr.dev/bounties/8e9e056d-f733-4540-98b6-414bf36e0b42
|
|
CVE-2022-21242 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21243 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21244 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21245 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21246 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21247 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21248 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21249 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-2125 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-2125 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-2125 - http://seclists.org/fulldisclosure/2022/Oct/45
|
|
CVE-2022-2125 - https://huntr.dev/bounties/17dab24d-beec-464d-9a72-5b6b11283705
|
|
CVE-2022-21250 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21251 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21252 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21253 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21254 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21255 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21256 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21257 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21258 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21259 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-2126 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-2126 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-2126 - http://seclists.org/fulldisclosure/2022/Oct/45
|
|
CVE-2022-2126 - https://huntr.dev/bounties/8d196d9b-3d10-41d2-9f70-8ef0d08c946e
|
|
CVE-2022-21260 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21261 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21262 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21263 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21264 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21265 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21266 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21267 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21268 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21269 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21270 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21271 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21271 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21272 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21273 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21274 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21275 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21276 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21277 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21278 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21279 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-2128 - https://huntr.dev/bounties/ec40ec76-c7db-4384-a33b-024f3dd21d75
|
|
CVE-2022-21280 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21281 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21282 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21283 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21284 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21285 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21286 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21287 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21288 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21289 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-2129 - https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352
|
|
CVE-2022-21290 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21291 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21292 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21293 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21294 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21295 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21296 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21297 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21298 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21299 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-2130 - https://huntr.dev/bounties/0142970a-5cb8-4dba-8bbc-4fa2f3bee65c
|
|
CVE-2022-21300 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21301 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21302 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21303 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21304 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21305 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21306 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21307 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21308 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21309 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21310 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21311 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21312 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21313 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21314 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21315 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21316 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21317 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21318 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21319 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21320 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21321 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21322 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21323 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21324 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21325 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21326 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21327 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21328 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21329 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-2133 - https://wpscan.com/vulnerability/e76939ca-180f-4472-a26a-e0c36cfd32de
|
|
CVE-2022-21330 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21331 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21332 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21333 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21334 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21335 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21336 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21337 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21338 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21339 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-2134 - https://huntr.dev/bounties/57b0f272-a97f-4cb3-b546-c863c68a561a
|
|
CVE-2022-21340 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21341 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21342 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21344 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21345 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21346 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21347 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21348 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21349 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21350 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21351 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21352 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21353 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21354 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21355 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21356 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21357 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21358 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21359 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21360 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21361 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21362 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21363 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21364 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21365 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21366 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21367 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21368 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21369 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21370 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21371 - http://packetstormsecurity.com/files/165736/Oracle-WebLogic-Server-14.1.1.0.0-Local-File-Inclusion.html
|
|
CVE-2022-21371 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21372 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21373 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21374 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21375 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21375 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21376 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21377 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21378 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21379 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21380 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21381 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21382 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21383 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21385 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea010070d0a7497253d5a6f919f6dd107450b31a
|
|
CVE-2022-21386 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21387 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21388 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21389 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21390 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21391 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21392 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21393 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21394 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21395 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21396 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21397 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21398 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21399 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21400 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21401 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21402 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21403 - https://www.oracle.com/security-alerts/cpujan2022.html
|
|
CVE-2022-21404 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21405 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21409 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21410 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21411 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21412 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21413 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21414 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21415 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21416 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21417 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21418 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21419 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21420 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21421 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21422 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21423 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21424 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21425 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21426 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21427 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21428 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21429 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2143 - http://packetstormsecurity.com/files/168108/Advantech-iView-NetworkServlet-Command-Injection.html
|
|
CVE-2022-21430 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21431 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21432 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21434 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21435 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21436 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21437 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21438 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21439 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2144 - https://wpscan.com/vulnerability/419054d4-95e8-4f4a-b864-a98b3e18435a
|
|
CVE-2022-21440 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21441 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21442 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21443 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21444 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21445 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21446 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21447 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21448 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21449 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21450 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21451 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21452 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21453 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21454 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21455 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21456 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21457 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21458 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21459 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-2146 - https://wpscan.com/vulnerability/adc1d752-331e-44af-b5dc-b463d56c2cb4
|
|
CVE-2022-21460 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21461 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21462 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21463 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21464 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21465 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21466 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21467 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21468 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21469 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21470 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21471 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21472 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21473 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21474 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21475 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21476 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21477 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21478 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21479 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-2148 - https://wpscan.com/vulnerability/92214311-da6d-49a8-95c9-86f47635264f
|
|
CVE-2022-21480 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21481 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21482 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21483 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21484 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21485 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21486 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21487 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21488 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21489 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-2149 - https://wpscan.com/vulnerability/40191e87-8648-47ef-add0-d7180e8ffe13
|
|
CVE-2022-21490 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21491 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21492 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21493 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21494 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21496 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21497 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21498 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21499 - http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
|
|
CVE-2022-21500 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21508 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21509 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2151 - https://wpscan.com/vulnerability/7c08e4c1-57c5-471c-a990-dcb9fd7ce0f4
|
|
CVE-2022-21510 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21511 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21512 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21513 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21514 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21515 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21516 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21517 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21518 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21519 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2152 - https://wpscan.com/vulnerability/e972e2c5-0d56-4d2a-81cc-2b0dff750124
|
|
CVE-2022-21520 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21521 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21522 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21523 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21524 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21525 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21526 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21527 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21528 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21529 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2153 - https://www.openwall.com/lists/oss-security/2022/06/22/1
|
|
CVE-2022-21530 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21531 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21532 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21533 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21534 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21535 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21536 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21537 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21538 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21539 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21540 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21541 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21542 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21543 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21544 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21545 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21547 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21548 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21549 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21550 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21551 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21552 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21553 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21554 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21555 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21556 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21557 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21558 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21559 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21560 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21561 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21562 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21563 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21564 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21565 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21566 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21567 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21568 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21569 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21570 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21571 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21572 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21573 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21574 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21575 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21576 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21577 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21578 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21579 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21580 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21581 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21582 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21583 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21584 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21585 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21586 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-21587 - http://packetstormsecurity.com/files/171208/Oracle-E-Business-Suite-EBS-Unauthenticated-Arbitrary-File-Upload.html
|
|
CVE-2022-21587 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21589 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21590 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21591 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21592 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21593 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21594 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21595 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21596 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21597 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21598 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21599 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21600 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21601 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21602 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21603 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21604 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21605 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21606 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21607 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21608 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21609 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21610 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21611 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21612 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21613 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21614 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21615 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21616 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21617 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21618 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21619 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21620 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21621 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21622 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21623 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21624 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21625 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21626 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21627 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21628 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21629 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21630 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21631 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21632 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21633 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21634 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21635 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21636 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21637 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21638 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21639 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21640 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21641 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-21649 - https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/
|
|
CVE-2022-21650 - https://www.huntr.dev/bounties/ae424798-de01-4972-b73b-2db674f82368/
|
|
CVE-2022-21658 - https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946
|
|
CVE-2022-2166 - https://huntr.dev/bounties/2f96f990-01c2-44ea-ae47-58bdb3aa455b
|
|
CVE-2022-21661 - http://packetstormsecurity.com/files/165540/WordPress-Core-5.8.2-SQL-Injection.html
|
|
CVE-2022-21661 - https://www.exploit-db.com/exploits/50663
|
|
CVE-2022-2167 - https://wpscan.com/vulnerability/ad35fbae-1e90-47a0-b1d2-f8d91a5db90e
|
|
CVE-2022-21677 - https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27
|
|
CVE-2022-2168 - https://wpscan.com/vulnerability/66789b32-049e-4440-8b19-658649851010
|
|
CVE-2022-21680 - https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf
|
|
CVE-2022-21681 - https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj
|
|
CVE-2022-21689 - https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc
|
|
CVE-2022-2169 - https://wpscan.com/vulnerability/a9f4aab7-b42b-4bb6-b05d-05407f935230
|
|
CVE-2022-21694 - https://github.com/onionshare/onionshare/issues/1389
|
|
CVE-2022-21699 - https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x
|
|
CVE-2022-2170 - https://wpscan.com/vulnerability/6eaef938-ce98-4d57-8a1d-fa9d1ae3d6ed
|
|
CVE-2022-2171 - https://wpscan.com/vulnerability/11937296-7ecf-4b94-b274-06f7990dbede
|
|
CVE-2022-21711 - https://github.com/liyansong2018/elfspirit/issues/1
|
|
CVE-2022-21716 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-2172 - https://wpscan.com/vulnerability/bfb6ed12-ae64-4075-9d0b-5620e998df74
|
|
CVE-2022-21720 - https://github.com/glpi-project/glpi/security/advisories/GHSA-5hg4-r64r-rf83
|
|
CVE-2022-21723 - http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html
|
|
CVE-2022-2173 - https://wpscan.com/vulnerability/86bfe0cc-a579-43d6-a26b-6e06000251f6
|
|
CVE-2022-2174 - https://huntr.dev/bounties/ac68e3fc-8cf1-4a62-90ee-95c4b2bad607
|
|
CVE-2022-2175 - https://huntr.dev/bounties/7f0481c2-8b57-4324-b47c-795d1ea67e55
|
|
CVE-2022-21796 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1451
|
|
CVE-2022-21797 - https://security.snyk.io/vuln/SNYK-PYTHON-JOBLIB-3027033
|
|
CVE-2022-2180 - https://wpscan.com/vulnerability/c330f92b-1e21-414f-b316-d5e97cb62bd1
|
|
CVE-2022-21801 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1450
|
|
CVE-2022-21802 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936781
|
|
CVE-2022-21802 - https://security.snyk.io/vuln/SNYK-JS-GRAPESJS-2935960
|
|
CVE-2022-21803 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2632450
|
|
CVE-2022-21803 - https://snyk.io/vuln/SNYK-JS-NCONF-2395478
|
|
CVE-2022-21806 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1440
|
|
CVE-2022-21809 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1468
|
|
CVE-2022-2181 - https://wpscan.com/vulnerability/68ddf343-6e69-44a7-bd33-72004053d41e
|
|
CVE-2022-21810 - https://security.snyk.io/vuln/SNYK-JS-SMARTCTL-3175613
|
|
CVE-2022-21817 - https://nvidia.custhelp.com/app/answers/detail/a_id/5318
|
|
CVE-2022-2182 - https://huntr.dev/bounties/238d8650-3beb-4831-a8f7-6f0b597a6fb8
|
|
CVE-2022-21820 - http://packetstormsecurity.com/files/167396/NVIDIA-Data-Center-GPU-Manager-Remote-Memory-Corruption.html
|
|
CVE-2022-21824 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-21824 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2183 - https://huntr.dev/bounties/d74ca3f9-380d-4c0a-b61c-11113cc98975
|
|
CVE-2022-2184 - https://wpscan.com/vulnerability/e777784f-5ba0-4966-be27-e0a0cbbfe056
|
|
CVE-2022-2186 - https://wpscan.com/vulnerability/b766103a-7f91-4d91-9f9c-bff4bfd53f57
|
|
CVE-2022-2187 - https://wpscan.com/vulnerability/4fd2f1ef-39c6-4425-8b4d-1a332dabac8d
|
|
CVE-2022-2188 - https://kcm.trellix.com/corporate/index?page=content&id=SB10383
|
|
CVE-2022-21881 - http://packetstormsecurity.com/files/168097/Race-Against-The-Sandbox.html
|
|
CVE-2022-21882 - http://packetstormsecurity.com/files/166169/Win32k-ConsoleControl-Offset-Confusion-Privilege-Escalation.html
|
|
CVE-2022-2189 - https://wpscan.com/vulnerability/b6ed4d64-ee98-41bd-a97a-8350c2a8a546
|
|
CVE-2022-2190 - https://wpscan.com/vulnerability/1af4beb6-ba16-429b-acf2-43f9594f5ace
|
|
CVE-2022-21907 - http://packetstormsecurity.com/files/165566/HTTP-Protocol-Stack-Denial-Of-Service-Remote-Code-Execution.html
|
|
CVE-2022-21907 - http://packetstormsecurity.com/files/166730/Microsoft-HTTP-Protocol-Stack-Denial-Of-Service.html
|
|
CVE-2022-21907 - https://github.com/nu11secur1ty/Windows10Exploits/tree/master/2022/CVE-2022-21907
|
|
CVE-2022-2194 - https://wpscan.com/vulnerability/ecf4b707-dea9-42d0-9ade-d788a9f97190
|
|
CVE-2022-21948 - https://bugzilla.suse.com/show_bug.cgi?id=1197930
|
|
CVE-2022-21952 - https://bugzilla.suse.com/show_bug.cgi?id=1199512
|
|
CVE-2022-2196 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
|
|
CVE-2022-2198 - https://wpscan.com/vulnerability/867248f2-d497-4ea8-b3f8-0f2e8aaaa2bd
|
|
CVE-2022-21999 - http://packetstormsecurity.com/files/166344/Windows-SpoolFool-Privilege-Escalation.html
|
|
CVE-2022-22026 - http://packetstormsecurity.com/files/168068/Windows-sxs-CNodeFactory-XMLParser_Element_doc_assembly_assemblyIdentity-Heap-Buffer-Overflow.html
|
|
CVE-2022-22031 - http://packetstormsecurity.com/files/168094/Windows-Credential-Guard-Domain-Joined-Device-Public-Key-Privilege-Escalation.html
|
|
CVE-2022-22049 - http://packetstormsecurity.com/files/168069/Windows-sxssrv-BaseSrvActivationContextCacheDuplicateUnicodeString-Heap-Buffer-Overflow.html
|
|
CVE-2022-22057 - http://packetstormsecurity.com/files/172850/Qualcomm-kgsl-Driver-Use-After-Free.html
|
|
CVE-2022-2206 - https://huntr.dev/bounties/01d01e74-55d0-4d9e-878e-79ba599be668
|
|
CVE-2022-2207 - https://huntr.dev/bounties/05bc6051-4dc3-483b-ae56-cf23346b97b9
|
|
CVE-2022-2208 - https://huntr.dev/bounties/7bfe3d5b-568f-4c34-908f-a39909638cc1
|
|
CVE-2022-2210 - https://huntr.dev/bounties/020845f8-f047-4072-af0f-3726fe1aea25
|
|
CVE-2022-22107 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22107
|
|
CVE-2022-22108 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22108
|
|
CVE-2022-22109 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22109
|
|
CVE-2022-22110 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22110
|
|
CVE-2022-22111 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22111
|
|
CVE-2022-22112 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22112
|
|
CVE-2022-22113 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22113
|
|
CVE-2022-22114 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22114
|
|
CVE-2022-22115 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22115
|
|
CVE-2022-22116 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22116
|
|
CVE-2022-22117 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22117
|
|
CVE-2022-2212 - https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/File_Upload/POC.md
|
|
CVE-2022-2212 - https://vuldb.com/?id.202758
|
|
CVE-2022-22120 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22120
|
|
CVE-2022-22121 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22121
|
|
CVE-2022-22123 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22123
|
|
CVE-2022-22124 - https://github.com/halo-dev/halo/issues/1575
|
|
CVE-2022-22124 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22124
|
|
CVE-2022-22125 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22125
|
|
CVE-2022-2213 - https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/Cross%20Site%20Scripting(Stored)/POC.md
|
|
CVE-2022-2213 - https://vuldb.com/?id.202759
|
|
CVE-2022-22137 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1449
|
|
CVE-2022-22138 - https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392367
|
|
CVE-2022-2214 - https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/Sql%20Injection/POC.md
|
|
CVE-2022-2214 - https://vuldb.com/?id.202760
|
|
CVE-2022-22140 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1458
|
|
CVE-2022-22143 - https://snyk.io/vuln/SNYK-JS-CONVICT-2340604
|
|
CVE-2022-22144 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1459
|
|
CVE-2022-22149 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1441
|
|
CVE-2022-2215 - https://wpscan.com/vulnerability/daa9b6c1-1ee1-434c-9f88-fd273b7e20bb
|
|
CVE-2022-22150 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1439
|
|
CVE-2022-2216 - https://huntr.dev/bounties/505a3d39-2723-4a06-b1f7-9b2d133c92e1
|
|
CVE-2022-2217 - https://huntr.dev/bounties/4e046c63-b1ca-4bcc-b418-29796918a71b
|
|
CVE-2022-2218 - https://huntr.dev/bounties/024912d3-f103-4daf-a1d0-567f4d9f2bf5
|
|
CVE-2022-2219 - https://wpscan.com/vulnerability/1240797c-7f45-4c36-83f0-501c544ce76a
|
|
CVE-2022-2222 - https://wpscan.com/vulnerability/dd48624a-1781-419c-a3c4-1e3eaf5e2c1b
|
|
CVE-2022-22263 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
|
CVE-2022-22264 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
|
CVE-2022-22265 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
|
CVE-2022-22266 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
|
CVE-2022-22267 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
|
CVE-2022-22268 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
|
CVE-2022-22269 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
|
CVE-2022-22270 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
|
CVE-2022-22271 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
|
CVE-2022-22272 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
|
CVE-2022-22291 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-22292 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-22293 - https://github.com/Dolibarr/dolibarr/issues/20237
|
|
CVE-2022-2231 - https://huntr.dev/bounties/8dae6ab4-7a7a-4716-a65c-9b090fa057b5
|
|
CVE-2022-22312 - https://www.ibm.com/support/pages/node/6574671
|
|
CVE-2022-22323 - https://www.ibm.com/support/pages/node/6574671
|
|
CVE-2022-2239 - https://wpscan.com/vulnerability/42127d96-547f-46cb-95d0-a19a8fe7580e
|
|
CVE-2022-2241 - https://wpscan.com/vulnerability/8670d196-972b-491b-8d9b-25994a345f57
|
|
CVE-2022-2242 - https://www.kuka.com/advisories-CVE-2022-2242
|
|
CVE-2022-2245 - https://wpscan.com/vulnerability/33705003-1f82-4b0c-9b4b-d4de75da309c
|
|
CVE-2022-2250 - https://gitlab.com/gitlab-org/gitlab/-/issues/355509
|
|
CVE-2022-2251 - https://gitlab.com/gitlab-org/gitlab-runner/-/issues/27386
|
|
CVE-2022-2252 - https://huntr.dev/bounties/4d394bcc-a000-4f96-8cd2-8c565e1347e8
|
|
CVE-2022-22521 - http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html
|
|
CVE-2022-22521 - http://seclists.org/fulldisclosure/2022/Apr/42
|
|
CVE-2022-22528 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22530 - https://launchpad.support.sap.com/#/notes/3112928
|
|
CVE-2022-22531 - https://launchpad.support.sap.com/#/notes/3112928
|
|
CVE-2022-22532 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22533 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22534 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22535 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22536 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22537 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22538 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22539 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22540 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22541 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22542 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22543 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22544 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22545 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22546 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-22547 - http://packetstormsecurity.com/files/167562/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Information-Disclosure.html
|
|
CVE-2022-2257 - https://huntr.dev/bounties/ca581f80-03ba-472a-b820-78f7fd05fe89
|
|
CVE-2022-2260 - https://wpscan.com/vulnerability/831b3afa-8fa3-4cb7-8374-36d0c368292f
|
|
CVE-2022-2261 - https://wpscan.com/vulnerability/f6091d7b-97b5-42f2-b2f4-09a0fe6d5a21
|
|
CVE-2022-2262 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Online%20Hotel%20Booking%20System/Online%20Hotel%20Booking%20System%20edit_all_room.php%20id%20SQL%20inject.md
|
|
CVE-2022-2262 - https://vuldb.com/?id.202981
|
|
CVE-2022-2263 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Online%20Hotel%20Booking%20System/Online%20Hotel%20Booking%20System%20edit_room_cat.php%20id%20SQL%20inject.md
|
|
CVE-2022-2263 - https://vuldb.com/?id.202982
|
|
CVE-2022-2264 - https://huntr.dev/bounties/2241c773-02c9-4708-b63e-54aef99afa6c
|
|
CVE-2022-22666 - http://packetstormsecurity.com/files/167144/AppleVideoDecoder-CreateHeaderBuffer-Out-Of-Bounds-Free.html
|
|
CVE-2022-2267 - https://wpscan.com/vulnerability/e3bd9f8c-919a-40af-9e80-607573e71870
|
|
CVE-2022-2268 - https://wpscan.com/vulnerability/578093db-a025-4148-8c4b-ec2df31743f7
|
|
CVE-2022-2269 - https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65
|
|
CVE-2022-22700 - https://fluidattacks.com/advisories/porter/
|
|
CVE-2022-22701 - https://fluidattacks.com/advisories/hendrix/
|
|
CVE-2022-22702 - https://fluidattacks.com/advisories/joplin/
|
|
CVE-2022-2271 - https://wpscan.com/vulnerability/b064940f-9614-4b7b-b2c4-e79528746833
|
|
CVE-2022-22719 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-22720 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-22720 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-22721 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-22721 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2273 - https://wpscan.com/vulnerability/724729d9-1c4a-485c-9c90-a27664c47c84
|
|
CVE-2022-22734 - https://wpscan.com/vulnerability/f6e15a23-8f8c-47c2-8227-e277856d8251
|
|
CVE-2022-22735 - https://wpscan.com/vulnerability/6940a97e-5a75-405c-be74-bedcc3a8ee00
|
|
CVE-2022-22737 - https://bugzilla.mozilla.org/show_bug.cgi?id=1745874
|
|
CVE-2022-22739 - https://bugzilla.mozilla.org/show_bug.cgi?id=1744158
|
|
CVE-2022-22740 - https://bugzilla.mozilla.org/show_bug.cgi?id=1742334
|
|
CVE-2022-22744 - https://bugzilla.mozilla.org/show_bug.cgi?id=1737252
|
|
CVE-2022-22748 - https://bugzilla.mozilla.org/show_bug.cgi?id=1705211
|
|
CVE-2022-2275 - https://wpscan.com/vulnerability/07757d1e-39ad-4199-bc7a-ecb821dfc996
|
|
CVE-2022-22753 - https://bugzilla.mozilla.org/show_bug.cgi?id=1732435
|
|
CVE-2022-22753 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
|
CVE-2022-22754 - https://bugzilla.mozilla.org/show_bug.cgi?id=1750565
|
|
CVE-2022-22754 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
|
CVE-2022-22755 - https://bugzilla.mozilla.org/show_bug.cgi?id=1309630
|
|
CVE-2022-22755 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
|
CVE-2022-22756 - https://bugzilla.mozilla.org/show_bug.cgi?id=1317873
|
|
CVE-2022-22756 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
|
CVE-2022-22757 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
|
CVE-2022-22758 - https://bugzilla.mozilla.org/show_bug.cgi?id=1728742
|
|
CVE-2022-22758 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
|
CVE-2022-22759 - https://bugzilla.mozilla.org/show_bug.cgi?id=1739957
|
|
CVE-2022-22759 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
|
CVE-2022-2276 - https://wpscan.com/vulnerability/92de9c1b-48dd-4a5f-bbb3-455f8f172b09
|
|
CVE-2022-22760 - https://bugzilla.mozilla.org/show_bug.cgi?id=1740985
|
|
CVE-2022-22760 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
|
CVE-2022-22761 - https://bugzilla.mozilla.org/show_bug.cgi?id=1745566
|
|
CVE-2022-22761 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
|
CVE-2022-22762 - https://bugzilla.mozilla.org/show_bug.cgi?id=1743931
|
|
CVE-2022-22762 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
|
CVE-2022-22764 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
|
CVE-2022-2278 - https://wpscan.com/vulnerability/4481731d-4dbf-4bfa-b4cc-64f10bb7e7bf
|
|
CVE-2022-22787 - http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html
|
|
CVE-2022-2279 - https://huntr.dev/bounties/68c249e2-779d-4871-b7e3-851f03aca2de
|
|
CVE-2022-22805 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-02
|
|
CVE-2022-22806 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-02
|
|
CVE-2022-22819 - https://oxide.computer/blog/another-vulnerability-in-the-lpc55s69-rom
|
|
CVE-2022-22831 - http://packetstormsecurity.com/files/165863/Servisnet-Tessa-Authentication-Bypass.html
|
|
CVE-2022-22831 - https://www.exploit-db.com/exploits/50714
|
|
CVE-2022-22831 - https://www.pentest.com.tr/exploits/Servisnet-Tessa-Add-sysAdmin-User-Unauthenticated.html
|
|
CVE-2022-22832 - http://packetstormsecurity.com/files/165873/Servisnet-Tessa-Privilege-Escalation.html
|
|
CVE-2022-22832 - https://www.exploit-db.com/exploits/50712
|
|
CVE-2022-22832 - https://www.pentest.com.tr/exploits/Servisnet-Tessa-Privilege-Escalation.html
|
|
CVE-2022-22833 - http://packetstormsecurity.com/files/165867/Servisnet-Tessa-MQTT-Credential-Disclosure.html
|
|
CVE-2022-22833 - https://pentest.com.tr/exploits/Servisnet-Tessa-MQTT-Credentials-Dump-Unauthenticated.html
|
|
CVE-2022-22833 - https://www.exploit-db.com/exploits/50713
|
|
CVE-2022-22834 - https://labs.yarix.com/2022/03/overit-framework-xslt-injection-and-xxe-cve-2022-22834-cve-2022-22835/
|
|
CVE-2022-22835 - https://labs.yarix.com/2022/03/overit-framework-xslt-injection-and-xxe-cve-2022-22834-cve-2022-22835/
|
|
CVE-2022-22836 - https://yoursecuritybores.me/coreftp-vulnerabilities/
|
|
CVE-2022-2284 - https://huntr.dev/bounties/571d25ce-8d53-4fa0-b620-27f2a8a14874
|
|
CVE-2022-22844 - https://gitlab.com/libtiff/libtiff/-/issues/355
|
|
CVE-2022-2285 - https://huntr.dev/bounties/64574b28-1779-458d-a221-06c434042736
|
|
CVE-2022-22853 - https://github.com/Dheeraj-Deshmukh/stored-xss-in-Hospital-s-Patient-Records-Management-System
|
|
CVE-2022-22853 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/hprms_0.zip
|
|
CVE-2022-2286 - https://huntr.dev/bounties/fe7681fb-2318-436b-8e65-daf66cd597d8
|
|
CVE-2022-2287 - https://huntr.dev/bounties/654aa069-3a9d-45d3-9a52-c1cf3490c284
|
|
CVE-2022-2288 - https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad
|
|
CVE-2022-2289 - https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64
|
|
CVE-2022-22890 - https://github.com/jerryscript-project/jerryscript/issues/4847
|
|
CVE-2022-22891 - https://github.com/jerryscript-project/jerryscript/issues/4871
|
|
CVE-2022-22892 - https://github.com/jerryscript-project/jerryscript/issues/4872
|
|
CVE-2022-22893 - https://github.com/jerryscript-project/jerryscript/issues/4901
|
|
CVE-2022-22894 - https://github.com/jerryscript-project/jerryscript/issues/4890
|
|
CVE-2022-22895 - https://github.com/jerryscript-project/jerryscript/issues/4882
|
|
CVE-2022-22897 - http://packetstormsecurity.com/files/168148/PrestaShop-Ap-Pagebuilder-2.4.4-SQL-Injection.html
|
|
CVE-2022-22897 - https://friends-of-presta.github.io/security-advisories/modules/2023/01/05/appagebuilder.html
|
|
CVE-2022-22899 - https://yoursecuritybores.me/coreftp-vulnerabilities/
|
|
CVE-2022-2290 - https://huntr.dev/bounties/367c5c8d-ad6f-46be-8503-06648ecf09cf
|
|
CVE-2022-22901 - https://github.com/jerryscript-project/jerryscript/issues/4916
|
|
CVE-2022-22909 - https://github.com/0z09e/CVE-2022-22909
|
|
CVE-2022-2291 - https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Hotel%20Management%20system/Cross%20Site%20Scripting(Refelected)/POC.md
|
|
CVE-2022-2291 - https://vuldb.com/?id.203165
|
|
CVE-2022-22916 - https://github.com/wendell1224/O2OA-POC/blob/main/POC.md
|
|
CVE-2022-2292 - https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Hotel%20Management%20system/Cross%20Site%20Scripting(Stored)/POC.md
|
|
CVE-2022-22922 - https://github.com/emremulazimoglu/cve/blob/main/CWE330-TL-WA850RE-v6.md
|
|
CVE-2022-2293 - https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Simple%20Sales%20Management%20System/Cross%20Site%20Scripting(Stored)/POC.md
|
|
CVE-2022-22934 - https://github.com/saltstack/salt/releases,
|
|
CVE-2022-22935 - https://github.com/saltstack/salt/releases,
|
|
CVE-2022-22936 - https://github.com/saltstack/salt/releases,
|
|
CVE-2022-22941 - https://github.com/saltstack/salt/releases,
|
|
CVE-2022-22946 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-22947 - http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html
|
|
CVE-2022-22947 - http://packetstormsecurity.com/files/168742/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html
|
|
CVE-2022-22947 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-22947 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-22954 - http://packetstormsecurity.com/files/166935/VMware-Workspace-ONE-Access-Template-Injection-Command-Execution.html
|
|
CVE-2022-22956 - http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html
|
|
CVE-2022-22956 - http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html
|
|
CVE-2022-22957 - http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html
|
|
CVE-2022-22957 - http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html
|
|
CVE-2022-22960 - http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html
|
|
CVE-2022-22960 - http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html
|
|
CVE-2022-22960 - http://packetstormsecurity.com/files/171935/VMware-Workspace-ONE-Access-Privilege-Escalation.html
|
|
CVE-2022-22963 - http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html
|
|
CVE-2022-22963 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH
|
|
CVE-2022-22963 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-22963 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-22965 - http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html
|
|
CVE-2022-22965 - http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html
|
|
CVE-2022-22965 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-22965 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-22968 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-22969 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2297 - https://github.com/CyberThoth/CVE/blob/8c6b66919be1bd66a54c16cc27cbdd9793221d3e/CVE/Clinic's%20Patient%20Management%20System/Unrestricted%20file%20upload%20(RCE)/POC.md
|
|
CVE-2022-22970 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-22971 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-22976 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-22978 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2298 - https://github.com/CyberThoth/CVE/blob/63e283e7d7dad3783237f15cdae2bb649bc1e198/CVE/Clinic's%20Patient%20Management%20System/SQLi/POC.md
|
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYK-3038622
|
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKDOCKERPLUGIN-3039679
|
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKGRADLEPLUGIN-3038624
|
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKMVNPLUGIN-3038623
|
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKPYTHONPLUGIN-3039677
|
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKSBTPLUGIN-3038626
|
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKCOCOAPODSPLUGIN-3038625
|
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKHEXPLUGIN-3039680
|
|
CVE-2022-22988 - https://www.westerndigital.com/support/product-security/wdc-22003-edgerover-desktop-app-version-1-5-0-576
|
|
CVE-2022-22989 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
|
|
CVE-2022-2299 - https://wpscan.com/vulnerability/29015c35-0470-41b8-b197-c71b800ae2a9
|
|
CVE-2022-22990 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
|
|
CVE-2022-22991 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
|
|
CVE-2022-22992 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
|
|
CVE-2022-22993 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
|
|
CVE-2022-22994 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
|
|
CVE-2022-22995 - https://www.westerndigital.com/support/product-security/wdc-22005-netatalk-security-vulnerabilities
|
|
CVE-2022-22996 - https://www.westerndigital.com/support/product-security/wdc-22007-sandisk-professional-g-raid-4-8-software-utility-setup-for-windows-privilege-escalation
|
|
CVE-2022-22997 - https://www.westerndigital.com/support/product-security/wdc-22009-my-cloud-home-firmware-version-8-7-0-107
|
|
CVE-2022-22998 - https://www.westerndigital.com/support/product-security/wdc-22009-my-cloud-home-firmware-version-8-7-0-107
|
|
CVE-2022-22999 - https://www.westerndigital.com/support/product-security/wdc-22011-my-cloud-firmware-version-5-23-114
|
|
CVE-2022-2300 - https://huntr.dev/bounties/882d6cf9-64f5-4614-a873-a3030473c817
|
|
CVE-2022-23000 - https://www.westerndigital.com/support/product-security/wdc-22011-my-cloud-firmware-version-5-23-114
|
|
CVE-2022-23001 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities
|
|
CVE-2022-23002 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities
|
|
CVE-2022-23003 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities
|
|
CVE-2022-23004 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities
|
|
CVE-2022-23005 - https://documents.westerndigital.com/content/dam/doc-library/en_us/assets/public/western-digital/collateral/white-paper/white-paper-host-boot-rom-code-vulnerability-and-mitigation.pdf
|
|
CVE-2022-23005 - https://www.westerndigital.com/support/product-security/wdc-23001-host-boot-rom-code-vulnerability-in-systems-implementing-ufs-boot-feature
|
|
CVE-2022-2301 - https://huntr.dev/bounties/f6b9114b-671d-4948-b946-ffe5c9aeb816
|
|
CVE-2022-2304 - https://huntr.dev/bounties/eb7402f3-025a-402f-97a7-c38700d9548a
|
|
CVE-2022-23043 - https://fluidattacks.com/advisories/simone/
|
|
CVE-2022-23045 - https://fluidattacks.com/advisories/osbourne/
|
|
CVE-2022-23046 - http://packetstormsecurity.com/files/165683/PHPIPAM-1.4.4-SQL-Injection.html
|
|
CVE-2022-23046 - https://fluidattacks.com/advisories/mercury/
|
|
CVE-2022-23047 - https://exponentcms.lighthouseapp.com/projects/61783/tickets/1459
|
|
CVE-2022-23047 - https://fluidattacks.com/advisories/franklin/
|
|
CVE-2022-23048 - https://exponentcms.lighthouseapp.com/projects/61783/tickets/1460
|
|
CVE-2022-23048 - https://fluidattacks.com/advisories/dylan/
|
|
CVE-2022-23049 - https://exponentcms.lighthouseapp.com/projects/61783/tickets/1461
|
|
CVE-2022-23049 - https://fluidattacks.com/advisories/cobain/
|
|
CVE-2022-2305 - https://wpscan.com/vulnerability/ea0180cd-e018-43ea-88b9-fa8e71bf34bf
|
|
CVE-2022-23050 - https://fluidattacks.com/advisories/cerati/
|
|
CVE-2022-23051 - https://fluidattacks.com/advisories/brown/
|
|
CVE-2022-23052 - https://fluidattacks.com/advisories/jett/
|
|
CVE-2022-23055 - https://www.mend.io/vulnerability-database/CVE-2022-23055
|
|
CVE-2022-23056 - https://www.mend.io/vulnerability-database/CVE-2022-23056
|
|
CVE-2022-23057 - https://www.mend.io/vulnerability-database/CVE-2022-23057
|
|
CVE-2022-23058 - https://www.mend.io/vulnerability-database/CVE-2022-23058
|
|
CVE-2022-23059 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23059
|
|
CVE-2022-2306 - https://huntr.dev/bounties/35acf263-6db4-4310-ab27-4c3c3a53f796
|
|
CVE-2022-23060 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23060
|
|
CVE-2022-23061 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23061
|
|
CVE-2022-23063 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23063
|
|
CVE-2022-23064 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23064
|
|
CVE-2022-23065 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23065
|
|
CVE-2022-23066 - https://blocksecteam.medium.com/how-a-critical-bug-in-solana-network-was-detected-and-timely-patched-a701870e1324
|
|
CVE-2022-23066 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23066
|
|
CVE-2022-23067 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23067
|
|
CVE-2022-23068 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23068
|
|
CVE-2022-23071 - https://www.mend.io/vulnerability-database/CVE-2022-23071
|
|
CVE-2022-23072 - https://www.mend.io/vulnerability-database/CVE-2022-23072
|
|
CVE-2022-23073 - https://www.mend.io/vulnerability-database/CVE-2022-23073
|
|
CVE-2022-23074 - https://www.mend.io/vulnerability-database/CVE-2022-23074
|
|
CVE-2022-23077 - https://www.mend.io/vulnerability-database/CVE-2022-23077
|
|
CVE-2022-23078 - https://www.mend.io/vulnerability-database/CVE-2022-23078
|
|
CVE-2022-23079 - https://www.mend.io/vulnerability-database/CVE-2022-23079
|
|
CVE-2022-23080 - https://www.mend.io/vulnerability-database/CVE-2022-23080
|
|
CVE-2022-23081 - https://www.mend.io/vulnerability-database/CVE-2022-23081
|
|
CVE-2022-23082 - https://www.mend.io/vulnerability-database/CVE-2022-23082
|
|
CVE-2022-2309 - https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba
|
|
CVE-2022-23099 - https://seclists.org/fulldisclosure/2022/Jul/11
|
|
CVE-2022-2310 - https://kcm.trellix.com/corporate/index?page=content&id=SB10384&actp=null&viewlocale=en_US&showDraft=false&platinum_status=false&locale=en_US
|
|
CVE-2022-23100 - https://seclists.org/fulldisclosure/2022/Jul/11
|
|
CVE-2022-23101 - https://seclists.org/fulldisclosure/2022/Jul/11
|
|
CVE-2022-23102 - http://packetstormsecurity.com/files/165966/SIEMENS-SINEMA-Remote-Connect-1.0-SP3-HF1-Open-Redirection.html
|
|
CVE-2022-23102 - http://seclists.org/fulldisclosure/2022/Feb/20
|
|
CVE-2022-23103 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1462
|
|
CVE-2022-2311 - https://wpscan.com/vulnerability/287a14dc-d1fc-481d-84af-7eb172dc68c9
|
|
CVE-2022-23119 - https://success.trendmicro.com/solution/000290104
|
|
CVE-2022-23119 - https://www.modzero.com/advisories/MZ-21-02-Trendmicro.txt
|
|
CVE-2022-2312 - https://wpscan.com/vulnerability/7548c1fb-77b5-4290-a297-35820edfe0f8
|
|
CVE-2022-23120 - https://success.trendmicro.com/solution/000290104
|
|
CVE-2022-23120 - https://www.modzero.com/advisories/MZ-21-02-Trendmicro.txt
|
|
CVE-2022-2313 - https://kcm.trellix.com/corporate/index?page=content&id=SB10385&actp=null&viewlocale=en_US&showDraft=false&platinum_status=false&locale=en_US
|
|
CVE-2022-2314 - https://wpscan.com/vulnerability/b22fe77c-844e-4c24-8023-014441cc1e82
|
|
CVE-2022-2317 - https://wpscan.com/vulnerability/77b7ca19-294c-4480-8f57-6fddfc67fffb
|
|
CVE-2022-23178 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-009
|
|
CVE-2022-23179 - https://wpscan.com/vulnerability/90b8af99-e4a1-4076-99fa-efe805dd4be4/
|
|
CVE-2022-2318 - https://github.com/torvalds/linux/commit/9cc02ede696272c5271a401e4f27c262359bc2f6
|
|
CVE-2022-23180 - https://wpscan.com/vulnerability/da87358a-3a72-4cf7-a2af-a266dd9b4290/
|
|
CVE-2022-23181 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-23181 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2321 - https://huntr.dev/bounties/3055b3f5-6b80-4d47-8e00-3500dfb458bc
|
|
CVE-2022-23218 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-23219 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-23221 - http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html
|
|
CVE-2022-23221 - http://seclists.org/fulldisclosure/2022/Jan/39
|
|
CVE-2022-23221 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-23221 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-23227 - https://github.com/pedrib/PoC/blob/master/advisories/NUUO/nuuo_nvrmini_round2.mkd
|
|
CVE-2022-23227 - https://github.com/rapid7/metasploit-framework/pull/16044
|
|
CVE-2022-23227 - https://portswigger.net/daily-swig/researcher-discloses-alleged-zero-day-vulnerabilities-in-nuuo-nvrmini2-recording-device
|
|
CVE-2022-2325 - https://wpscan.com/vulnerability/c8dcd7a7-5ad4-452c-a6a5-2362986656e4
|
|
CVE-2022-2326 - https://gitlab.com/gitlab-org/gitlab/-/issues/356665
|
|
CVE-2022-23277 - http://packetstormsecurity.com/files/168131/Microsoft-Exchange-Server-ChainedSerializationBinder-Remote-Code-Execution.html
|
|
CVE-2022-2328 - https://wpscan.com/vulnerability/dbac391b-fc48-4e5e-b63a-2b3ddb0d5552
|
|
CVE-2022-2330 - https://kcm.trellix.com/corporate/index?page=content&id=SB10386
|
|
CVE-2022-23302 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-23302 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-23305 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-23305 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-23307 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-23307 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-23308 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-23316 - https://github.com/taogogo/taocms/issues/15
|
|
CVE-2022-23320 - https://www.triaxiomsecurity.com/xmpie-ustore-vulnerabilities-discovered/
|
|
CVE-2022-23321 - https://www.triaxiomsecurity.com/xmpie-ustore-vulnerabilities-discovered/
|
|
CVE-2022-23332 - https://github.com/kyl3song/CVE/tree/main/CVE-2022-23332
|
|
CVE-2022-23334 - https://www.on-x.com/wp-content/uploads/2023/01/ON-X-Security-Advisory-Ip-label-Ekara-Newtest-CVE-2022-23334.pdf
|
|
CVE-2022-23340 - https://github.com/laurent22/joplin/issues/6004
|
|
CVE-2022-23342 - https://github.com/InitRoot/CVE-2022-23342
|
|
CVE-2022-23345 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23345
|
|
CVE-2022-23346 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23346
|
|
CVE-2022-23347 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23347
|
|
CVE-2022-23348 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23348
|
|
CVE-2022-23349 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23349
|
|
CVE-2022-23350 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23350
|
|
CVE-2022-23352 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23352
|
|
CVE-2022-23366 - http://packetstormsecurity.com/files/165948/Hospital-Management-Startup-1.0-SQL-Injection.html
|
|
CVE-2022-23366 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-23366
|
|
CVE-2022-23367 - https://gist.github.com/bincat99/311aff295c270371dc8ee89599b016f1
|
|
CVE-2022-23377 - https://www.exploit-db.com/exploits/50665
|
|
CVE-2022-23378 - https://github.com/TheGetch/CVE-2022-23378
|
|
CVE-2022-2339 - https://huntr.dev/bounties/fff06de8-2a82-49b1-8e81-968731e87eef
|
|
CVE-2022-23390 - https://github.com/diyhi/bbs/issues/51
|
|
CVE-2022-23399 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1454
|
|
CVE-2022-2340 - https://packetstormsecurity.com/files/167595/
|
|
CVE-2022-2340 - https://wpscan.com/vulnerability/306ea895-0b90-4276-bb97-eecb34f9bfae
|
|
CVE-2022-23400 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1465
|
|
CVE-2022-23409 - http://packetstormsecurity.com/files/165706/Ethercreative-Logs-3.0.3-Path-Traversal.html
|
|
CVE-2022-23409 - https://sec-consult.com/vulnerability-lab/
|
|
CVE-2022-2341 - https://packetstormsecurity.com/files/167597/
|
|
CVE-2022-2341 - https://wpscan.com/vulnerability/4a98a024-1f84-482f-9dc9-4714ac42c094
|
|
CVE-2022-2342 - https://huntr.dev/bounties/b2caceaa-5b28-40ba-9980-70144159efba
|
|
CVE-2022-23425 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-23426 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-23427 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-23428 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-23429 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-2343 - https://huntr.dev/bounties/2ecb4345-2fc7-4e7f-adb0-83a20bb458f5
|
|
CVE-2022-23431 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-23432 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-23437 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-23437 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2344 - https://huntr.dev/bounties/4a095ed9-3125-464a-b656-c31b437e1996
|
|
CVE-2022-2345 - https://huntr.dev/bounties/1eed7009-db6d-487b-bc41-8f2fd260483f
|
|
CVE-2022-23457 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-23458 - https://securitylab.github.com/advisories/GHSL-2022-029_nhn_tui_grid/
|
|
CVE-2022-23459 - https://securitylab.github.com/advisories/GHSL-2022-048_Jsonxx
|
|
CVE-2022-23461 - https://securitylab.github.com/advisories/GHSL-2022-030_xdan_jodit/
|
|
CVE-2022-23463 - https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/
|
|
CVE-2022-23464 - https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/
|
|
CVE-2022-23474 - https://securitylab.github.com/advisories/GHSL-2022-028_codex-team_editor_js/
|
|
CVE-2022-2350 - https://wpscan.com/vulnerability/de28543b-c110-4a9f-bfe9-febccfba3a96
|
|
CVE-2022-23507 - https://github.com/informalsystems/tendermint-rs/security/advisories/GHSA-xqqc-c5gw-c5r5
|
|
CVE-2022-2351 - https://wpscan.com/vulnerability/f3fda033-58f5-446d-ade4-2336a39bfb87
|
|
CVE-2022-23512 - https://github.com/metersphere/metersphere/security/advisories/GHSA-5mwp-xw7p-5j27
|
|
CVE-2022-23513 - http://packetstormsecurity.com/files/174460/AdminLTE-PiHole-Broken-Access-Control.html
|
|
CVE-2022-23513 - https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-6qh8-6rrj-7497
|
|
CVE-2022-2352 - https://wpscan.com/vulnerability/dc99ac40-646a-4f8e-b2b9-dc55d6d4c55c
|
|
CVE-2022-23520 - https://hackerone.com/reports/1654310
|
|
CVE-2022-23522 - https://github.com/mindsdb/mindsdb/security/advisories/GHSA-7x45-phmr-9wqp
|
|
CVE-2022-23529 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
|
|
CVE-2022-2353 - https://huntr.dev/bounties/7782c095-9e8c-48b0-a7f5-3a8f52e8af52
|
|
CVE-2022-23530 - https://github.com/DataDog/guarddog/security/advisories/GHSA-78m5-jpmf-ch7v
|
|
CVE-2022-23539 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
|
|
CVE-2022-2354 - https://wpscan.com/vulnerability/1c8c5861-ce87-4813-9e26-470d63c1903a
|
|
CVE-2022-23540 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
|
|
CVE-2022-23541 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
|
|
CVE-2022-23544 - https://github.com/metersphere/metersphere/security/advisories/GHSA-vrv6-cg45-rmjj
|
|
CVE-2022-2355 - https://wpscan.com/vulnerability/426b5a0f-c16d-429a-9396-b3aea7922826
|
|
CVE-2022-23553 - https://securitylab.github.com/advisories/GHSL-2021-1009-Alpine/
|
|
CVE-2022-23555 - https://github.com/goauthentik/authentik/security/advisories/GHSA-9qwp-jf7p-vr7h
|
|
CVE-2022-2356 - https://wpscan.com/vulnerability/67f3948e-27d4-47a8-8572-616143b9cf43
|
|
CVE-2022-2357 - https://wpscan.com/vulnerability/42499b84-684e-42e1-b7f0-de206d4da553
|
|
CVE-2022-23596 - https://github.com/junrar/junrar/issues/73
|
|
CVE-2022-23608 - http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html
|
|
CVE-2022-2361 - https://wpscan.com/vulnerability/aa69377d-ba9e-4a2f-921c-be2ab5edcb4e
|
|
CVE-2022-2362 - https://wpscan.com/vulnerability/d94b721e-9ce2-45e5-a673-2a57b0137653
|
|
CVE-2022-23626 - http://packetstormsecurity.com/files/167235/m1k1os-Blog-1.3-Remote-Code-Execution.html
|
|
CVE-2022-2363 - https://github.com/CyberThoth/CVE/blob/eea3090b960da014312f7ad4b09aa58d23966d77/CVE/Simple%20Parking%20Management%20System/Cross%20Site%20Scripting(Refelected)/POC.md
|
|
CVE-2022-23632 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2364 - https://github.com/CyberThoth/CVE/blob/eea3090b960da014312f7ad4b09aa58d23966d77/CVE/Simple%20Parking%20Management%20System/Cross%20Site%20Scripting(Stored)/POC.md
|
|
CVE-2022-23642 - http://packetstormsecurity.com/files/167506/Sourcegraph-Gitserver-3.36.3-Remote-Code-Execution.html
|
|
CVE-2022-23642 - http://packetstormsecurity.com/files/167741/Sourcegraph-gitserver-sshCommand-Remote-Command-Execution.html
|
|
CVE-2022-23648 - http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html
|
|
CVE-2022-2366 - https://mattermost.com/security-updates/
|
|
CVE-2022-2367 - https://wpscan.com/vulnerability/46afb0c6-2d0c-4a20-a9de-48f35ca93f0f
|
|
CVE-2022-2368 - https://huntr.dev/bounties/a9595eda-a5e0-4717-8d64-b445ef83f452
|
|
CVE-2022-2369 - https://wpscan.com/vulnerability/9ec8d318-9d25-4868-94c6-7c16444c275d
|
|
CVE-2022-2370 - https://wpscan.com/vulnerability/bedda2a9-6c52-478e-b17a-7a4488419334
|
|
CVE-2022-2371 - https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7
|
|
CVE-2022-23712 - https://www.elastic.co/community/security/
|
|
CVE-2022-23713 - https://www.elastic.co/community/security
|
|
CVE-2022-23714 - https://www.elastic.co/community/security
|
|
CVE-2022-23715 - https://www.elastic.co/community/security
|
|
CVE-2022-23716 - https://www.elastic.co/community/security/
|
|
CVE-2022-2372 - https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45
|
|
CVE-2022-2373 - https://wpscan.com/vulnerability/6aa9aa0d-b447-4584-a07e-b8a0d1b83a31
|
|
CVE-2022-2374 - https://wpscan.com/vulnerability/12062d78-7a0d-4dc1-9bd6-6c54aa6bc761
|
|
CVE-2022-2375 - https://wpscan.com/vulnerability/caab1fca-cc6b-45bb-bd0d-f857edd8bb81
|
|
CVE-2022-2376 - https://wpscan.com/vulnerability/437c4330-376a-4392-86c6-c4c7ed9583ad
|
|
CVE-2022-2377 - https://wpscan.com/vulnerability/f4e606e9-0664-42fb-a59b-21de306eb530
|
|
CVE-2022-23772 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-23773 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-23774 - https://docs.docker.com/docker-for-windows/release-notes/
|
|
CVE-2022-2378 - https://wpscan.com/vulnerability/3f4e8fe5-1c92-49ad-b709-a40749c80596
|
|
CVE-2022-2379 - https://wpscan.com/vulnerability/0773ba24-212e-41d5-9ae0-1416ea2c9db6
|
|
CVE-2022-23793 - http://packetstormsecurity.com/files/166546/Joomla-4.1.0-Zip-Slip-File-Overwrite-Path-Traversal.html
|
|
CVE-2022-23803 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/
|
|
CVE-2022-23803 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1453
|
|
CVE-2022-23804 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/
|
|
CVE-2022-23804 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1453
|
|
CVE-2022-23806 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2381 - https://wpscan.com/vulnerability/c39c41bf-f622-4239-a0a1-4dfe0e079f7f
|
|
CVE-2022-2382 - https://wpscan.com/vulnerability/777d4637-444b-4eda-bc21-95d3a3bf6cd3
|
|
CVE-2022-2383 - https://wpscan.com/vulnerability/4a3b3023-e740-411c-a77c-6477b80d7531
|
|
CVE-2022-2384 - https://wpscan.com/vulnerability/0917b964-f347-487e-b8d7-c4f09c290fe5
|
|
CVE-2022-23850 - https://github.com/kevinboone/epub2txt2/issues/17
|
|
CVE-2022-23852 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-23854 - https://crisec.de/advisory-aveva-intouch-access-anywhere-secure-gateway-path-traversal
|
|
CVE-2022-2386 - https://wpscan.com/vulnerability/47855d4b-9f6a-4fc7-b231-4337f51c8886
|
|
CVE-2022-23865 - https://www.exploit-db.com/exploits/50674
|
|
CVE-2022-2387 - https://wpscan.com/vulnerability/db3c3c78-1724-4791-9ab6-ebb2e8a4c8b8
|
|
CVE-2022-23878 - https://blog.csdn.net/miuzzx/article/details/122249953
|
|
CVE-2022-2388 - https://wpscan.com/vulnerability/50acd35f-eb31-4aba-bf32-b390e9514beb
|
|
CVE-2022-23881 - https://github.com/metaStor/Vuls/blob/main/zzzcms/zzzphp%20V2.1.0%20RCE/zzzphp%20V2.1.0%20RCE.md
|
|
CVE-2022-23882 - https://github.com/yeyinshi/tuzicms/issues/10
|
|
CVE-2022-23887 - https://github.com/yzmcms/yzmcms/issues/59
|
|
CVE-2022-23888 - https://github.com/yzmcms/yzmcms/issues/60
|
|
CVE-2022-2389 - https://wpscan.com/vulnerability/e70f00b7-6251-476e-9297-60af509e6ad9
|
|
CVE-2022-23896 - https://huntr.dev/bounties/79c2d16c-bae2-417f-ab50-10c52707a30f/
|
|
CVE-2022-23900 - https://stigward.medium.com/wavlink-command-injection-cve-2022-23900-51988f6f15df
|
|
CVE-2022-23907 - http://dev.cmsmadesimple.org/bug/view/12503
|
|
CVE-2022-23909 - http://packetstormsecurity.com/files/166574/Sherpa-Connector-Service-2020.2.20328.2050-Unquoted-Service-Path.html
|
|
CVE-2022-2391 - https://wpscan.com/vulnerability/dd6ebf6b-209b-437c-9fe4-527ab9e3b9e3
|
|
CVE-2022-23911 - https://wpscan.com/vulnerability/77fd6749-4fb2-48fa-a191-437b442f28e9
|
|
CVE-2022-23912 - https://wpscan.com/vulnerability/09512431-aa33-4514-8b20-1963c5d89f33
|
|
CVE-2022-23915 - https://snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088
|
|
CVE-2022-23918 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1455
|
|
CVE-2022-23919 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1455
|
|
CVE-2022-2392 - https://wpscan.com/vulnerability/5001ed18-858e-4c9d-9d7b-a1305fcdf61b
|
|
CVE-2022-23923 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2441254
|
|
CVE-2022-23923 - https://snyk.io/vuln/SNYK-JS-JAILED-2391490
|
|
CVE-2022-23935 - https://gist.github.com/ert-plus/1414276e4cb5d56dd431c2f0429e4429
|
|
CVE-2022-23940 - https://github.com/manuelz120
|
|
CVE-2022-23943 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-23946 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/
|
|
CVE-2022-23946 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1460
|
|
CVE-2022-23947 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/
|
|
CVE-2022-23947 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1460
|
|
CVE-2022-2395 - https://wpscan.com/vulnerability/5e442dd9-a49d-4a8e-959b-199a8689da4b
|
|
CVE-2022-2396 - https://github.com/CyberThoth/CVE/blob/83c243538386cd0761025f85eb747eab7cae5c21/CVE/Simple%20e-Learning%20System/Cross%20Site%20Scripting(Stored)/POC.md
|
|
CVE-2022-2396 - https://vuldb.com/?id.203779
|
|
CVE-2022-23967 - https://github.com/MaherAzzouzi/CVE-2022-23967
|
|
CVE-2022-23968 - https://neosmart.net/blog/2022/xerox-vulnerability-allows-unauthenticated-network-users-to-remotely-brick-printers/
|
|
CVE-2022-2398 - https://wpscan.com/vulnerability/0a218789-9a78-49ca-b919-fa61d33d5672
|
|
CVE-2022-23987 - https://wpscan.com/vulnerability/1697351b-c201-4e85-891e-94fdccbdfb55
|
|
CVE-2022-23988 - https://wpscan.com/vulnerability/9d5738f9-9a2e-4878-8a03-745894420bf6
|
|
CVE-2022-23990 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-23994 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-23995 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-23996 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-23997 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-23999 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-2400 - https://huntr.dev/bounties/a6da5e5e-86be-499a-a3c3-2950f749202a
|
|
CVE-2022-24000 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
|
CVE-2022-24004 - https://labs.nettitude.com/blog/cve-2022-24004-cve-2022-24127-vanderbilt-redcap-stored-cross-site-scripting/
|
|
CVE-2022-24005 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24006 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24007 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24008 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24009 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-2401 - https://mattermost.com/security-updates/
|
|
CVE-2022-24010 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24011 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24012 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24013 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24014 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24015 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24016 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24017 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24018 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24019 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24020 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24021 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24022 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24023 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24024 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24025 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24026 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24027 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24028 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-24029 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
|
CVE-2022-2404 - https://wpscan.com/vulnerability/0d889dde-b9d5-46cf-87d3-4f8a85cf9b98
|
|
CVE-2022-2405 - https://wpscan.com/vulnerability/50037028-2790-47ee-aae1-faf0724eb917
|
|
CVE-2022-2406 - https://mattermost.com/security-updates/
|
|
CVE-2022-24065 - https://snyk.io/vuln/SNYK-PYTHON-COOKIECUTTER-2414281
|
|
CVE-2022-24066 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2434820
|
|
CVE-2022-24066 - https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306
|
|
CVE-2022-2407 - https://wpscan.com/vulnerability/5be611e8-5b7a-4579-9757-45a4c94a53ca
|
|
CVE-2022-2408 - https://mattermost.com/security-updates/
|
|
CVE-2022-24082 - http://packetstormsecurity.com/files/169480/Pega-Platform-8.7.3-Remote-Code-Execution.html
|
|
CVE-2022-2409 - https://wpscan.com/vulnerability/fbf474d1-4ac2-4ed2-943c-497a4d5e9cea
|
|
CVE-2022-2410 - https://wpscan.com/vulnerability/c7cd55c1-e28b-4287-bab7-eb36483e0b18
|
|
CVE-2022-24108 - http://packetstormsecurity.com/files/167197/OpenCart-So-Listing-Tabs-2.2.0-Unsafe-Deserialization.html
|
|
CVE-2022-2411 - https://wpscan.com/vulnerability/72e83ffb-14e4-4e32-9516-083447dc8294
|
|
CVE-2022-24112 - http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html
|
|
CVE-2022-24112 - http://packetstormsecurity.com/files/166328/Apache-APISIX-2.12.1-Remote-Code-Execution.html
|
|
CVE-2022-2412 - https://wpscan.com/vulnerability/fc384cea-ae44-473c-8aa9-a84a2821bdc6
|
|
CVE-2022-24121 - https://www.coresecurity.com/core-labs/advisories/unified-office-total-connect-sql-injection
|
|
CVE-2022-24124 - http://packetstormsecurity.com/files/166163/Casdoor-1.13.0-SQL-Injection.html
|
|
CVE-2022-24124 - https://github.com/casdoor/casdoor/issues/439
|
|
CVE-2022-24124 - https://github.com/casdoor/casdoor/pull/442
|
|
CVE-2022-24125 - https://github.com/tremwil/ds3-nrssr-rce
|
|
CVE-2022-24126 - https://github.com/tremwil/ds3-nrssr-rce
|
|
CVE-2022-24127 - https://labs.nettitude.com/blog/cve-2022-24004-cve-2022-24127-vanderbilt-redcap-stored-cross-site-scripting/
|
|
CVE-2022-24129 - https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220127-01_Shibboleth_IdP_OIDC_OP_Plugin_SSRF
|
|
CVE-2022-2413 - https://wpscan.com/vulnerability/2e38b1bb-4410-45e3-87ca-d47a2cce9e22/
|
|
CVE-2022-24138 - https://github.com/tomerpeled92/CVE/
|
|
CVE-2022-24139 - https://github.com/tomerpeled92/CVE/
|
|
CVE-2022-24140 - https://github.com/tomerpeled92/CVE/
|
|
CVE-2022-24141 - https://github.com/tomerpeled92/CVE/
|
|
CVE-2022-2415 - http://packetstormsecurity.com/files/167972/Chrome-WebGL-Uniform-Integer-Overflows.html
|
|
CVE-2022-2417 - https://gitlab.com/gitlab-org/gitlab/-/issues/361179
|
|
CVE-2022-2418 - https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20img_upload.php%20File%20upload%20vulnerability.md
|
|
CVE-2022-24187 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html
|
|
CVE-2022-24188 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html
|
|
CVE-2022-24189 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html
|
|
CVE-2022-2419 - https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20upload.php%20File%20upload%20vulnerability.md
|
|
CVE-2022-24190 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html
|
|
CVE-2022-24191 - https://github.com/michaelrsweet/htmldoc/issues/470
|
|
CVE-2022-24196 - https://github.com/itext/itext7/pull/78
|
|
CVE-2022-24196 - https://github.com/itext/itext7/pull/78#issuecomment-1089279222
|
|
CVE-2022-24197 - https://github.com/itext/itext7/pull/78
|
|
CVE-2022-24197 - https://github.com/itext/itext7/pull/78#issuecomment-1089282165
|
|
CVE-2022-24198 - https://github.com/itext/itext7/pull/78
|
|
CVE-2022-24198 - https://github.com/itext/itext7/pull/78#issuecomment-1089287808
|
|
CVE-2022-2420 - https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20uploader.php%20%20File%20upload%20vulnerability.md
|
|
CVE-2022-24223 - http://packetstormsecurity.com/files/165922/Atom-CMS-2.0-SQL-Injection.html
|
|
CVE-2022-2423 - https://wpscan.com/vulnerability/714b4f2b-3f17-4730-8c25-21d8da4cb8d2
|
|
CVE-2022-24231 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Student-Information
|
|
CVE-2022-2424 - https://wpscan.com/vulnerability/2f9d3256-85c0-44fa-b0be-faa8989a1909
|
|
CVE-2022-24247 - https://cxsecurity.com/issue/WLB-2022010019
|
|
CVE-2022-24247 - https://www.exploit-db.com/exploits/50614
|
|
CVE-2022-24248 - https://en.0day.today/exploit/description/37177
|
|
CVE-2022-24248 - https://www.exploit-db.com/exploits/50615
|
|
CVE-2022-24249 - https://github.com/gpac/gpac/issues/2081
|
|
CVE-2022-2425 - https://wpscan.com/vulnerability/ca684a25-28ba-4337-a6d4-9477b1643c9d
|
|
CVE-2022-24251 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/
|
|
CVE-2022-24252 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/
|
|
CVE-2022-24253 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/
|
|
CVE-2022-24254 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/
|
|
CVE-2022-24255 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/
|
|
CVE-2022-2426 - https://wpscan.com/vulnerability/00e36ad9-b55b-4d17-96fb-e415eec47422
|
|
CVE-2022-24263 - http://packetstormsecurity.com/files/165882/Hospital-Management-System-4.0-SQL-Injection.html
|
|
CVE-2022-24263 - https://github.com/kishan0725/Hospital-Management-System/issues/17
|
|
CVE-2022-24263 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263
|
|
CVE-2022-24264 - https://github.com/CuppaCMS/CuppaCMS/issues/13
|
|
CVE-2022-24265 - https://github.com/CuppaCMS/CuppaCMS/issues/14
|
|
CVE-2022-24266 - https://github.com/CuppaCMS/CuppaCMS/issues/17
|
|
CVE-2022-24278 - https://github.com/neocotic/convert-svg/issues/86
|
|
CVE-2022-24278 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859830
|
|
CVE-2022-24279 - https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-2388572
|
|
CVE-2022-24298 - https://security.snyk.io/vuln/SNYK-UNMANAGED-FREEOPCUAFREEOPCUA-2988720
|
|
CVE-2022-24302 - https://www.paramiko.org/changelog.html
|
|
CVE-2022-2431 - https://packetstormsecurity.com/files/167920/wpdownloadmanager3250-filedelete.txt
|
|
CVE-2022-24329 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-24329 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-24356 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24357 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24358 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24359 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24360 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24361 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24362 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24363 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24364 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24365 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24366 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24367 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24368 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24369 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24370 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24372 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-046.txt
|
|
CVE-2022-24373 - https://github.com/software-mansion/react-native-reanimated/pull/3382
|
|
CVE-2022-24373 - https://github.com/software-mansion/react-native-reanimated/pull/3382/commits/7adf06d0c59382d884a04be86a96eede3d0432fa
|
|
CVE-2022-24373 - https://security.snyk.io/vuln/SNYK-JS-REACTNATIVEREANIMATED-2949507
|
|
CVE-2022-24375 - https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988725
|
|
CVE-2022-24376 - https://snyk.io/vuln/SNYK-JS-GITPROMISE-2434310
|
|
CVE-2022-24377 - https://security.snyk.io/vuln/SNYK-JS-CYCLEIMPORTCHECK-3157955
|
|
CVE-2022-24381 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ASNEGOPCUASTACK-2988735
|
|
CVE-2022-24396 - http://packetstormsecurity.com/files/167560/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Missing-Authentication.html
|
|
CVE-2022-24396 - http://seclists.org/fulldisclosure/2022/Jun/38
|
|
CVE-2022-24399 - http://packetstormsecurity.com/files/167559/SAP-FRUN-2.00-3.00-Cross-Site-Scripting.html
|
|
CVE-2022-24399 - http://seclists.org/fulldisclosure/2022/Jun/37
|
|
CVE-2022-24400 - https://tetraburst.com/
|
|
CVE-2022-24401 - https://tetraburst.com/
|
|
CVE-2022-24402 - https://tetraburst.com/
|
|
CVE-2022-24403 - https://tetraburst.com/
|
|
CVE-2022-24404 - https://tetraburst.com/
|
|
CVE-2022-24405 - https://seclists.org/fulldisclosure/2022/Jul/11
|
|
CVE-2022-24406 - https://seclists.org/fulldisclosure/2022/Jul/11
|
|
CVE-2022-24407 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2441 - https://www.exploit-db.com/exploits/51025
|
|
CVE-2022-24428 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities
|
|
CVE-2022-24429 - https://github.com/neocotic/convert-svg/issues/84
|
|
CVE-2022-24429 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859212
|
|
CVE-2022-24431 - https://security.snyk.io/vuln/SNYK-JS-ABACUSEXTCMDLINE-3157950
|
|
CVE-2022-24433 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245
|
|
CVE-2022-24433 - https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199
|
|
CVE-2022-24434 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2838865
|
|
CVE-2022-24434 - https://snyk.io/vuln/SNYK-JS-DICER-2311764
|
|
CVE-2022-24437 - https://gist.github.com/lirantal/327e9dd32686991b5a1fa6341aac2e7b
|
|
CVE-2022-24437 - https://snyk.io/vuln/SNYK-JS-GITPULLORCLONE-2434307
|
|
CVE-2022-24439 - https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858
|
|
CVE-2022-24440 - https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414278
|
|
CVE-2022-24448 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5
|
|
CVE-2022-24448 - https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a@huawei.com/T/
|
|
CVE-2022-24449 - https://github.com/jet-pentest/CVE-2022-24449
|
|
CVE-2022-2448 - https://wpscan.com/vulnerability/a4599942-2878-4da4-b55d-077775323b61
|
|
CVE-2022-2449 - https://wpscan.com/vulnerability/6e42f26b-3403-4d55-99ad-2c8e2d76e537
|
|
CVE-2022-2450 - https://wpscan.com/vulnerability/1b3ff124-f973-4584-a7d7-26cc404bfe2b
|
|
CVE-2022-2453 - https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a
|
|
CVE-2022-2454 - https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f
|
|
CVE-2022-24545 - http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html
|
|
CVE-2022-24562 - http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html
|
|
CVE-2022-24562 - https://medium.com/@tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d
|
|
CVE-2022-24571 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24571
|
|
CVE-2022-24574 - https://huntr.dev/bounties/a08437cc-25aa-4116-8069-816f78a2247c/
|
|
CVE-2022-24575 - https://github.com/gpac/gpac/issues/2058
|
|
CVE-2022-24575 - https://huntr.dev/bounties/1d9bf402-f756-4583-9a1d-436722609c1e/
|
|
CVE-2022-24576 - https://github.com/gpac/gpac/issues/2061
|
|
CVE-2022-24576 - https://huntr.dev/bounties/011ac07c-6139-4f43-b745-424143e60ac7/
|
|
CVE-2022-24577 - https://huntr.dev/bounties/0758b3a2-8ff2-45fc-8543-7633d605d24e/
|
|
CVE-2022-24578 - https://huntr.dev/bounties/1691cca3-ab54-4259-856b-751be2395b11/
|
|
CVE-2022-24582 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Accounting-Journal-Management
|
|
CVE-2022-24594 - https://github.com/walinejs/waline/issues/785
|
|
CVE-2022-24595 - https://youtu.be/E-ZTuWSg-JU
|
|
CVE-2022-24599 - https://github.com/mpruett/audiofile/issues/60
|
|
CVE-2022-2460 - https://wpscan.com/vulnerability/694b6dfd-2424-41b4-8595-b6c305c390db
|
|
CVE-2022-2461 - https://packetstormsecurity.com/files/167870/wptransposh107-auth.txt
|
|
CVE-2022-2461 - https://www.exploitalert.com/view-details.html?id=38891
|
|
CVE-2022-24613 - https://github.com/drewnoakes/metadata-extractor/issues/561
|
|
CVE-2022-24614 - https://github.com/drewnoakes/metadata-extractor/issues/561
|
|
CVE-2022-2462 - https://packetstormsecurity.com/files/167878/wptransposh1081-disclose.txt
|
|
CVE-2022-24620 - https://github.com/Piwigo/Piwigo/issues/1605
|
|
CVE-2022-24637 - http://packetstormsecurity.com/files/169811/Open-Web-Analytics-1.7.3-Remote-Code-Execution.html
|
|
CVE-2022-24637 - http://packetstormsecurity.com/files/171389/Open-Web-Analytics-1.7.3-Remote-Code-Execution.html
|
|
CVE-2022-24644 - https://github.com/gerr-re/cve-2022-24644/blob/main/cve-2022-24644_public-advisory.pdf
|
|
CVE-2022-24646 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263
|
|
CVE-2022-24647 - https://github.com/CuppaCMS/CuppaCMS/issues/23
|
|
CVE-2022-24654 - https://github.com/leonardobg/CVE-2022-24654
|
|
CVE-2022-24654 - https://packetstormsecurity.com/files/168064/Intelbras-ATA-200-Cross-Site-Scripting.html
|
|
CVE-2022-24655 - https://kb.netgear.com/000064615/Security-Advisory-for-Pre-Authentication-Command-Injection-on-EX6100v1-and-Pre-Authentication-Stack-Overflow-on-Multiple-Products-PSV-2021-0282-PSV-2021-0288
|
|
CVE-2022-24656 - https://github.com/zhuzhuyule/HexoEditor/issues/3
|
|
CVE-2022-2467 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Garage-Management-System.md
|
|
CVE-2022-24676 - https://github.com/hyyyp/HYBBS2/issues/33
|
|
CVE-2022-24677 - https://github.com/hyyyp/HYBBS2/issues/34
|
|
CVE-2022-2468 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Garage-Management-System.md
|
|
CVE-2022-2468 - https://vuldb.com/?id.204161
|
|
CVE-2022-24681 - https://raxis.com/blog/cve-2022-24681
|
|
CVE-2022-2470 - https://huntr.dev/bounties/3f1f679c-c243-431c-8ed0-e61543b9921b
|
|
CVE-2022-24706 - http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html
|
|
CVE-2022-24706 - http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html
|
|
CVE-2022-24706 - https://medium.com/@_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd
|
|
CVE-2022-24707 - http://packetstormsecurity.com/files/167060/Anuko-Time-Tracker-1.20.0.5640-SQL-Injection.html
|
|
CVE-2022-2471 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-ezviz-smart-cams
|
|
CVE-2022-24715 - http://packetstormsecurity.com/files/173516/Icinga-Web-2.10-Remote-Code-Execution.html
|
|
CVE-2022-24716 - http://packetstormsecurity.com/files/171774/Icinga-Web-2.10-Arbitrary-File-Disclosure.html
|
|
CVE-2022-2472 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-ezviz-smart-cams
|
|
CVE-2022-24723 - https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/
|
|
CVE-2022-24724 - http://packetstormsecurity.com/files/166599/cmark-gfm-Integer-overflow.html
|
|
CVE-2022-24728 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-24729 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2473 - https://packetstormsecurity.com/files/167864/wpuseronline2876-xss.txt
|
|
CVE-2022-2473 - https://www.exploit-db.com/exploits/50988
|
|
CVE-2022-2473 - https://youtu.be/Q3zInrUnAV0
|
|
CVE-2022-24734 - http://packetstormsecurity.com/files/167082/MyBB-1.8.29-Remote-Code-Execution.html
|
|
CVE-2022-24734 - http://packetstormsecurity.com/files/167333/MyBB-Admin-Control-Remote-Code-Execution.html
|
|
CVE-2022-24735 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-24736 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-24755 - https://huntr.dev/bounties/480121f2-bc3c-427e-986e-5acffb1606c5/
|
|
CVE-2022-24756 - https://huntr.dev/bounties/480121f2-bc3c-427e-986e-5acffb1606c5/
|
|
CVE-2022-2476 - https://github.com/dbry/WavPack/issues/121
|
|
CVE-2022-24760 - https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/
|
|
CVE-2022-24780 - http://packetstormsecurity.com/files/167236/iTop-Remote-Command-Execution.html
|
|
CVE-2022-24780 - https://markus-krell.de/itop-template-injection-inside-customer-portal/
|
|
CVE-2022-24799 - https://github.com/wireapp/wire-webapp/releases/tag/2022-03-30-production.0
|
|
CVE-2022-2480 - http://packetstormsecurity.com/files/168115/Chrome-content-ServiceWorkerVersion-MaybeTimeoutRequest-Heap-Use-After-Free.html
|
|
CVE-2022-24801 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-24823 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-24833 - https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-cqcc-mm6x-vmvw
|
|
CVE-2022-24836 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-24839 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-24844 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-5g92-6hpp-w425
|
|
CVE-2022-24851 - https://github.com/LDAPAccountManager/lam/issues/170
|
|
CVE-2022-2486 - https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20mesh.cgi.md
|
|
CVE-2022-2486 - https://vuldb.com/?id.204537
|
|
CVE-2022-24860 - https://user-images.githubusercontent.com/75008428/163742517-ecc1c787-1ef6-4df9-bdf2-407b2b31e111.png
|
|
CVE-2022-24865 - https://huntr.dev/bounties/89d996a2-de30-4261-8e3f-98e54cb25f76/
|
|
CVE-2022-2487 - https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20nightled.cgi%20.md
|
|
CVE-2022-2487 - https://vuldb.com/?id.204538
|
|
CVE-2022-2488 - https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20touchlist_sync.cgi.md
|
|
CVE-2022-2489 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md
|
|
CVE-2022-2489 - https://vuldb.com/?id.204551
|
|
CVE-2022-24891 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2490 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md#search.php
|
|
CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/issues/350
|
|
CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/pull/351
|
|
CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/security/advisories/GHSA-g78x-q3x8-r6m4
|
|
CVE-2022-2491 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Library-Management-System-with-QR-code-Attendance-and-Auto-Generate-Library-Card.md
|
|
CVE-2022-2491 - https://vuldb.com/?id.204574
|
|
CVE-2022-24910 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1471
|
|
CVE-2022-2492 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Library-Management-System-with-QR-code-Attendance-and-Auto-Generate-Library-Card.md#index.php
|
|
CVE-2022-2492 - https://vuldb.com/?id.204575
|
|
CVE-2022-24928 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
|
CVE-2022-24929 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
|
CVE-2022-24930 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
|
CVE-2022-24931 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
|
CVE-2022-24932 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
|
CVE-2022-2494 - https://huntr.dev/bounties/74ddb017-c1fd-4e72-bd30-3b2033911472
|
|
CVE-2022-24949 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-hxg8-4r3q-p9rv
|
|
CVE-2022-2495 - https://huntr.dev/bounties/00affb69-275d-4f4c-b419-437922bc7798
|
|
CVE-2022-24950 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-85gw-pchc-4rf3
|
|
CVE-2022-24951 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-546v-59j5-g95q
|
|
CVE-2022-24952 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8cw3-6r98-g7cw
|
|
CVE-2022-24954 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24955 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24956 - https://syss.de
|
|
CVE-2022-24956 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-018.txt
|
|
CVE-2022-24957 - https://syss.de
|
|
CVE-2022-24957 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-019.txt
|
|
CVE-2022-24958 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda
|
|
CVE-2022-24959 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5
|
|
CVE-2022-24971 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-24976 - https://www.openwall.com/lists/oss-security/2022/01/30/4
|
|
CVE-2022-24977 - https://r0.haxors.org/posts?id=8
|
|
CVE-2022-24989 - https://attackerkb.com/topics/h8YKVKx21t/cve-2022-24990
|
|
CVE-2022-24989 - https://packetstormsecurity.com/files/172904
|
|
CVE-2022-24990 - http://packetstormsecurity.com/files/172904/TerraMaster-TOS-4.2.29-Remote-Code-Execution.html
|
|
CVE-2022-24995 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX3/7
|
|
CVE-2022-24999 - https://github.com/n8tz/CVE-2022-24999
|
|
CVE-2022-25003 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-25003
|
|
CVE-2022-25004 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-25004/
|
|
CVE-2022-25012 - https://www.exploit-db.com/exploits/50130
|
|
CVE-2022-25013 - https://github.com/gamonoid/icehrm/issues/284
|
|
CVE-2022-25014 - https://github.com/gamonoid/icehrm/issues/283
|
|
CVE-2022-25015 - https://github.com/gamonoid/icehrm/issues/285
|
|
CVE-2022-25017 - https://gist.github.com/zaee-k/390b2f8e50407e4b199df806baa7e4ef
|
|
CVE-2022-25020 - https://youtu.be/TsGp-QB5XWI
|
|
CVE-2022-25022 - http://danpros.com
|
|
CVE-2022-25022 - https://youtu.be/acookTqf3Nc
|
|
CVE-2022-25023 - https://github.com/adamstark/AudioFile/issues/58
|
|
CVE-2022-25026 - https://labs.nettitude.com/blog/cve-2022-25026-cve-2022-25027-vulnerabilities-in-rocket-trufusion-enterprise/
|
|
CVE-2022-25027 - https://labs.nettitude.com/blog/cve-2022-25026-cve-2022-25027-vulnerabilities-in-rocket-trufusion-enterprise/
|
|
CVE-2022-2503 - https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m
|
|
CVE-2022-25044 - https://github.com/espruino/Espruino/issues/2142
|
|
CVE-2022-25045 - https://github.com/VivekPanday12/CVE-/issues/6
|
|
CVE-2022-25045 - https://www.linkedin.com/in/vivek-panday-796768149/
|
|
CVE-2022-25046 - https://github.com/Immersive-Labs-Sec/CentOS-WebPanel
|
|
CVE-2022-25047 - https://github.com/Immersive-Labs-Sec/CentOS-WebPanel
|
|
CVE-2022-25048 - https://github.com/Immersive-Labs-Sec/CentOS-WebPanel
|
|
CVE-2022-2505 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
|
CVE-2022-25072 - https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/Archer%20A54
|
|
CVE-2022-25073 - https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/TL-WR841N
|
|
CVE-2022-25074 - https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/TL-WR902AC
|
|
CVE-2022-25075 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A3000RU/README.md
|
|
CVE-2022-25076 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A800R/README.md
|
|
CVE-2022-25077 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A3100R/README.md
|
|
CVE-2022-25078 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A3600R/README.md
|
|
CVE-2022-25079 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A810R/README.md
|
|
CVE-2022-25080 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A830R/README.md
|
|
CVE-2022-25081 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/T10/README.md
|
|
CVE-2022-25082 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A950RG/README.md
|
|
CVE-2022-25083 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A860R/README.md
|
|
CVE-2022-25084 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/T6/README.md
|
|
CVE-2022-25089 - http://packetstormsecurity.com/files/167013/Printix-1.3.1106.0-Privileged-API-Abuse.html
|
|
CVE-2022-25089 - https://www.exploit-db.com/exploits/50798
|
|
CVE-2022-25090 - http://packetstormsecurity.com/files/166242/Printix-Client-1.3.1106.0-Privilege-Escalation.html
|
|
CVE-2022-25090 - http://packetstormsecurity.com/files/167012/Printix-1.3.1106.0-Privilege-Escalation.html
|
|
CVE-2022-25090 - https://github.com/ComparedArray/printix-CVE-2022-25090
|
|
CVE-2022-25090 - https://www.exploit-db.com/exploits/50812
|
|
CVE-2022-25094 - https://www.exploit-db.com/exploits/50731
|
|
CVE-2022-25095 - https://www.exploit-db.com/exploits/50730
|
|
CVE-2022-25096 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Home-Owners-Collection-Management
|
|
CVE-2022-25096 - https://www.exploit-db.com/exploits/50732
|
|
CVE-2022-25104 - https://github.com/ttimot24/HorizontCMS/issues/43
|
|
CVE-2022-25106 - https://github.com/chunklhit/cve/blob/master/dlink/DIR859/BufferOverflow.md
|
|
CVE-2022-25106 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-25108 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-25114 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PuneethReddyHC/event-management-1.0
|
|
CVE-2022-25115 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Home-Owners-Collection-Management
|
|
CVE-2022-25131 - https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_14/14.md
|
|
CVE-2022-25139 - https://github.com/nginx/njs/issues/451
|
|
CVE-2022-2514 - https://huntr.dev/bounties/dbf77139-4384-4dc5-9994-45a5e0747429
|
|
CVE-2022-25148 - http://packetstormsecurity.com/files/174482/WordPress-WP-Statistics-13.1.5-SQL-Injection.html
|
|
CVE-2022-25148 - https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042
|
|
CVE-2022-25149 - https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042
|
|
CVE-2022-2515 - https://gist.github.com/Xib3rR4dAr/6aa9e730c1d030a5ee9f9d1eae6fbd5e
|
|
CVE-2022-25164 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
|
CVE-2022-25165 - https://github.com/RhinoSecurityLabs/CVEs
|
|
CVE-2022-25165 - https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/
|
|
CVE-2022-25166 - https://github.com/RhinoSecurityLabs/CVEs
|
|
CVE-2022-25166 - https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/
|
|
CVE-2022-25169 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-25171 - https://security.snyk.io/vuln/SNYK-JS-P4-3167330
|
|
CVE-2022-25172 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470
|
|
CVE-2022-25216 - https://www.tenable.com/security/research/tra-2022-07
|
|
CVE-2022-2522 - https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22
|
|
CVE-2022-2522 - https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22/
|
|
CVE-2022-25220 - https://fluidattacks.com/advisories/armstrong/
|
|
CVE-2022-25220 - https://github.com/1modm/petereport/issues/35
|
|
CVE-2022-25221 - https://fluidattacks.com/advisories/charles/
|
|
CVE-2022-25222 - https://fluidattacks.com/advisories/berry/
|
|
CVE-2022-25223 - https://fluidattacks.com/advisories/jagger/
|
|
CVE-2022-25224 - https://fluidattacks.com/advisories/lennon/
|
|
CVE-2022-25225 - https://fluidattacks.com/advisories/spinetta/
|
|
CVE-2022-25226 - https://fluidattacks.com/advisories/sinatra/
|
|
CVE-2022-25227 - https://fluidattacks.com/advisories/clapton/
|
|
CVE-2022-25228 - https://fluidattacks.com/advisories/jackson/
|
|
CVE-2022-25229 - https://fluidattacks.com/advisories/bowie/
|
|
CVE-2022-25229 - https://github.com/popcorn-official/popcorn-desktop/issues/2491
|
|
CVE-2022-2523 - https://huntr.dev/bounties/2a1802d8-1c2e-4919-96a7-d4dcf7ffcf8f
|
|
CVE-2022-25231 - https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988724
|
|
CVE-2022-25235 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-25236 - http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html
|
|
CVE-2022-25236 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-25237 - https://rhinosecuritylabs.com/application-security/cve-2022-25237-bonitasoft-authorization-bypass/
|
|
CVE-2022-25241 - http://packetstormsecurity.com/files/166074/FileCloud-21.2-Cross-Site-Request-Forgery.html
|
|
CVE-2022-25241 - https://herolab.usd.de/security-advisories/
|
|
CVE-2022-25242 - https://herolab.usd.de/security-advisories/
|
|
CVE-2022-25245 - https://raxis.com/blog/cve-2022-25245
|
|
CVE-2022-25258 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
|
|
CVE-2022-25265 - https://github.com/x0reaxeax/exec-prot-bypass
|
|
CVE-2022-25276 - https://www.drupal.org/sa-core-2022-015
|
|
CVE-2022-25295 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOPHISHGOPHISH-2404177
|
|
CVE-2022-25296 - https://snyk.io/vuln/SNYK-JS-BODYMEN-2342623
|
|
CVE-2022-25297 - https://snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-2407243
|
|
CVE-2022-25298 - https://snyk.io/vuln/SNYK-UNMANAGED-SPRINFALLWEBCC-2404182
|
|
CVE-2022-25299 - https://snyk.io/vuln/SNYK-UNMANAGED-CESANTAMONGOOSE-2404180
|
|
CVE-2022-25301 - https://github.com/metabench/jsgui-lang-essentials/issues/1
|
|
CVE-2022-25301 - https://snyk.io/vuln/SNYK-JS-JSGUILANGESSENTIALS-2316897
|
|
CVE-2022-25302 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ASNEGOPCUASTACK-2988732
|
|
CVE-2022-25303 - https://snyk.io/vuln/SNYK-PYTHON-WHOOGLESEARCH-2803306
|
|
CVE-2022-25304 - https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-2988731
|
|
CVE-2022-25304 - https://security.snyk.io/vuln/SNYK-PYTHON-OPCUA-2988730
|
|
CVE-2022-25305 - https://gist.github.com/Xib3rR4dAr/af90cef7867583ab2de4cccea2a8c87d
|
|
CVE-2022-25306 - https://gist.github.com/Xib3rR4dAr/89fc87ea1d62348c21c99fc11a3bfd88
|
|
CVE-2022-25307 - https://gist.github.com/Xib3rR4dAr/8090a6d026d4601083cff80aa80de7eb
|
|
CVE-2022-25308 - https://github.com/fribidi/fribidi/issues/181
|
|
CVE-2022-25309 - https://github.com/fribidi/fribidi/issues/182
|
|
CVE-2022-2531 - https://gitlab.com/gitlab-org/gitlab/-/issues/364252
|
|
CVE-2022-25310 - https://github.com/fribidi/fribidi/issues/183
|
|
CVE-2022-25313 - https://github.com/libexpat/libexpat/pull/558
|
|
CVE-2022-25313 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-25314 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-25315 - https://github.com/libexpat/libexpat/pull/559
|
|
CVE-2022-25315 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
CVE-2022-2532 - https://wpscan.com/vulnerability/07278b12-58e6-4230-b2fb-19237e9785d8
|
|
CVE-2022-25324 - https://snyk.io/vuln/SNYK-JS-BIGNUM-2388581
|
|
CVE-2022-25329 - https://www.tenable.com/security/research/tra-2022-05
|
|
CVE-2022-25330 - https://www.tenable.com/security/research/tra-2022-05
|
|
CVE-2022-25331 - https://www.tenable.com/security/research/tra-2022-05
|
|
CVE-2022-25332 - https://tetraburst.com/
|
|
CVE-2022-25333 - https://tetraburst.com/
|
|
CVE-2022-25334 - https://tetraburst.com/
|
|
CVE-2022-25342 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-25343 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-25344 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-25345 - https://snyk.io/vuln/SNYK-JS-DISCORDJSOPUS-2403100
|
|
CVE-2022-25349 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2766498
|
|
CVE-2022-25349 - https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-2324800
|
|
CVE-2022-2535 - https://wpscan.com/vulnerability/0e13c375-044c-4c2e-ab8e-48cb89d90d02
|
|
CVE-2022-25350 - https://security.snyk.io/vuln/SNYK-JS-PUPPETFACTER-3175616
|
|
CVE-2022-25352 - https://snyk.io/vuln/SNYK-JS-LIBNESTED-2342117
|
|
CVE-2022-25354 - https://snyk.io/vuln/SNYK-JS-SETIN-2388571
|
|
CVE-2022-25356 - https://www.swascan.com/security-advisory-alt-n-security-gateway/
|
|
CVE-2022-25359 - https://packetstormsecurity.com/files/166103/ICL-ScadaFlex-II-SCADA-Controllers-SC-1-SC-2-1.03.07-Remote-File-Modification.html
|
|
CVE-2022-2536 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-2536.txt
|
|
CVE-2022-2536 - https://packetstormsecurity.com/files/168120/wptransposh1081-authz.txt
|
|
CVE-2022-2536 - https://www.exploitalert.com/view-details.html?id=38949
|
|
CVE-2022-2536 - https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-2536
|
|
CVE-2022-2537 - https://wpscan.com/vulnerability/ae613148-85d8-47a0-952d-49c29584676f
|
|
CVE-2022-25373 - https://raxis.com/blog/cve-2022-25373
|
|
CVE-2022-25375 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
|
|
CVE-2022-25377 - https://dubell.io/unauthenticated-lfi-in-appwrite-0.5.0-0.12.1/
|
|
CVE-2022-2538 - https://wpscan.com/vulnerability/afa1e159-30bc-42d2-b3f8-8c868b113d3e
|
|
CVE-2022-25389 - https://www.adminxe.com/3246.html
|
|
CVE-2022-25390 - https://www.adminxe.com/3276.html
|
|
CVE-2022-25393 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Bakery-Shop-Management
|
|
CVE-2022-25394 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/abhisheks008/2022/Medical-Store-Management-System
|
|
CVE-2022-25395 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Cosmetics-and-Beauty-Product-Online-Store
|
|
CVE-2022-25396 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Cosmetics-and-Beauty-Product-Online-Store/SQL-Injection
|
|
CVE-2022-25398 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/pavanpatil45/Auto-Spare-Parts-Management
|
|
CVE-2022-25399 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Real-Estate-Portal-System
|
|
CVE-2022-25402 - https://github.com/dota-st/Vulnerability/blob/master/HMS/HMS.md
|
|
CVE-2022-25403 - https://github.com/dota-st/Vulnerability/blob/master/HMS/HMS.md
|
|
CVE-2022-25407 - https://github.com/kishan0725/Hospital-Management-System/issues/21
|
|
CVE-2022-25408 - https://github.com/kishan0725/Hospital-Management-System/issues/22
|
|
CVE-2022-25409 - https://github.com/kishan0725/Hospital-Management-System/issues/20
|
|
CVE-2022-25411 - https://github.com/maxsite/cms/issues/487
|
|
CVE-2022-25412 - https://github.com/maxsite/cms/issues/486
|
|
CVE-2022-25414 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/1
|
|
CVE-2022-25417 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/3
|
|
CVE-2022-25418 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/2
|
|
CVE-2022-25427 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/2
|
|
CVE-2022-25428 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/3
|
|
CVE-2022-25429 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/1
|
|
CVE-2022-2543 - https://wpscan.com/vulnerability/5dc8b671-f2fa-47be-8664-9005c4fdbea8
|
|
CVE-2022-25431 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/4
|
|
CVE-2022-25433 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/5
|
|
CVE-2022-25434 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/6
|
|
CVE-2022-25435 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/7
|
|
CVE-2022-25437 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/9
|
|
CVE-2022-25438 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/11
|
|
CVE-2022-25439 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/8
|
|
CVE-2022-2544 - https://wpscan.com/vulnerability/a9bcc68c-eeda-4647-8463-e7e136733053
|
|
CVE-2022-25440 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/13
|
|
CVE-2022-25441 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/12
|
|
CVE-2022-25445 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/1
|
|
CVE-2022-25446 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/3
|
|
CVE-2022-25447 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/4
|
|
CVE-2022-25448 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/2
|
|
CVE-2022-25449 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/5
|
|
CVE-2022-25450 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/8
|
|
CVE-2022-25451 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/9
|
|
CVE-2022-25452 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/7
|
|
CVE-2022-25453 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/6
|
|
CVE-2022-25454 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/10
|
|
CVE-2022-25455 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/11
|
|
CVE-2022-25456 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/12
|
|
CVE-2022-25457 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/14
|
|
CVE-2022-25458 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/13
|
|
CVE-2022-25459 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/15
|
|
CVE-2022-2546 - https://wpscan.com/vulnerability/f84920e4-a1fe-47cf-9ba5-731989c70f58
|
|
CVE-2022-25460 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/17
|
|
CVE-2022-25461 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/16
|
|
CVE-2022-25465 - https://github.com/espruino/Espruino/issues/2136
|
|
CVE-2022-25481 - https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md
|
|
CVE-2022-25484 - https://github.com/appneta/tcpreplay/issues/715
|
|
CVE-2022-25485 - https://github.com/CuppaCMS/CuppaCMS/issues/24
|
|
CVE-2022-25486 - https://github.com/CuppaCMS/CuppaCMS/issues/15
|
|
CVE-2022-25486 - https://github.com/CuppaCMS/CuppaCMS/issues/25
|
|
CVE-2022-25486 - https://github.com/hansmach1ne/MyExploits/tree/main/Multiple_LFIs_in_CuppaCMS_alerts
|
|
CVE-2022-25487 - http://packetstormsecurity.com/files/166532/Atom-CMS-1.0.2-Shell-Upload.html
|
|
CVE-2022-25487 - https://github.com/thedigicraft/Atom.CMS/issues/256
|
|
CVE-2022-25488 - https://github.com/thedigicraft/Atom.CMS/issues/257
|
|
CVE-2022-2549 - https://huntr.dev/bounties/c93083dc-177c-4ba0-ba83-9d7fb29a5537
|
|
CVE-2022-25494 - https://github.com/g33kyrash/Online-Banking-system/issues/16
|
|
CVE-2022-25495 - https://github.com/CuppaCMS/CuppaCMS/issues/26
|
|
CVE-2022-25497 - https://github.com/CuppaCMS/CuppaCMS/issues/28
|
|
CVE-2022-25498 - https://github.com/CuppaCMS/CuppaCMS/issues/29
|
|
CVE-2022-2550 - https://huntr.dev/bounties/6ab4384d-bcbe-4d98-bf67-35c3535fc5c7
|
|
CVE-2022-25506 - https://github.com/FreeTAKTeam/UI/issues/27
|
|
CVE-2022-2551 - https://github.com/SecuriTrust/CVEsLab/tree/main/CVE-2022-2551
|
|
CVE-2022-2551 - https://wpscan.com/vulnerability/f27d753e-861a-4d8d-9b9a-6c99a8a7ebe0
|
|
CVE-2022-25511 - https://github.com/FreeTAKTeam/UI/issues/29
|
|
CVE-2022-25514 - https://github.com/nothings/stb/issues/1286
|
|
CVE-2022-25515 - https://github.com/nothings/stb/issues/1286
|
|
CVE-2022-25515 - https://github.com/nothings/stb/issues/1288
|
|
CVE-2022-25516 - https://github.com/nothings/stb/issues/1286
|
|
CVE-2022-25516 - https://github.com/nothings/stb/issues/1287
|
|
CVE-2022-2552 - https://github.com/SecuriTrust/CVEsLab/tree/main/CVE-2022-2552
|
|
CVE-2022-2552 - https://wpscan.com/vulnerability/6b540712-fda5-4be6-ae4b-bd30a9d9d698
|
|
CVE-2022-25521 - https://medium.com/@dnyaneshgawande111/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-network-video-5490d107fa0
|
|
CVE-2022-25523 - https://github.com/Typesetter/Typesetter/issues/697
|
|
CVE-2022-2554 - https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9
|
|
CVE-2022-25546 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/6
|
|
CVE-2022-25548 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/5
|
|
CVE-2022-25549 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/4
|
|
CVE-2022-2555 - https://wpscan.com/vulnerability/7ec9e493-bc48-4a5d-8c7e-34beaba892ae
|
|
CVE-2022-25550 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/9
|
|
CVE-2022-25551 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/8
|
|
CVE-2022-25552 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/3
|
|
CVE-2022-25553 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/7
|
|
CVE-2022-25554 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/10
|
|
CVE-2022-25555 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/2
|
|
CVE-2022-25556 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/6
|
|
CVE-2022-25557 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/11
|
|
CVE-2022-25558 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/13
|
|
CVE-2022-2556 - https://wpscan.com/vulnerability/f2a59eaa-6b44-4098-912f-823289cf33b0
|
|
CVE-2022-25560 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/4
|
|
CVE-2022-25561 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/5
|
|
CVE-2022-25566 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/12
|
|
CVE-2022-25568 - https://www.pizzapower.me/2022/02/17/motioneye-config-info-disclosure/
|
|
CVE-2022-2557 - https://wpscan.com/vulnerability/c043916a-92c9-4d02-8cca-1a90e5382b7e
|
|
CVE-2022-25576 - https://github.com/butterflyhack/anchorcms-0.12.7-CSRF
|
|
CVE-2022-25577 - https://github.com/ph0nkybit/proof-of-concepts/tree/main/Use_Of_Hardcoded_Password_In_ALF-BanCO_8.2.x
|
|
CVE-2022-2558 - https://wpscan.com/vulnerability/6e096269-eedc-4614-88ce-6795c4adf32f
|
|
CVE-2022-2559 - https://wpscan.com/vulnerability/062599ce-c630-487e-bb43-c3b27a62b9ec
|
|
CVE-2022-2563 - https://wpscan.com/vulnerability/98cd761c-7527-4224-965d-d34472b5c19f
|
|
CVE-2022-25630 - http://packetstormsecurity.com/files/171781/Symantec-Messaging-Gateway-10.7.4-Cross-Site-Scripting.html
|
|
CVE-2022-25636 - http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
|
|
CVE-2022-25636 - https://github.com/Bonfee/CVE-2022-25636
|
|
CVE-2022-25636 - https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/
|
|
CVE-2022-25636 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2564 - https://huntr.dev/bounties/055be524-9296-4b2f-b68d-6d5b810d1ddd
|
|
CVE-2022-25641 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-25644 - https://security.snyk.io/vuln/SNYK-JS-PENDO324GETPROCESSBYNAME-2419094
|
|
CVE-2022-25645 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2431974
|
|
CVE-2022-25645 - https://snyk.io/vuln/SNYK-JS-DSET-2330881
|
|
CVE-2022-25646 - https://github.com/myliang/x-spreadsheet/issues/580
|
|
CVE-2022-25646 - https://security.snyk.io/vuln/SNYK-JS-XDATASPREADSHEET-2430381
|
|
CVE-2022-25646 - https://youtu.be/Ij-8VVKNh7U
|
|
CVE-2022-25647 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-25648 - https://snyk.io/vuln/SNYK-RUBY-GIT-2421270
|
|
CVE-2022-2565 - https://wpscan.com/vulnerability/d89eff7d-a3e6-4876-aa0e-6d17e206af83
|
|
CVE-2022-25664 - http://packetstormsecurity.com/files/172853/Qualcomm-Adreno-GPU-Information-Leak.html
|
|
CVE-2022-2567 - https://wpscan.com/vulnerability/dfa21dde-a9fc-4a35-9602-c3fde907ca54
|
|
CVE-2022-2571 - https://huntr.dev/bounties/2e5a1dc4-2dfb-4e5f-8c70-e1ede21f3571
|
|
CVE-2022-2574 - https://wpscan.com/vulnerability/9dec8ac7-befd-4c9d-9a9e-7da9e395dbf2
|
|
CVE-2022-25743 - http://packetstormsecurity.com/files/172663/Qualcomm-Adreno-KGSL-Unchecked-Cast-Type-Confusion.html
|
|
CVE-2022-2575 - https://wpscan.com/vulnerability/e934af78-9dfd-4e14-853d-dc453de6e365
|
|
CVE-2022-25758 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936782
|
|
CVE-2022-25758 - https://snyk.io/vuln/SNYK-JS-SCSSTOKENIZER-2339884
|
|
CVE-2022-25759 - https://github.com/neocotic/convert-svg/issues/81
|
|
CVE-2022-25759 - https://security.snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2849633
|
|
CVE-2022-25760 - https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099
|
|
CVE-2022-25761 - https://security.snyk.io/vuln/SNYK-UNMANAGED-OPEN62541OPEN62541-2988719
|
|
CVE-2022-25762 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-25765 - http://packetstormsecurity.com/files/171746/pdfkit-0.8.7.2-Command-Injection.html
|
|
CVE-2022-25765 - https://security.snyk.io/vuln/SNYK-RUBY-PDFKIT-2869795
|
|
CVE-2022-25766 - https://github.com/FredrikNoren/ungit/pull/1510
|
|
CVE-2022-25766 - https://snyk.io/vuln/SNYK-JS-UNGIT-2414099
|
|
CVE-2022-25767 - https://snyk.io/vuln/SNYK-JAVA-COMBSTEKUREPORT-2322018
|
|
CVE-2022-2577 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System(SQLI).md
|
|
CVE-2022-2577 - https://vuldb.com/?id.205300
|
|
CVE-2022-25778 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2022-25779 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2022-2578 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System--.md
|
|
CVE-2022-25780 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2022-25781 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2022-25782 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2022-25783 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2022-25784 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2022-25785 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2022-25786 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2022-25787 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2022-2579 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System(XSS).md
|
|
CVE-2022-2579 - https://vuldb.com/?id.205302
|
|
CVE-2022-2580 - https://huntr.dev/bounties/c5f2f1d4-0441-4881-b19c-055acaa16249
|
|
CVE-2022-2581 - https://huntr.dev/bounties/0bedbae2-82ae-46ae-aa68-1c28b309b60b
|
|
CVE-2022-25810 - https://wpscan.com/vulnerability/9a934a84-f0c7-42ed-b980-bb168b2c5892
|
|
CVE-2022-25811 - https://wpscan.com/vulnerability/0e0d2c5f-3396-4a0a-a5c6-6a98de3802c9
|
|
CVE-2022-25812 - https://wpscan.com/vulnerability/1f6bd346-4743-44b8-86d7-4fbe09bad657
|
|
CVE-2022-25814 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
|
CVE-2022-25815 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
|
CVE-2022-25816 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
|
CVE-2022-25817 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
|
CVE-2022-25818 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
|
CVE-2022-25819 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
|
CVE-2022-25820 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
|
CVE-2022-25821 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
|
CVE-2022-25822 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
|
CVE-2022-25831 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-25832 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-25833 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-25836 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
|
|
CVE-2022-25837 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
|
|
CVE-2022-25839 - https://snyk.io/vuln/SNYK-JS-URLJS-2414030
|
|
CVE-2022-25842 - https://snyk.io/vuln/SNYK-JAVA-COMALIBABAONEAGENT-2407874
|
|
CVE-2022-25844 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736
|
|
CVE-2022-25844 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738
|
|
CVE-2022-25844 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737
|
|
CVE-2022-25844 - https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735
|
|
CVE-2022-25845 - https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222
|
|
CVE-2022-25845 - https://www.ddosi.org/fastjson-poc/
|
|
CVE-2022-25845 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-25847 - https://gist.github.com/lirantal/52debd25284726fcc2eaed9c7512975c
|
|
CVE-2022-25847 - https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149915
|
|
CVE-2022-25848 - https://gist.github.com/lirantal/5550bcd0bdf92c1b56fbb20e141fe5bd
|
|
CVE-2022-25848 - https://security.snyk.io/vuln/SNYK-JS-STATICDEVSERVER-3149917
|
|
CVE-2022-25849 - https://security.snyk.io/vuln/SNYK-PHP-JOYQIHYPERDOWN-2953544
|
|
CVE-2022-2585 - https://ubuntu.com/security/notices/USN-5564-1
|
|
CVE-2022-2585 - https://ubuntu.com/security/notices/USN-5565-1
|
|
CVE-2022-2585 - https://ubuntu.com/security/notices/USN-5566-1
|
|
CVE-2022-2585 - https://www.openwall.com/lists/oss-security/2022/08/09/7
|
|
CVE-2022-25850 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMHOPPSCOTCHPROXYSCOTCH-2435228
|
|
CVE-2022-25851 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2860295
|
|
CVE-2022-25851 - https://snyk.io/vuln/SNYK-JS-JPEGJS-2859218
|
|
CVE-2022-25852 - https://snyk.io/vuln/SNYK-JS-LIBPQ-2392366
|
|
CVE-2022-25852 - https://snyk.io/vuln/SNYK-JS-PGNATIVE-2392365
|
|
CVE-2022-25853 - https://security.snyk.io/vuln/SNYK-JS-SEMVERTAGS-3175612
|
|
CVE-2022-25854 - https://bsg.tech/blog/cve-2022-25854-stored-xss-in-yaireo-tagify-npm-module/
|
|
CVE-2022-25855 - https://security.snyk.io/vuln/SNYK-JS-CREATECHOOAPP3-3157951
|
|
CVE-2022-25858 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2949722
|
|
CVE-2022-25858 - https://snyk.io/vuln/SNYK-JS-TERSER-2806366
|
|
CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5560-2
|
|
CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5562-1
|
|
CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5564-1
|
|
CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5565-1
|
|
CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5566-1
|
|
CVE-2022-2586 - https://www.openwall.com/lists/oss-security/2022/08/09/5
|
|
CVE-2022-25860 - https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391
|
|
CVE-2022-25862 - https://snyk.io/vuln/SNYK-JS-SDS-2385944
|
|
CVE-2022-25863 - https://snyk.io/vuln/SNYK-JS-GATSBYPLUGINMDX-2405699
|
|
CVE-2022-25865 - https://snyk.io/vuln/SNYK-JS-WORKSPACETOOLS-2421201
|
|
CVE-2022-25866 - https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349
|
|
CVE-2022-25867 - https://security.snyk.io/vuln/SNYK-JAVA-IOSOCKET-2949738
|
|
CVE-2022-25869 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2949783
|
|
CVE-2022-25869 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2949784
|
|
CVE-2022-25869 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2949782
|
|
CVE-2022-25869 - https://snyk.io/vuln/SNYK-JS-ANGULAR-2949781
|
|
CVE-2022-25871 - https://snyk.io/vuln/SNYK-JS-QUERYMEN-2391488
|
|
CVE-2022-25872 - https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392368
|
|
CVE-2022-25873 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVUETIFYJS-3024407
|
|
CVE-2022-25873 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3024406
|
|
CVE-2022-25873 - https://security.snyk.io/vuln/SNYK-JS-VUETIFY-3019858
|
|
CVE-2022-25875 - https://snyk.io/vuln/SNYK-JS-SVELTE-2931080
|
|
CVE-2022-25876 - https://snyk.io/vuln/SNYK-JS-LINKPREVIEWJS-2933520
|
|
CVE-2022-25878 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2841507
|
|
CVE-2022-25878 - https://snyk.io/vuln/SNYK-JS-PROTOBUFJS-2441248
|
|
CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5560-2
|
|
CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5562-1
|
|
CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5564-1
|
|
CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5565-1
|
|
CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5566-1
|
|
CVE-2022-2588 - https://www.openwall.com/lists/oss-security/2022/08/09/6
|
|
CVE-2022-25881 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332
|
|
CVE-2022-25881 - https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783
|
|
CVE-2022-25882 - https://gist.github.com/jnovikov/02a9aff9bf2188033e77bd91ff062856
|
|
CVE-2022-25882 - https://github.com/onnx/onnx/issues/3991
|
|
CVE-2022-25882 - https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479
|
|
CVE-2022-25883 - https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795
|
|
CVE-2022-25885 - https://security.snyk.io/vuln/SNYK-JS-HUMMUS-3091139
|
|
CVE-2022-25885 - https://security.snyk.io/vuln/SNYK-JS-MUHAMMARA-3091137
|
|
CVE-2022-25888 - https://security.snyk.io/vuln/SNYK-RUST-OPCUA-2988751
|
|
CVE-2022-2589 - https://huntr.dev/bounties/8705800d-cf2f-433d-9c3e-dbef6a3f7e08
|
|
CVE-2022-25890 - https://security.snyk.io/vuln/SNYK-JS-WIFEY-3175615
|
|
CVE-2022-25891 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINRRRSHOUTRRRPKGUTIL-2849059
|
|
CVE-2022-25892 - https://security.snyk.io/vuln/SNYK-JS-HUMMUS-3091138
|
|
CVE-2022-25892 - https://security.snyk.io/vuln/SNYK-JS-MUHAMMARA-3060320
|
|
CVE-2022-25893 - https://security.snyk.io/vuln/SNYK-JS-VM2-2990237
|
|
CVE-2022-25894 - https://security.snyk.io/vuln/SNYK-JAVA-COMBSTEKUFLO-3091112
|
|
CVE-2022-25895 - https://gist.github.com/lirantal/0f8a48c3f5ac581ce73123abe9f7f120
|
|
CVE-2022-25895 - https://security.snyk.io/vuln/SNYK-JS-LITEDEVSERVER-3153718
|
|
CVE-2022-25897 - https://security.snyk.io/vuln/SNYK-JAVA-ORGECLIPSEMILO-2990191
|
|
CVE-2022-25898 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898
|
|
CVE-2022-25898 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897
|
|
CVE-2022-25898 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896
|
|
CVE-2022-25898 - https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122
|
|
CVE-2022-25900 - https://snyk.io/vuln/SNYK-JS-GITCLONE-2434308
|
|
CVE-2022-25901 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3176681
|
|
CVE-2022-25901 - https://security.snyk.io/vuln/SNYK-JS-COOKIEJAR-3149984
|
|
CVE-2022-25903 - https://security.snyk.io/vuln/SNYK-RUST-OPCUA-2988750
|
|
CVE-2022-25904 - https://github.com/hacksparrow/safe-eval/issues/26
|
|
CVE-2022-25904 - https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3175701
|
|
CVE-2022-25906 - https://security.snyk.io/vuln/SNYK-JS-ISHTTP2-3153878
|
|
CVE-2022-25907 - https://security.snyk.io/vuln/SNYK-JS-TSDEEPMERGE-2959975
|
|
CVE-2022-25908 - https://security.snyk.io/vuln/SNYK-JS-CREATECHOOELECTRON-3157953
|
|
CVE-2022-2591 - http://packetstormsecurity.com/files/172323/FLEX-Denial-Of-Service.html
|
|
CVE-2022-25912 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532
|
|
CVE-2022-25912 - https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221
|
|
CVE-2022-25914 - https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLECLOUDTOOLS-2968871
|
|
CVE-2022-25916 - https://security.snyk.io/vuln/SNYK-JS-MT7688WISCAN-3177394
|
|
CVE-2022-25918 - https://security.snyk.io/vuln/SNYK-JS-SHESCAPE-3061108
|
|
CVE-2022-25921 - https://security.snyk.io/vuln/SNYK-JS-MORGANJSON-2976193
|
|
CVE-2022-25923 - https://security.snyk.io/vuln/SNYK-JS-EXECLOCALBIN-3157956
|
|
CVE-2022-25926 - https://security.snyk.io/vuln/SNYK-JS-WINDOWCONTROL-3186345
|
|
CVE-2022-25927 - https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-3244450
|
|
CVE-2022-25929 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-3177369
|
|
CVE-2022-25929 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-3177368
|
|
CVE-2022-25929 - https://security.snyk.io/vuln/SNYK-JS-SMOOTHIE-3177364
|
|
CVE-2022-2593 - https://wpscan.com/vulnerability/229a065e-1062-44d4-818d-29aa3b6b6d41
|
|
CVE-2022-25931 - https://gist.github.com/lirantal/fdfbe26561788c8194a54bf6d31772c9
|
|
CVE-2022-25931 - https://security.snyk.io/vuln/SNYK-JS-EASYSTATICSERVER-3153539
|
|
CVE-2022-25932 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1523
|
|
CVE-2022-25936 - https://gist.github.com/lirantal/691d02d607753d54856f9335f9a1692f
|
|
CVE-2022-25936 - https://security.snyk.io/vuln/SNYK-JS-SERVST-3244896
|
|
CVE-2022-25937 - https://security.snyk.io/vuln/SNYK-JS-GLANCE-3318395
|
|
CVE-2022-2594 - https://wpscan.com/vulnerability/3fde5336-552c-4861-8b4d-89a16735c0e2
|
|
CVE-2022-25940 - https://gist.github.com/lirantal/832382155e00da92bfd8bb3adea474eb
|
|
CVE-2022-25940 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3175617
|
|
CVE-2022-25940 - https://security.snyk.io/vuln/SNYK-JS-LITESERVER-3153540
|
|
CVE-2022-25942 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1486
|
|
CVE-2022-25943 - https://github.com/HadiMed/KINGSOFT-WPS-Office-LPE
|
|
CVE-2022-2595 - https://huntr.dev/bounties/1c6afb84-2025-46d8-9e9f-cbfc20e5d04d
|
|
CVE-2022-2596 - https://huntr.dev/bounties/a7e6a136-0a4b-46c4-ad20-802f1dd60bf7
|
|
CVE-2022-25962 - https://security.snyk.io/vuln/SNYK-JS-VAGRANTJS-3175614
|
|
CVE-2022-25967 - https://security.snyk.io/vuln/SNYK-JS-ETA-2936803
|
|
CVE-2022-2597 - https://wpscan.com/vulnerability/3ffcee7c-1e03-448c-8006-a9405658cdb7
|
|
CVE-2022-25972 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1485
|
|
CVE-2022-25973 - https://security.snyk.io/vuln/SNYK-JS-MCKILLPORT-2419070
|
|
CVE-2022-25978 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070
|
|
CVE-2022-25979 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253331
|
|
CVE-2022-25979 - https://security.snyk.io/vuln/SNYK-JS-JSUITES-3226764
|
|
CVE-2022-2598 - https://huntr.dev/bounties/2f08363a-47a2-422d-a7de-ce96a89ad08e
|
|
CVE-2022-25989 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1479
|
|
CVE-2022-2599 - https://wpscan.com/vulnerability/276a7fc5-3d0d-446d-92cf-20060aecd0ef
|
|
CVE-2022-25995 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1477
|
|
CVE-2022-25996 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1482
|
|
CVE-2022-26002 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1476
|
|
CVE-2022-26007 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1475
|
|
CVE-2022-26009 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1483
|
|
CVE-2022-2602 - http://packetstormsecurity.com/files/176533/Linux-Broken-Unix-GC-Interaction-Use-After-Free.html
|
|
CVE-2022-2602 - https://ubuntu.com/security/notices/USN-5693-1
|
|
CVE-2022-26020 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1474
|
|
CVE-2022-26023 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1520
|
|
CVE-2022-26026 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1491
|
|
CVE-2022-26042 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1478
|
|
CVE-2022-26043 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1489
|
|
CVE-2022-26061 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1487
|
|
CVE-2022-26067 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1492
|
|
CVE-2022-26068 - https://snyk.io/vuln/SNYK-UNMANAGED-PISTACHEIOPISTACHE-2806332
|
|
CVE-2022-26073 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1480
|
|
CVE-2022-26075 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1500
|
|
CVE-2022-26077 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1490
|
|
CVE-2022-26082 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1493
|
|
CVE-2022-26085 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1473
|
|
CVE-2022-26088 - http://packetstormsecurity.com/files/169863/BMC-Remedy-ITSM-Suite-9.1.10-20.02-HTML-Injection.html
|
|
CVE-2022-26088 - http://seclists.org/fulldisclosure/2022/Nov/10
|
|
CVE-2022-26088 - https://sec-consult.com/vulnerability-lab/advisory/html-injection-in-bmc-remedy-itsm-suite/
|
|
CVE-2022-26090 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-26091 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-26092 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-26093 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-26094 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-26095 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-26096 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-26097 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-26098 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-26099 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-26101 - http://packetstormsecurity.com/files/167561/SAP-Fiori-Launchpad-Cross-Site-Scripting.html
|
|
CVE-2022-26101 - http://seclists.org/fulldisclosure/2022/Jun/39
|
|
CVE-2022-26105 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-26106 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-26107 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-26108 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-26109 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-26117 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-r259-5p5p-2q47
|
|
CVE-2022-26134 - http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html
|
|
CVE-2022-26134 - http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html
|
|
CVE-2022-26134 - http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html
|
|
CVE-2022-26134 - http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html
|
|
CVE-2022-26143 - https://team-cymru.com/blog/2022/03/08/record-breaking-ddos-potential-discovered-cve-2022-26143/
|
|
CVE-2022-26149 - http://packetstormsecurity.com/files/171488/MODX-Revolution-2.8.3-pl-Remote-Code-Execution.html
|
|
CVE-2022-26159 - https://podalirius.net/en/cves/2022-26159/
|
|
CVE-2022-26169 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Air-Cargo-Management-System
|
|
CVE-2022-26170 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Mobile-Comparison-Website
|
|
CVE-2022-26171 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/campcodes.com/Bank-Management-System
|
|
CVE-2022-26173 - http://jforum.com
|
|
CVE-2022-26173 - https://github.com/WULINPIN/CVE/blob/main/JForum/poc.html
|
|
CVE-2022-26180 - http://packetstormsecurity.com/files/166630/qdPM-9.2-Cross-Site-Request-Forgery.html
|
|
CVE-2022-26180 - https://www.exploit-db.com/exploits/50854
|
|
CVE-2022-26181 - https://github.com/dropbox/lepton/issues/154
|
|
CVE-2022-26183 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/
|
|
CVE-2022-26184 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/
|
|
CVE-2022-26186 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/
|
|
CVE-2022-26187 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/
|
|
CVE-2022-26188 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/
|
|
CVE-2022-26189 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/
|
|
CVE-2022-26197 - https://gist.github.com/CrimsonHamster/1aeec6db0d740de6ed4690f6a975f377
|
|
CVE-2022-26211 - https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_25/25.md
|
|
CVE-2022-26233 - http://packetstormsecurity.com/files/166577/Barco-Control-Room-Management-Suite-Directory-Traversal.html
|
|
CVE-2022-26233 - http://seclists.org/fulldisclosure/2022/Apr/0
|
|
CVE-2022-26235 - https://pastebin.com/amgw9pE7
|
|
CVE-2022-26236 - https://pastebin.com/hwrvFix5
|
|
CVE-2022-26237 - https://pastebin.com/DREqM7AT
|
|
CVE-2022-26238 - https://pastebin.com/23N5wcC7
|
|
CVE-2022-26239 - https://pastebin.com/1QEHrj01
|
|
CVE-2022-26240 - https://pastebin.com/Bsy6KTxJ
|
|
CVE-2022-26243 - https://noob3xploiter.medium.com/hacking-the-tenda-ac10-1200-router-part-4-sscanf-buffer-overflow-75ae0e06abb6
|
|
CVE-2022-26244 - https://github.com/kishan0725/Hospital-Management-System/issues/23
|
|
CVE-2022-26250 - https://www.bencteux.fr/posts/synaman/
|
|
CVE-2022-26251 - https://www.bencteux.fr/posts/synaman/
|
|
CVE-2022-26252 - https://www.exploit-db.com/exploits/50780
|
|
CVE-2022-26254 - https://youtu.be/b665r1ZfCg4
|
|
CVE-2022-26255 - https://github.com/Fndroid/clash_for_windows_pkg/issues/2710
|
|
CVE-2022-26258 - https://github.com/zhizhuoshuma/cve_info_data/blob/ccaed4b94ba762eb8a8e003bfa762a7754b8182e/Vuln/Vuln/DIR-820L/command_execution_0/README.md
|
|
CVE-2022-26258 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-2626 - https://huntr.dev/bounties/704aacc9-edff-4da5-90a6-4adf8dbf36fe
|
|
CVE-2022-26260 - https://github.com/wollardj/simple-plist/issues/60
|
|
CVE-2022-26269 - https://github.com/nsbogam/CVE-2022-26269/blob/main/README.md
|
|
CVE-2022-2627 - https://wpscan.com/vulnerability/038327d0-568f-4011-9b7e-3da39e8b6aea
|
|
CVE-2022-26278 - https://github.com/pllrry/Tenda-AC9-V15.03.2.21_cn-Command-Execution-Vulnerability/tree/main/Tenda-AC9
|
|
CVE-2022-26279 - https://github.com/eyoucms/eyoucms/issues/22
|
|
CVE-2022-2628 - https://wpscan.com/vulnerability/e712f83e-b437-4bc6-9511-2b0290ed315d
|
|
CVE-2022-26281 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-26281
|
|
CVE-2022-2629 - https://wpscan.com/vulnerability/25a0d41f-3b6f-4d18-b4d5-767ac60ee8a8
|
|
CVE-2022-26291 - https://github.com/ckolivas/lrzip/issues/206
|
|
CVE-2022-26293 - https://www.exploit-db.com/exploits/50682
|
|
CVE-2022-26295 - https://www.exploit-db.com/exploits/50683
|
|
CVE-2022-26296 - https://github.com/riscv-boom/riscv-boom/issues/577
|
|
CVE-2022-26301 - https://github.com/yeyinshi/tuzicms/issues/11
|
|
CVE-2022-26303 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1488
|
|
CVE-2022-2631 - https://huntr.dev/bounties/86881f9e-ca48-49b5-9782-3c406316930c
|
|
CVE-2022-26315 - https://github.com/claudiodangelis/qrcp/issues/223
|
|
CVE-2022-26332 - https://www.exploit-db.com/exploits/50788
|
|
CVE-2022-26342 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1484
|
|
CVE-2022-26346 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1507
|
|
CVE-2022-2635 - https://wpscan.com/vulnerability/219767a8-2427-42d5-8734-bd197d9ab46b
|
|
CVE-2022-26352 - http://packetstormsecurity.com/files/167365/dotCMS-Shell-Upload.html
|
|
CVE-2022-2636 - https://huntr.dev/bounties/357c0390-631c-4684-b6e1-a6d8b2453d66
|
|
CVE-2022-26362 - http://packetstormsecurity.com/files/167718/Xen-TLB-Flush-Bypass.html
|
|
CVE-2022-26364 - http://packetstormsecurity.com/files/167710/Xen-PV-Guest-Non-SELFSNOOP-CPU-Memory-Corruption.html
|
|
CVE-2022-26376 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1511
|
|
CVE-2022-2638 - https://wpscan.com/vulnerability/70840a72-ccdc-4eee-9ad2-874809e5de11
|
|
CVE-2022-26382 - https://bugzilla.mozilla.org/show_bug.cgi?id=1741888
|
|
CVE-2022-26385 - https://bugzilla.mozilla.org/show_bug.cgi?id=1747526
|
|
CVE-2022-26387 - https://bugzilla.mozilla.org/show_bug.cgi?id=1752979
|
|
CVE-2022-26420 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1499
|
|
CVE-2022-2643 - https://vuldb.com/?id.205564
|
|
CVE-2022-2645 - https://vuldb.com/?id.205573
|
|
CVE-2022-26479 - https://sec-consult.com/vulnerability-lab/advisory/critical-vulnerabilities-poly-eagleeye-director-ii/
|
|
CVE-2022-26481 - https://sec-consult.com/vulnerability-lab/advisory/authenticated-command-injection-in-poly-studio/
|
|
CVE-2022-26482 - https://sec-consult.com/vulnerability-lab/advisory/critical-vulnerabilities-poly-eagleeye-director-ii/
|
|
CVE-2022-26495 - https://lists.debian.org/nbd/2022/01/msg00037.html
|
|
CVE-2022-26496 - http://packetstormsecurity.com/files/172148/Shannon-Baseband-fmtp-SDP-Attribute-Memory-Corruption.html
|
|
CVE-2022-26496 - https://lists.debian.org/nbd/2022/01/msg00037.html
|
|
CVE-2022-26497 - http://packetstormsecurity.com/files/172143/Shannon-Baseband-acfg-pcfg-SDP-Attribute-Memory-Corruption.html
|
|
CVE-2022-26498 - http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html
|
|
CVE-2022-26498 - http://packetstormsecurity.com/files/172139/Shannon-Baseband-chatroom-SDP-Attribute-Memory-Corruption.html
|
|
CVE-2022-26499 - http://packetstormsecurity.com/files/166745/Asterisk-Project-Security-Advisory-AST-2022-002.html
|
|
CVE-2022-2650 - https://huntr.dev/bounties/f0d85efa-4e78-4b1d-848f-edea115af64b
|
|
CVE-2022-26507 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-02
|
|
CVE-2022-2651 - http://packetstormsecurity.com/files/168423/Bookwyrm-0.4.3-Authentication-Bypass.html
|
|
CVE-2022-26510 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1495
|
|
CVE-2022-26518 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1501
|
|
CVE-2022-2652 - https://huntr.dev/bounties/1b055da5-7a9e-4409-99d7-030280d242d5
|
|
CVE-2022-26521 - http://packetstormsecurity.com/files/171487/Abantecart-1.3.2-Remote-Code-Execution.html
|
|
CVE-2022-2653 - https://huntr.dev/bounties/5dff7cf9-8bb2-4f67-a02d-b94db5009d70
|
|
CVE-2022-26531 - http://packetstormsecurity.com/files/167464/Zyxel-Buffer-Overflow-Format-String-Command-Injection.html
|
|
CVE-2022-26531 - http://packetstormsecurity.com/files/177036/Zyxel-zysh-Format-String-Proof-Of-Concept.html
|
|
CVE-2022-26532 - http://packetstormsecurity.com/files/167464/Zyxel-Buffer-Overflow-Format-String-Command-Injection.html
|
|
CVE-2022-2654 - https://wpscan.com/vulnerability/845f44ca-f572-48d7-a19a-89cace0b8993
|
|
CVE-2022-2655 - https://wpscan.com/vulnerability/acc9675a-56f6-411a-9594-07144c2aad1b
|
|
CVE-2022-2656 - https://vuldb.com/?id.205596
|
|
CVE-2022-26562 - https://kopano.com/
|
|
CVE-2022-26565 - https://bug.pocas.kr/2022/03/01/2022-03-05-CVE-2022-26565/
|
|
CVE-2022-26565 - https://github.com/totaljs/cms/issues/35
|
|
CVE-2022-2657 - https://wpscan.com/vulnerability/c600dd04-f6aa-430b-aefb-c4c6d554c41a
|
|
CVE-2022-26579 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/
|
|
CVE-2022-2658 - https://wpscan.com/vulnerability/e72fa040-3ca5-4570-9a3c-c704574b1ca3
|
|
CVE-2022-26580 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/
|
|
CVE-2022-26581 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/
|
|
CVE-2022-26582 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/
|
|
CVE-2022-26588 - http://packetstormsecurity.com/files/166627/ICEHRM-31.0.0.0S-Cross-Site-Request-Forgery.html
|
|
CVE-2022-26588 - https://medium.com/@devansh3008/csrf-in-icehrm-31-0-0-0s-in-delete-user-endpoint-86a39ecf253f
|
|
CVE-2022-26589 - https://medium.com/@devansh3008/pluck-cms-v4-7-15-csrf-vulnerability-at-delete-page-9fff0309f9c
|
|
CVE-2022-26589 - https://owasp.org/www-community/attacks/csrf
|
|
CVE-2022-26592 - https://github.com/sass/libsass/issues/3174
|
|
CVE-2022-26607 - https://github.com/baigoStudio/baigoCMS/issues/9
|
|
CVE-2022-26613 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-26613
|
|
CVE-2022-26624 - https://drive.google.com/file/d/1Dp0dD9PNcwamjRi0ldD0hUOEivu48SR6/view?usp=sharing
|
|
CVE-2022-26628 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/vetbossel.in/2022/Matrimony
|
|
CVE-2022-26629 - https://github.com/sysenter-eip/CVE-2022-26629
|
|
CVE-2022-2663 - https://www.youtube.com/watch?v=WIq-YgQuYCA
|
|
CVE-2022-26632 - https://www.exploit-db.com/exploits/50739
|
|
CVE-2022-26633 - https://www.exploit-db.com/exploits/50740
|
|
CVE-2022-26634 - https://www.exploit-db.com/exploits/50765
|
|
CVE-2022-26635 - https://xhzeem.me/posts/Php5-memcached-Injection-Bypass/read/
|
|
CVE-2022-26639 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_DNSServers%3D.pdf
|
|
CVE-2022-26640 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_minAddress%3D.pdf
|
|
CVE-2022-26641 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_httpRemotePort%3D.pdf
|
|
CVE-2022-26642 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_X_TP_ClonedMACAddress%3D.pdf
|
|
CVE-2022-2665 - https://vuldb.com/?id.205615
|
|
CVE-2022-26651 - http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html
|
|
CVE-2022-26653 - https://raxis.com/blog/cve-2022-26653-and-cve-2022-26777
|
|
CVE-2022-26659 - https://docs.docker.com/docker-for-windows/release-notes/
|
|
CVE-2022-2667 - https://vuldb.com/?id.205619
|
|
CVE-2022-2669 - https://wpscan.com/vulnerability/792d9f22-abf6-47b2-a247-d0cdb705cd81
|
|
CVE-2022-26702 - http://seclists.org/fulldisclosure/2023/Mar/21
|
|
CVE-2022-2671 - https://vuldb.com/?id.205655
|
|
CVE-2022-2672 - https://vuldb.com/?id.205656
|
|
CVE-2022-26744 - http://seclists.org/fulldisclosure/2022/Oct/39
|
|
CVE-2022-2675 - https://fccid.io/2A5PE-YUSHU001/Users-Manual/User-Manual-5810729
|
|
CVE-2022-26757 - http://packetstormsecurity.com/files/167517/XNU-Flow-Divert-Race-Condition-Use-After-Free.html
|
|
CVE-2022-2676 - https://vuldb.com/?id.205664
|
|
CVE-2022-2677 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Apartment%20Visitor%20Management%20System-SQL%20injections.md
|
|
CVE-2022-2677 - https://vuldb.com/?id.205665
|
|
CVE-2022-26777 - https://raxis.com/blog/cve-2022-26653-and-cve-2022-26777
|
|
CVE-2022-26779 - https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-vpcc-9rh2-8jfp
|
|
CVE-2022-26780 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481
|
|
CVE-2022-26781 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481
|
|
CVE-2022-26782 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481
|
|
CVE-2022-2679 - https://vuldb.com/?id.205667
|
|
CVE-2022-2683 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Simple%20Food%20Ordering%20System-XSS.md
|
|
CVE-2022-2683 - https://vuldb.com/?id.205671
|
|
CVE-2022-26833 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1513
|
|
CVE-2022-2684 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Apartment%20Visitor%20Management%20System-XSS.md
|
|
CVE-2022-26842 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1537
|
|
CVE-2022-2685 - https://vuldb.com/?id.205673
|
|
CVE-2022-26851 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities
|
|
CVE-2022-26852 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities
|
|
CVE-2022-26854 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities
|
|
CVE-2022-26855 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities
|
|
CVE-2022-26873 - https://www.binarly.io/advisories/BRLY-2022-027
|
|
CVE-2022-26877 - https://asana.com
|
|
CVE-2022-26878 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.17
|
|
CVE-2022-26878 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
|
|
CVE-2022-26878 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1d0688421449718c6c5f46e458a378c9b530ba18
|
|
CVE-2022-2690 - https://vuldb.com/?id.205813
|
|
CVE-2022-2691 - https://vuldb.com/?id.205814
|
|
CVE-2022-2692 - https://vuldb.com/?id.205815
|
|
CVE-2022-2694 - https://vuldb.com/?id.205817
|
|
CVE-2022-26941 - https://tetraburst.com/
|
|
CVE-2022-26942 - https://tetraburst.com/
|
|
CVE-2022-26943 - https://tetraburst.com/
|
|
CVE-2022-26947 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
|
|
CVE-2022-26948 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
|
|
CVE-2022-26949 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
|
|
CVE-2022-26950 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
|
|
CVE-2022-26951 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
|
|
CVE-2022-26952 - https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2022-26952%20%26%20CVE-2022-26953/readme.md
|
|
CVE-2022-26953 - https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2022-26952%20%26%20CVE-2022-26953/readme.md
|
|
CVE-2022-26959 - https://assura.atlassian.net/wiki/spaces/VULNS/pages/1842675717/CVE-2022-26959+Northstar+Club+Management+software+version+6.3+-+Full+Blind+Time-based+SQL+Injection
|
|
CVE-2022-26965 - https://packetstormsecurity.com/files/166336/Pluck-CMS-4.7.16-Shell-Upload.html
|
|
CVE-2022-26965 - https://youtu.be/sN6J_X4mEbY
|
|
CVE-2022-26966 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
|
|
CVE-2022-26966 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062
|
|
CVE-2022-26967 - https://github.com/gpac/gpac/issues/2138
|
|
CVE-2022-26979 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-2698 - https://vuldb.com/?id.205819
|
|
CVE-2022-26980 - https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca
|
|
CVE-2022-26981 - https://github.com/liblouis/liblouis/issues/1171
|
|
CVE-2022-26982 - http://packetstormsecurity.com/files/171486/SimpleMachinesForum-2.1.1-Remote-Code-Execution.html
|
|
CVE-2022-26986 - http://packetstormsecurity.com/files/171485/ImpressCMS-1.4.3-SQL-Injection.html
|
|
CVE-2022-26990 - https://github.com/wudipjq/my_vuln/blob/main/ARRIS/vuln_2/2.md
|
|
CVE-2022-27003 - https://github.com/wudipjq/my_vuln/blob/main/totolink/vuln_32/32.md
|
|
CVE-2022-27007 - https://github.com/nginx/njs/issues/469
|
|
CVE-2022-27008 - https://github.com/nginx/njs/issues/471
|
|
CVE-2022-27016 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/10
|
|
CVE-2022-2702 - https://vuldb.com/?id.205826
|
|
CVE-2022-27022 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/14
|
|
CVE-2022-2703 - https://vuldb.com/?id.205827
|
|
CVE-2022-2704 - https://vuldb.com/?id.205828
|
|
CVE-2022-27041 - https://github.com/OS4ED/openSIS-Classic/issues/248
|
|
CVE-2022-27044 - https://github.com/saitoha/libsixel/issues/156
|
|
CVE-2022-27046 - https://github.com/saitoha/libsixel/issues/157
|
|
CVE-2022-2705 - https://vuldb.com/?id.205829
|
|
CVE-2022-2706 - https://vuldb.com/?id.205830
|
|
CVE-2022-27061 - http://packetstormsecurity.com/files/166659/AeroCMS-0.0.1-Shell-Upload.html
|
|
CVE-2022-27061 - https://github.com/D4rkP0w4r/AeroCMS-Unrestricted-File-Upload-POC
|
|
CVE-2022-27062 - http://packetstormsecurity.com/files/166649/AeroCMS-0.0.1-Cross-Site-Scripting.html
|
|
CVE-2022-27062 - https://github.com/D4rkP0w4r/AeroCMS-Add_Posts-Stored_XSS-Poc
|
|
CVE-2022-27063 - http://packetstormsecurity.com/files/166649/AeroCMS-0.0.1-Cross-Site-Scripting.html
|
|
CVE-2022-27063 - https://github.com/D4rkP0w4r/AeroCMS-Comment-Stored_XSS-Poc
|
|
CVE-2022-27064 - http://packetstormsecurity.com/files/166653/Musical-World-1-Shell-Upload.html
|
|
CVE-2022-27064 - https://github.com/D4rkP0w4r/Musical-World-Unrestricted-File-Upload-RCE-POC
|
|
CVE-2022-2707 - https://vuldb.com/?id.205831
|
|
CVE-2022-2708 - https://vuldb.com/?id.205833
|
|
CVE-2022-27083 - https://github.com/GD008/vuln/blob/main/tenda_M3_uploadAccessCodePic/M3_uploadAccessCodePic.md
|
|
CVE-2022-2709 - https://wpscan.com/vulnerability/1c551234-9c59-41a0-ab74-beea2d27df6b
|
|
CVE-2022-27092 - https://www.exploit-db.com/exploits/50804
|
|
CVE-2022-27094 - https://www.exploit-db.com/exploits/50817
|
|
CVE-2022-27095 - https://www.exploit-db.com/exploits/50815
|
|
CVE-2022-2710 - https://wpscan.com/vulnerability/f730f584-2370-49f9-a094-a5bc521671c1
|
|
CVE-2022-27104 - https://www.swascan.com/security-advisory-forma-lms/
|
|
CVE-2022-2711 - https://wpscan.com/vulnerability/11e73c23-ff5f-42e5-a4b0-0971652dcea1
|
|
CVE-2022-27114 - https://github.com/michaelrsweet/htmldoc/issues/471
|
|
CVE-2022-2713 - https://huntr.dev/bounties/3080fc96-75d7-4868-84de-9fc8c9b90290
|
|
CVE-2022-27134 - https://github.com/Kenun99/CVE-batdappboomx
|
|
CVE-2022-27135 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42232
|
|
CVE-2022-27135 - https://github.com/verf1sh/Poc/blob/master/pic_ppm.png
|
|
CVE-2022-27135 - https://github.com/verf1sh/Poc/blob/master/poc_ppm
|
|
CVE-2022-27139 - http://ghost.org/docs/security/#privilege-escalation-attacks
|
|
CVE-2022-27145 - https://github.com/gpac/gpac/issues/2108
|
|
CVE-2022-27146 - https://github.com/gpac/gpac/issues/2120
|
|
CVE-2022-27147 - https://github.com/gpac/gpac/issues/2109
|
|
CVE-2022-27148 - https://github.com/gpac/gpac/issues/2067
|
|
CVE-2022-27169 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1494
|
|
CVE-2022-27172 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1496
|
|
CVE-2022-27178 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1506
|
|
CVE-2022-27185 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1505
|
|
CVE-2022-27192 - https://github.com/transcendent-group/advisories/blob/main/CVE-2022-27192.md
|
|
CVE-2022-27193 - https://github.com/csaf-tools/CVRF-CSAF-Converter/releases/tag/1.0.0-rc2
|
|
CVE-2022-27223 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12
|
|
CVE-2022-27226 - http://packetstormsecurity.com/files/166396/iRZ-Mobile-Router-Cross-Site-Request-Forgery-Remote-Code-Execution.html
|
|
CVE-2022-27226 - https://github.com/SakuraSamuraii/ez-iRZ
|
|
CVE-2022-27226 - https://johnjhacking.com/blog/cve-2022-27226/
|
|
CVE-2022-2723 - https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Employee%20Management%20System%20eprocess.php%20SQL%20Injection/
|
|
CVE-2022-2724 - https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Employee%20Management%20System%20aprocess.php%20SQL%20Injection/
|
|
CVE-2022-27248 - http://packetstormsecurity.com/files/166560/IdeaRE-RefTree-Path-Traversal.html
|
|
CVE-2022-27249 - http://packetstormsecurity.com/files/166559/IdeaRE-RefTree-Shell-Upload.html
|
|
CVE-2022-27254 - https://github.com/nonamecoder/CVE-2022-27254
|
|
CVE-2022-27254 - https://news.ycombinator.com/item?id=30804702
|
|
CVE-2022-27254 - https://www.bleepingcomputer.com/news/security/honda-bug-lets-a-hacker-unlock-and-start-your-car-via-replay-attack/
|
|
CVE-2022-27254 - https://www.theregister.com/2022/03/25/honda_civic_hack/
|
|
CVE-2022-27256 - https://volse.net/~haraldei/infosec/disclosures/hubzilla-before-7-2-multiple-vulnerabilities/
|
|
CVE-2022-2726 - https://vuldb.com/?id.205839
|
|
CVE-2022-27260 - http://buttercms.com
|
|
CVE-2022-27263 - https://github.com/strapi/strapi
|
|
CVE-2022-27268 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
|
CVE-2022-27269 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
|
CVE-2022-27270 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
|
CVE-2022-27271 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
|
CVE-2022-27272 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
|
CVE-2022-27273 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
|
CVE-2022-27274 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
|
CVE-2022-27275 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
|
CVE-2022-27276 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
|
CVE-2022-27286 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-27287 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-27288 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-27289 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-2729 - https://huntr.dev/bounties/13b58e74-2dd0-4eec-9f3a-554485701540
|
|
CVE-2022-27290 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-27291 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-27292 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-27293 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-27294 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-27295 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-2730 - https://huntr.dev/bounties/a81f39ab-092b-4941-b9ca-c4c8f2191504
|
|
CVE-2022-27304 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Student-Grading-System
|
|
CVE-2022-27308 - http://packetstormsecurity.com/files/166966/PHProjekt-PhpSimplyGest-MyProjects-1.3.0-Cross-Site-Scripting.html
|
|
CVE-2022-2731 - https://huntr.dev/bounties/20b8d5c5-0764-4f0b-8ab3-b9f6b857175e
|
|
CVE-2022-2732 - https://huntr.dev/bounties/8773e0d1-5f1a-4e87-8998-f5ec45f6d533
|
|
CVE-2022-2733 - https://huntr.dev/bounties/25b91301-dfb0-4353-a732-e051bbe8420c
|
|
CVE-2022-27330 - https://github.com/CP04042K/Full-Ecommece-Website-Add_Product-Stored_XSS-POC
|
|
CVE-2022-27337 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1230
|
|
CVE-2022-27337 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1230#note_1372177
|
|
CVE-2022-2734 - https://huntr.dev/bounties/d8e4c70c-788b-47e9-8141-a08db751d4e6
|
|
CVE-2022-27346 - http://packetstormsecurity.com/files/166654/E-Commerce-Website-1.1.0-Shell-Upload.html
|
|
CVE-2022-27346 - https://github.com/D4rkP0w4r/Full-Ecommece-Website-Slides-Unrestricted-File-Upload-RCE-POC
|
|
CVE-2022-27348 - http://packetstormsecurity.com/files/166650/Social-Codia-SMS-1-Cross-Site-Scripting.html
|
|
CVE-2022-27348 - https://github.com/D4rkP0w4r/sms-Add_Student-Stored_XSS-POC
|
|
CVE-2022-27349 - http://packetstormsecurity.com/files/166655/Social-Codia-SMS-1-Shell-Upload.html
|
|
CVE-2022-27349 - https://github.com/D4rkP0w4r/sms-Unrestricted-File-Upload-RCE-POC
|
|
CVE-2022-2735 - https://www.openwall.com/lists/oss-security/2022/09/01/4
|
|
CVE-2022-27351 - http://packetstormsecurity.com/files/166651/PHPGurukul-Zoo-Management-System-1.0-Shell-Upload.html
|
|
CVE-2022-27351 - https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20Upload%20%2B%20RCE/POC.md
|
|
CVE-2022-27352 - http://packetstormsecurity.com/files/166656/Simple-House-Rental-System-1-Shell-Upload.html
|
|
CVE-2022-27352 - https://github.com/D4rkP0w4r/CVEs/blob/main/Simple%20House%20Rental%20System%20Upload%20%2B%20RCE/POC.md
|
|
CVE-2022-27357 - http://packetstormsecurity.com/files/166652/E-Commerce-Website-1.0-Shell-Upload.html
|
|
CVE-2022-27357 - https://github.com/D4rkP0w4r/CVEs/blob/main/Ecommerce%20Website%20Upload%20%2B%20RCE/POC.md
|
|
CVE-2022-27365 - https://github.com/chshcms/cscms/issues/12#issue-1170440183
|
|
CVE-2022-2737 - https://wpscan.com/vulnerability/91bbdeb0-f2df-4500-b856-af0ff68fbb12
|
|
CVE-2022-27374 - https://github.com/tianhui999/myCVE/blob/main/AX12/AX12.md
|
|
CVE-2022-27375 - https://github.com/tianhui999/myCVE/blob/main/AX12/AX12-2.md
|
|
CVE-2022-27378 - https://jira.mariadb.org/browse/MDEV-26423
|
|
CVE-2022-27382 - https://jira.mariadb.org/browse/MDEV-26402
|
|
CVE-2022-27385 - https://jira.mariadb.org/browse/MDEV-26415
|
|
CVE-2022-27386 - https://jira.mariadb.org/browse/MDEV-26406
|
|
CVE-2022-27387 - https://jira.mariadb.org/browse/MDEV-26422
|
|
CVE-2022-27411 - https://github.com/ejdhssh/IOT_Vul
|
|
CVE-2022-27412 - http://packetstormsecurity.com/files/166694/Explore-CMS-1.0-SQL-Injection.html
|
|
CVE-2022-27431 - https://github.com/wuzhicms/wuzhicms/issues/200
|
|
CVE-2022-27432 - https://owasp.org/www-community/attacks/csrf
|
|
CVE-2022-27432 - https://www.exploit-db.com/exploits/50831
|
|
CVE-2022-27435 - https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_Product-Unrestricted-File-Upload-RCE-POC
|
|
CVE-2022-27436 - https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_User-Stored-XSS-POC
|
|
CVE-2022-27438 - https://gerr.re/posts/cve-2022-27438/
|
|
CVE-2022-27444 - https://jira.mariadb.org/browse/MDEV-28080
|
|
CVE-2022-27445 - https://jira.mariadb.org/browse/MDEV-28081
|
|
CVE-2022-27446 - https://jira.mariadb.org/browse/MDEV-28082
|
|
CVE-2022-27447 - https://jira.mariadb.org/browse/MDEV-28099
|
|
CVE-2022-27448 - https://jira.mariadb.org/browse/MDEV-28095
|
|
CVE-2022-27449 - https://jira.mariadb.org/browse/MDEV-28089
|
|
CVE-2022-2745 - https://vuldb.com/?id.206013
|
|
CVE-2022-27451 - https://jira.mariadb.org/browse/MDEV-28094
|
|
CVE-2022-27452 - https://jira.mariadb.org/browse/MDEV-28090
|
|
CVE-2022-27455 - https://jira.mariadb.org/browse/MDEV-28097
|
|
CVE-2022-27456 - https://jira.mariadb.org/browse/MDEV-28093
|
|
CVE-2022-27457 - https://jira.mariadb.org/browse/MDEV-28098
|
|
CVE-2022-27458 - https://jira.mariadb.org/browse/MDEV-28099
|
|
CVE-2022-2747 - https://vuldb.com/?id.206015
|
|
CVE-2022-27474 - https://github.com/Mount4in/Mount4in.github.io/blob/master/poc.py
|
|
CVE-2022-27480 - http://packetstormsecurity.com/files/166743/Siemens-A8000-CP-8050-CP-8031-SICAM-WEB-Missing-File-Download-Missing-Authentication.html
|
|
CVE-2022-27480 - http://seclists.org/fulldisclosure/2022/Apr/20
|
|
CVE-2022-27481 - https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf
|
|
CVE-2022-27498 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1531
|
|
CVE-2022-2750 - https://vuldb.com/?id.206022
|
|
CVE-2022-2752 - https://www.secomea.com/support/cybersecurity-advisory
|
|
CVE-2022-2753 - https://wpscan.com/vulnerability/3c6cc46e-e18a-4f34-ac09-f30ca74a1182
|
|
CVE-2022-27531 - https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0010
|
|
CVE-2022-27532 - https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0010
|
|
CVE-2022-27534 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310322_2
|
|
CVE-2022-27535 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#050822
|
|
CVE-2022-2754 - https://wpscan.com/vulnerability/e3c6d137-ff6e-432a-a21a-b36dc81f73c5
|
|
CVE-2022-2756 - https://huntr.dev/bounties/95e7c181-9d80-4428-aebf-687ac55a9216
|
|
CVE-2022-27567 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27568 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27569 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27570 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27571 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27572 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27573 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27574 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27575 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27576 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27607 - https://github.com/axiomatic-systems/Bento4/issues/677
|
|
CVE-2022-2762 - https://wpscan.com/vulnerability/cf0b3893-3283-46d6-a497-f3110a35d42a
|
|
CVE-2022-2763 - https://wpscan.com/vulnerability/36a7b872-31fa-4375-9be7-8f787e616ed5
|
|
CVE-2022-27630 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1504
|
|
CVE-2022-27631 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1510
|
|
CVE-2022-27633 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1503
|
|
CVE-2022-27642 - https://kb.netgear.com/000064723/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0327
|
|
CVE-2022-27645 - https://kb.netgear.com/000064722/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-and-Fixed-Wireless-Products-PSV-2021-0325
|
|
CVE-2022-27647 - https://kb.netgear.com/000064723/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0327
|
|
CVE-2022-2765 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Company%20Website%20CMS--.md
|
|
CVE-2022-27654 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-27655 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-27656 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-27657 - http://packetstormsecurity.com/files/167563/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Directory-Traversal.html
|
|
CVE-2022-27657 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-27658 - https://launchpad.support.sap.com/#/notes/3165856
|
|
CVE-2022-2766 - https://vuldb.com/?id.206162
|
|
CVE-2022-27660 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1502
|
|
CVE-2022-27666 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.15
|
|
CVE-2022-27667 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-27668 - http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html
|
|
CVE-2022-27668 - http://seclists.org/fulldisclosure/2022/Sep/17
|
|
CVE-2022-27668 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-27669 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-27670 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-27671 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-2769 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Company%20Website%20CMS(XSS).md
|
|
CVE-2022-2770 - https://vuldb.com/?id.206166
|
|
CVE-2022-2772 - https://vuldb.com/?id.206168
|
|
CVE-2022-2774 - https://vuldb.com/?id.206170
|
|
CVE-2022-2775 - https://wpscan.com/vulnerability/7101ce04-670e-4ce0-9f60-e00494ff379d
|
|
CVE-2022-2776 - https://vuldb.com/?id.206172
|
|
CVE-2022-2777 - https://huntr.dev/bounties/13dd2f4d-0c7f-483e-a771-e1ed2ff1c36f
|
|
CVE-2022-27778 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-27782 - https://hackerone.com/reports/1555796
|
|
CVE-2022-27804 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1567
|
|
CVE-2022-27805 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1552
|
|
CVE-2022-27813 - https://tetraburst.com/
|
|
CVE-2022-27821 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27822 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27823 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27824 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27825 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27826 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27827 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27828 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27829 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27830 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27831 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27832 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27833 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27834 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27835 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27836 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
|
CVE-2022-27881 - https://blog.quarkslab.com/heap-overflow-in-openbsds-slaacd-via-router-advertisement.html
|
|
CVE-2022-27882 - https://blog.quarkslab.com/heap-overflow-in-openbsds-slaacd-via-router-advertisement.html
|
|
CVE-2022-27888 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-01.md
|
|
CVE-2022-27889 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-02.md
|
|
CVE-2022-27890 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-15.md
|
|
CVE-2022-27895 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-06.md
|
|
CVE-2022-27896 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-08.md
|
|
CVE-2022-27907 - https://support.sonatype.com/hc/en-us/articles/5011047953555
|
|
CVE-2022-27925 - http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html
|
|
CVE-2022-27927 - http://packetstormsecurity.com/files/167017/Microfinance-Management-System-1.0-SQL-Injection.html
|
|
CVE-2022-27927 - https://github.com/erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated
|
|
CVE-2022-27938 - https://github.com/saitoha/libsixel/issues/163
|
|
CVE-2022-27939 - https://github.com/appneta/tcpreplay/issues/717
|
|
CVE-2022-27940 - https://github.com/appneta/tcpreplay/issues/718
|
|
CVE-2022-27941 - https://github.com/appneta/tcpreplay/issues/716
|
|
CVE-2022-27942 - https://github.com/appneta/tcpreplay/issues/719
|
|
CVE-2022-27944 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-27946 - https://github.com/donothingme/VUL/blob/main/vul3/3.md
|
|
CVE-2022-27950 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.11
|
|
CVE-2022-27958 - https://github.com/afeng2016-s/CVE-Request/blob/main/febs-security/febs.md
|
|
CVE-2022-2796 - https://huntr.dev/bounties/69d56ec3-8370-44cf-9732-4065e3076097
|
|
CVE-2022-27978 - https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220320-tooljet.md
|
|
CVE-2022-27979 - https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220321-tooljet-xss.md
|
|
CVE-2022-2798 - https://wpscan.com/vulnerability/f169567d-c682-4abe-94df-a9d00be90edd
|
|
CVE-2022-27982 - https://www.adminxe.com/3651.html
|
|
CVE-2022-27983 - https://www.adminxe.com/3687.html
|
|
CVE-2022-27984 - https://github.com/CuppaCMS/CuppaCMS/issues/30
|
|
CVE-2022-27985 - https://github.com/CuppaCMS/CuppaCMS/issues/31
|
|
CVE-2022-2799 - https://wpscan.com/vulnerability/4385370e-cf99-4249-b2c1-90cbfa8378a4
|
|
CVE-2022-27991 - https://github.com/D4rkP0w4r/CVEs/blob/main/Online-Banking_SQLI/POC.md
|
|
CVE-2022-27992 - http://packetstormsecurity.com/files/166648/PHPGurukul-Zoo-Management-System-1.0-SQL-Injection.html
|
|
CVE-2022-27992 - https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20SQLI/POC.md
|
|
CVE-2022-28000 - http://packetstormsecurity.com/files/166657/Car-Rental-System-1.0-SQL-Injection.html
|
|
CVE-2022-28000 - https://github.com/D4rkP0w4r/CVEs/blob/main/Car%20Rental%20System%20SQLI/POC.md
|
|
CVE-2022-28001 - http://packetstormsecurity.com/files/166658/Movie-Seat-Reservation-System-1.0-File-Disclosure-SQL-Injection.html
|
|
CVE-2022-28001 - https://github.com/D4rkP0w4r/CVEs/blob/main/Movie%20Seat%20Reservation%20System%20SQLI/POC.md
|
|
CVE-2022-28002 - http://packetstormsecurity.com/files/166658/Movie-Seat-Reservation-System-1.0-File-Disclosure-SQL-Injection.html
|
|
CVE-2022-28002 - https://github.com/D4rkP0w4r/CVEs/blob/main/Movie%20Seat%20Reservation%20System%20File%20Disclosure/POC.md
|
|
CVE-2022-28005 - https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88
|
|
CVE-2022-28006 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/apsystem.zip
|
|
CVE-2022-2801 - https://vuldb.com/?id.206247
|
|
CVE-2022-28021 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/RCE-1.md
|
|
CVE-2022-28022 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/SQLi-1.md
|
|
CVE-2022-28023 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/SQLi-2.md
|
|
CVE-2022-28024 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-1.md
|
|
CVE-2022-28025 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-2.md
|
|
CVE-2022-28026 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-3.md
|
|
CVE-2022-28028 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-1.md
|
|
CVE-2022-28029 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-2.md
|
|
CVE-2022-28030 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-3.md
|
|
CVE-2022-2804 - https://vuldb.com/?id.206250
|
|
CVE-2022-28051 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/blob/main/CVE-2022-28051/README.md
|
|
CVE-2022-28051 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28051
|
|
CVE-2022-28060 - https://github.com/JiuBanSec/CVE/blob/main/VictorCMS%20SQL.md
|
|
CVE-2022-28062 - https://github.com/D4rkP0w4r/CVEs/blob/main/Car%20Rental%20System%20Upload%20%2B%20RCE/POC.md
|
|
CVE-2022-28063 - https://github.com/D4rkP0w4r/CVEs/blob/main/Simple%20Bakery%20Shop%20Management%20System%20File%20Disclosure/POC.md
|
|
CVE-2022-28079 - http://packetstormsecurity.com/files/167131/College-Management-System-1.0-SQL-Injection.html
|
|
CVE-2022-28079 - https://github.com/erengozaydin/College-Management-System-course_code-SQL-Injection-Authenticated
|
|
CVE-2022-28080 - http://packetstormsecurity.com/files/167123/Royal-Event-Management-System-1.0-SQL-Injection.html
|
|
CVE-2022-28080 - https://github.com/erengozaydin/Royal-Event-Management-System-todate-SQL-Injection-Authenticated
|
|
CVE-2022-28080 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/Royal%20Event.zip
|
|
CVE-2022-28085 - https://github.com/michaelrsweet/htmldoc/issues/480
|
|
CVE-2022-28099 - https://github.com/IbrahimEkimIsik/CVE-2022-28099/blob/main/SQL%20Injection%20For%20Poultry%20Farm%20Management%20system%201.0
|
|
CVE-2022-28099 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/Redcock-Farm.zip
|
|
CVE-2022-28102 - https://github.com/housamz/php-mysql-admin-panel-generator/issues/19
|
|
CVE-2022-28104 - https://packetstormsecurity.com/files/166430
|
|
CVE-2022-28108 - https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/
|
|
CVE-2022-28109 - https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/
|
|
CVE-2022-28110 - https://medium.com/@honeyakshat999/hotel-management-system-sql-injection-on-login-page-a1ca87a31176
|
|
CVE-2022-28117 - http://packetstormsecurity.com/files/167063/Navigate-CMS-2.9.4-Server-Side-Request-Forgery.html
|
|
CVE-2022-28127 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1571
|
|
CVE-2022-28132 - https://www.exploit-db.com/exploits/50939
|
|
CVE-2022-2814 - https://vuldb.com/?id.206401
|
|
CVE-2022-2816 - https://huntr.dev/bounties/e2a83037-fcf9-4218-b2b9-b7507dacde58
|
|
CVE-2022-2817 - https://huntr.dev/bounties/a7b7d242-3d88-4bde-a681-6c986aff886f
|
|
CVE-2022-28171 - http://packetstormsecurity.com/files/170818/Hikvision-Remote-Code-Execution-XSS-SQL-Injection.html
|
|
CVE-2022-28171 - http://packetstormsecurity.com/files/173653/Hikvision-Hybrid-SAN-Ds-a71024-SQL-Injection.html
|
|
CVE-2022-28172 - http://packetstormsecurity.com/files/170818/Hikvision-Remote-Code-Execution-XSS-SQL-Injection.html
|
|
CVE-2022-2818 - https://huntr.dev/bounties/ee27e5df-516b-4cf4-9f28-346d907b5491
|
|
CVE-2022-28181 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
|
CVE-2022-28182 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
|
CVE-2022-28183 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
|
CVE-2022-28184 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
|
CVE-2022-28185 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
|
CVE-2022-28186 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
|
CVE-2022-28187 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
|
CVE-2022-28188 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
|
CVE-2022-28189 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
|
CVE-2022-2819 - https://huntr.dev/bounties/0a9bd71e-66b8-4eb1-9566-7dfd9b097e59
|
|
CVE-2022-28190 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
|
CVE-2022-28191 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
|
CVE-2022-28192 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
|
CVE-2022-28193 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343
|
|
CVE-2022-28194 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343
|
|
CVE-2022-28195 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343
|
|
CVE-2022-28196 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343
|
|
CVE-2022-28197 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343
|
|
CVE-2022-28199 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlx5-jbPCrqD8
|
|
CVE-2022-2820 - https://huntr.dev/bounties/df06b7d7-6077-43a5-bd81-3cc66f0d4d19
|
|
CVE-2022-2821 - https://huntr.dev/bounties/c216db15-fe2f-42a7-852a-6c47498cf069
|
|
CVE-2022-28213 - http://packetstormsecurity.com/files/167046/SAP-BusinessObjects-Intelligence-4.3-XML-Injection.html
|
|
CVE-2022-28213 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-28214 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-28215 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-28216 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-28217 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-28219 - http://packetstormsecurity.com/files/167997/ManageEngine-ADAudit-Plus-Path-Traversal-XML-Injection.html
|
|
CVE-2022-28219 - https://www.horizon3.ai/red-team-blog-cve-2022-28219/
|
|
CVE-2022-28219 - https://www.manageengine.com/products/active-directory-audit/cve-2022-28219.html
|
|
CVE-2022-2823 - https://wpscan.com/vulnerability/c88c85b3-2830-4354-99fd-af6bce6bb4ef
|
|
CVE-2022-2824 - https://huntr.dev/bounties/1ccb2d1c-6881-4813-a5bc-1603d29b7141
|
|
CVE-2022-28282 - https://bugzilla.mozilla.org/show_bug.cgi?id=1751609
|
|
CVE-2022-28286 - https://bugzilla.mozilla.org/show_bug.cgi?id=1735265
|
|
CVE-2022-28287 - https://bugzilla.mozilla.org/show_bug.cgi?id=1741515
|
|
CVE-2022-2829 - https://huntr.dev/bounties/d6eaa453-9758-41b7-8c38-fd878d6aeab4
|
|
CVE-2022-28290 - https://cybersecurityworks.com/zerodays/cve-2022-28290-reflected-cross-site-scripting-in-welaunch.html
|
|
CVE-2022-28291 - https://cybersecurityworks.com/blog/zero-days/csw-expert-discovers-a-zero-day-vulnerability-in-tenables-nessus-scanner.html
|
|
CVE-2022-2831 - https://developer.blender.org/T99705
|
|
CVE-2022-2832 - https://developer.blender.org/D15463
|
|
CVE-2022-2832 - https://developer.blender.org/T99706
|
|
CVE-2022-28321 - http://download.opensuse.org/source/distribution/openSUSE-current/repo/oss/src/
|
|
CVE-2022-28328 - https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf
|
|
CVE-2022-28329 - https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf
|
|
CVE-2022-2833 - https://developer.blender.org/T99711
|
|
CVE-2022-2834 - https://wpscan.com/vulnerability/468d5fc7-04c6-4354-b134-85ebb25b37ae
|
|
CVE-2022-28345 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2022-42.md
|
|
CVE-2022-28345 - https://github.com/zadewg/RIUS
|
|
CVE-2022-28345 - https://sick.codes/sick-2022-42
|
|
CVE-2022-28353 - http://packetstormsecurity.com/files/171403/MyBB-External-Redirect-Warning-1.3-Cross-Site-Scripting.html
|
|
CVE-2022-28354 - http://packetstormsecurity.com/files/171402/MyBB-Active-Threads-1.3.0-Cross-Site-Scripting.html
|
|
CVE-2022-28356 - http://www.openwall.com/lists/oss-security/2022/04/06/1
|
|
CVE-2022-28356 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1
|
|
CVE-2022-28363 - http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html
|
|
CVE-2022-28363 - https://seclists.org/fulldisclosure/2022/Apr/1
|
|
CVE-2022-28364 - http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html
|
|
CVE-2022-28364 - https://seclists.org/fulldisclosure/2022/Apr/1
|
|
CVE-2022-28365 - http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html
|
|
CVE-2022-28365 - https://seclists.org/fulldisclosure/2022/Apr/1
|
|
CVE-2022-28368 - http://packetstormsecurity.com/files/171738/Dompdf-1.2.1-Remote-Code-Execution.html
|
|
CVE-2022-28381 - http://packetstormsecurity.com/files/166573/ALLMediaServer-1.6-Buffer-Overflow.html
|
|
CVE-2022-28382 - http://packetstormsecurity.com/files/167491/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-ECB-Issue.html
|
|
CVE-2022-28382 - http://packetstormsecurity.com/files/167500/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Risky-Crypto.html
|
|
CVE-2022-28382 - http://packetstormsecurity.com/files/167528/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html
|
|
CVE-2022-28382 - http://packetstormsecurity.com/files/167532/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html
|
|
CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/18
|
|
CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/22
|
|
CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/24
|
|
CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/9
|
|
CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Oct/4
|
|
CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-002.txt
|
|
CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-006.txt
|
|
CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-010.txt
|
|
CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-015.txt
|
|
CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-044.txt
|
|
CVE-2022-28383 - http://packetstormsecurity.com/files/167482/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Missing-Control.html
|
|
CVE-2022-28383 - http://packetstormsecurity.com/files/167508/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Missing-Trust.html
|
|
CVE-2022-28383 - http://packetstormsecurity.com/files/167535/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Missing-Trust.html
|
|
CVE-2022-28383 - http://packetstormsecurity.com/files/167539/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Missing-Trust.html
|
|
CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/10
|
|
CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/12
|
|
CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/19
|
|
CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/25
|
|
CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Oct/5
|
|
CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-003.txt
|
|
CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-007.txt
|
|
CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-011.txt
|
|
CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-016.txt
|
|
CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-045.txt
|
|
CVE-2022-28384 - http://packetstormsecurity.com/files/167481/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Cryptography-Issue.html
|
|
CVE-2022-28384 - http://packetstormsecurity.com/files/167499/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Risky-Crypto.html
|
|
CVE-2022-28384 - http://seclists.org/fulldisclosure/2022/Jun/17
|
|
CVE-2022-28384 - http://seclists.org/fulldisclosure/2022/Jun/8
|
|
CVE-2022-28384 - http://seclists.org/fulldisclosure/2022/Oct/3
|
|
CVE-2022-28384 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-001.txt
|
|
CVE-2022-28384 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-005.txt
|
|
CVE-2022-28384 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-043.txt
|
|
CVE-2022-28385 - http://packetstormsecurity.com/files/167536/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Insufficient-Verification.html
|
|
CVE-2022-28385 - http://packetstormsecurity.com/files/167546/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Insufficient-Verification.html
|
|
CVE-2022-28385 - http://seclists.org/fulldisclosure/2022/Jun/23
|
|
CVE-2022-28385 - http://seclists.org/fulldisclosure/2022/Jun/26
|
|
CVE-2022-28385 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-013.txt
|
|
CVE-2022-28385 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-017.txt
|
|
CVE-2022-28386 - http://packetstormsecurity.com/files/167492/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Passcode-Retry.html
|
|
CVE-2022-28386 - http://packetstormsecurity.com/files/167509/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Behavior-Violation.html
|
|
CVE-2022-28386 - http://seclists.org/fulldisclosure/2022/Jun/11
|
|
CVE-2022-28386 - http://seclists.org/fulldisclosure/2022/Jun/20
|
|
CVE-2022-28386 - http://seclists.org/fulldisclosure/2022/Oct/6
|
|
CVE-2022-28386 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-004.txt
|
|
CVE-2022-28386 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-008.txt
|
|
CVE-2022-28386 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-046.txt
|
|
CVE-2022-28387 - http://packetstormsecurity.com/files/167527/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html
|
|
CVE-2022-28387 - http://packetstormsecurity.com/files/167531/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html
|
|
CVE-2022-28387 - http://seclists.org/fulldisclosure/2022/Jun/13
|
|
CVE-2022-28387 - http://seclists.org/fulldisclosure/2022/Jun/21
|
|
CVE-2022-28387 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-009.txt
|
|
CVE-2022-28387 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-014.txt
|
|
CVE-2022-2839 - https://wpscan.com/vulnerability/82e01f95-81c2-46d8-898e-07b3b8a3f8c9
|
|
CVE-2022-28397 - https://ghost.org/docs/security/#privilege-escalation-attacks
|
|
CVE-2022-2840 - http://packetstormsecurity.com/files/168652/WordPress-Zephyr-Project-Manager-3.2.42-SQL-Injection.html
|
|
CVE-2022-2840 - https://wpscan.com/vulnerability/13d8be88-c3b7-4d6e-9792-c98b801ba53c
|
|
CVE-2022-2841 - https://www.modzero.com/advisories/MZ-22-02-CrowdStrike-FalconSensor.txt
|
|
CVE-2022-2841 - https://www.modzero.com/modlog/archives/2022/08/22/ridiculous_vulnerability_disclosure_process_with_crowdstrike_falcon_sensor/index.html
|
|
CVE-2022-2841 - https://youtu.be/3If-Fqwx-4s
|
|
CVE-2022-28410 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-4.md
|
|
CVE-2022-28411 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-5.md
|
|
CVE-2022-28412 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/car-driving-school-management-system/SQLi-1.md
|
|
CVE-2022-28413 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/car-driving-school-management-system/SQLi-2.md
|
|
CVE-2022-2845 - https://huntr.dev/bounties/3e1d31ac-1cfd-4a9f-bc5c-213376b69445
|
|
CVE-2022-28452 - https://github.com/YavuzSahbaz/Red-Planet-Laundry-Management-System-1.0-is-vulnerable-to-SQL
|
|
CVE-2022-28452 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-28452
|
|
CVE-2022-2846 - http://packetstormsecurity.com/files/171697/Calendar-Event-Multi-View-1.4.07-Cross-Site-Scripting.html
|
|
CVE-2022-2846 - https://wpscan.com/vulnerability/95f92062-08ce-478a-a2bc-6d026adf657c
|
|
CVE-2022-28463 - https://github.com/ImageMagick/ImageMagick/issues/4988
|
|
CVE-2022-28468 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Payroll-Management-System
|
|
CVE-2022-2847 - https://vuldb.com/?id.206489
|
|
CVE-2022-28471 - https://github.com/rockcarry/ffjpeg/issues/49
|
|
CVE-2022-28478 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28478
|
|
CVE-2022-28479 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28479
|
|
CVE-2022-28480 - https://packetstormsecurity.com/files/166465/ALLMediaServer-1.6-Remote-Buffer-Overflow.html
|
|
CVE-2022-28488 - https://github.com/marc-q/libwav/issues/29
|
|
CVE-2022-28488 - https://github.com/tin-z/Stuff_and_POCs/blob/main/poc_libwav/POC
|
|
CVE-2022-2849 - https://huntr.dev/bounties/389aeccd-deb9-49ae-9b6a-24c12d79b02e
|
|
CVE-2022-28491 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/2/2.md
|
|
CVE-2022-28492 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/8/8.md
|
|
CVE-2022-28494 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/5/5.md
|
|
CVE-2022-28495 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/3/3.md
|
|
CVE-2022-28506 - https://github.com/verf1sh/Poc/blob/master/asan_report_giflib.png
|
|
CVE-2022-28506 - https://github.com/verf1sh/Poc/blob/master/giflib_poc
|
|
CVE-2022-28506 - https://sourceforge.net/p/giflib/bugs/159/
|
|
CVE-2022-28507 - https://youtu.be/Ra7tWMs5dkk
|
|
CVE-2022-2852 - http://packetstormsecurity.com/files/169457/Chrome-AccountSelectionBubbleView-OnAccountImageFetched-Heap-Use-After-Free.html
|
|
CVE-2022-28521 - https://github.com/zhendezuile/bug_report/blob/main/zcms%EF%BC%9Aphp%20file%20inclusion
|
|
CVE-2022-28522 - https://github.com/zhendezuile/bug_report/blob/main/zcms
|
|
CVE-2022-2853 - http://packetstormsecurity.com/files/169459/Chrome-offline_items_collection-OfflineContentAggregator-OnItemRemoved-Heap-Buffer-Overflow.html
|
|
CVE-2022-28530 - https://packetstormsecurity.com/files/166481/Covid-19-Directory-On-Vaccination-System-1.0-SQL-Injection.html
|
|
CVE-2022-28531 - https://packetstormsecurity.com/files/166481/Covid-19-Directory-On-Vaccination-System-1.0-SQL-Injection.html
|
|
CVE-2022-28533 - https://packetstormsecurity.com/files/166539
|
|
CVE-2022-28560 - https://github.com/iot-firmeware/-Router-vulnerability/tree/main/Tenda%20AC9
|
|
CVE-2022-28561 - https://github.com/iot-firmeware/-Router-vulnerability/tree/main/AX12
|
|
CVE-2022-28571 - https://github.com/F0und-icu/TempName/tree/main/Dlink-882
|
|
CVE-2022-28571 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-28572 - https://github.com/F0und-icu/TempName/tree/main/TendaAX18
|
|
CVE-2022-28573 - https://github.com/F0und-icu/TempName/tree/main/Dlink-823pro
|
|
CVE-2022-28573 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-28575 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/1
|
|
CVE-2022-28577 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/3
|
|
CVE-2022-28578 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/2
|
|
CVE-2022-28579 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/4
|
|
CVE-2022-28580 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/5
|
|
CVE-2022-28581 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/9
|
|
CVE-2022-28582 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/6
|
|
CVE-2022-28583 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/7
|
|
CVE-2022-28584 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/8
|
|
CVE-2022-28586 - https://github.com/havok89/Hoosk/issues/63
|
|
CVE-2022-28589 - https://github.com/pixelimity/pixelimity/issues/23
|
|
CVE-2022-28598 - http://packetstormsecurity.com/files/171730/ERPNext-12.29-Cross-Site-Scripting.html
|
|
CVE-2022-28599 - https://github.com/daylightstudio/FUEL-CMS/issues/595
|
|
CVE-2022-28601 - https://github.com/FlaviuPopescu/CVE-2022-28601
|
|
CVE-2022-2862 - https://huntr.dev/bounties/71180988-1ab6-4311-bca8-e9a879b06765
|
|
CVE-2022-2863 - http://packetstormsecurity.com/files/168616/WordPress-WPvivid-Backup-Path-Traversal.html
|
|
CVE-2022-2863 - https://wpscan.com/vulnerability/cb6a3304-2166-47a0-a011-4dcacaa133e5
|
|
CVE-2022-28637 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us
|
|
CVE-2022-28638 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us
|
|
CVE-2022-28639 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us
|
|
CVE-2022-28640 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us
|
|
CVE-2022-28664 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1509
|
|
CVE-2022-28665 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1509
|
|
CVE-2022-28669 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28670 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28671 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28672 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28673 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28674 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28675 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28676 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28677 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28678 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28679 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28680 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28681 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28682 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28683 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-28689 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1521
|
|
CVE-2022-28703 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1532
|
|
CVE-2022-2871 - https://huntr.dev/bounties/61126c07-22ac-4961-a198-1aa33060b373
|
|
CVE-2022-28710 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1550
|
|
CVE-2022-28711 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1512
|
|
CVE-2022-28712 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1540
|
|
CVE-2022-2872 - https://huntr.dev/bounties/b966c74d-6f3f-49fe-b40a-eaf25e362c56
|
|
CVE-2022-2873 - https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/
|
|
CVE-2022-28739 - http://seclists.org/fulldisclosure/2022/Oct/30
|
|
CVE-2022-28739 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-28739 - http://seclists.org/fulldisclosure/2022/Oct/42
|
|
CVE-2022-2874 - https://huntr.dev/bounties/95f97dfe-247d-475d-9740-b7adc71f4c79
|
|
CVE-2022-2877 - https://wpscan.com/vulnerability/f1af4267-3a43-4b88-a8b9-c1d5b2aa9d68
|
|
CVE-2022-28770 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-28771 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-28772 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-28773 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-28774 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-28780 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
|
CVE-2022-28781 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
|
CVE-2022-28782 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
|
CVE-2022-28783 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
|
CVE-2022-28784 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
|
CVE-2022-28785 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
|
CVE-2022-28786 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
|
CVE-2022-28787 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
|
CVE-2022-28788 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
|
CVE-2022-28794 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-28795 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
|
CVE-2022-28796 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1
|
|
CVE-2022-28802 - https://www.zenity.io/blog/zapescape-vulnerability-disclosure/
|
|
CVE-2022-28805 - https://lua-users.org/lists/lua-l/2022-02/msg00001.html
|
|
CVE-2022-28805 - https://lua-users.org/lists/lua-l/2022-02/msg00070.html
|
|
CVE-2022-28805 - https://lua-users.org/lists/lua-l/2022-04/msg00009.html
|
|
CVE-2022-28810 - http://packetstormsecurity.com/files/166816/ManageEngine-ADSelfService-Plus-Custom-Script-Execution.html
|
|
CVE-2022-28810 - https://www.rapid7.com/blog/post/2022/04/14/cve-2022-28810-manageengine-adselfservice-plus-authenticated-command-execution-fixed/
|
|
CVE-2022-2884 - http://packetstormsecurity.com/files/171628/GitLab-15.3-Remote-Code-Execution.html
|
|
CVE-2022-2884 - https://gitlab.com/gitlab-org/gitlab/-/issues/371098
|
|
CVE-2022-2885 - https://huntr.dev/bounties/edeed309-be07-4373-b15e-2d1eb415eb89
|
|
CVE-2022-2886 - https://vuldb.com/?id.206688
|
|
CVE-2022-28862 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-28862 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html
|
|
CVE-2022-28863 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-28864 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-28865 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-28866 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-28866 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html
|
|
CVE-2022-28867 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-2887 - https://wpscan.com/vulnerability/237541d5-c1a5-44f2-8e5f-82457b8f9497
|
|
CVE-2022-2888 - https://huntr.dev/bounties/d27d232b-2578-4b32-b3b4-74aabdadf629
|
|
CVE-2022-28888 - http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.html
|
|
CVE-2022-28888 - http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html
|
|
CVE-2022-28888 - http://seclists.org/fulldisclosure/2022/Jul/4
|
|
CVE-2022-28888 - https://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/
|
|
CVE-2022-2889 - https://huntr.dev/bounties/d1ac9817-825d-49ce-b514-1d5b12b6bdaa
|
|
CVE-2022-28893 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a
|
|
CVE-2022-28895 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/1
|
|
CVE-2022-28895 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-28896 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/2
|
|
CVE-2022-28896 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-2890 - https://huntr.dev/bounties/5d228a33-eda3-4cff-91da-7bc43e6636da
|
|
CVE-2022-28901 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/3
|
|
CVE-2022-28901 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-28905 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/1
|
|
CVE-2022-28906 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/2
|
|
CVE-2022-28907 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/5
|
|
CVE-2022-28908 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/4
|
|
CVE-2022-28909 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/3
|
|
CVE-2022-28910 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/9
|
|
CVE-2022-28911 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/7
|
|
CVE-2022-28912 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/8
|
|
CVE-2022-28913 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/10
|
|
CVE-2022-28915 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/1
|
|
CVE-2022-28915 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-28917 - https://github.com/NSSCYCTFER/SRC-CVE
|
|
CVE-2022-28921 - https://www.0xlanks.me/blog/cve-2022-28921-advisory/
|
|
CVE-2022-28924 - https://suumcuique.org/blog/posts/information-disclosure-vulnerability-universis
|
|
CVE-2022-28927 - https://gist.github.com/CwithW/01a726e5af709655d6ee0b2067cdae03
|
|
CVE-2022-28932 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-28944 - https://github.com/gerr-re/cve-2022-28944/blob/main/cve-2022-28944_public-advisory.pdf
|
|
CVE-2022-28955 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-28956 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-28958 - https://vulncheck.com/blog/moobot-uses-fake-vulnerability
|
|
CVE-2022-28959 - https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/
|
|
CVE-2022-28960 - https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/
|
|
CVE-2022-28961 - https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/
|
|
CVE-2022-28962 - https://packetstormsecurity.com/files/166598/Online-Sports-Complex-Booking-System-1.0-SQL-Injection.html
|
|
CVE-2022-28966 - https://github.com/wasm3/wasm3/issues/320
|
|
CVE-2022-28969 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/fromSetWifiGusetBasic
|
|
CVE-2022-28970 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/GetParentControlInfo/readme.md
|
|
CVE-2022-28971 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/fromSetIpMacBind/readme.md
|
|
CVE-2022-28972 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/form_fast_setting_wifi_set/readme.md
|
|
CVE-2022-28973 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/fromAdvSetMacMtuWan/readme.md
|
|
CVE-2022-28975 - https://piotrryciak.com/posts/xss-infoblox/
|
|
CVE-2022-28979 - https://issues.liferay.com/browse/LPE-17381
|
|
CVE-2022-28986 - https://github.com/FlaviuPopescu/CVE-2022-28986
|
|
CVE-2022-28987 - https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/adselfservice-userenum.md
|
|
CVE-2022-28990 - https://github.com/wasm3/wasm3/issues/323
|
|
CVE-2022-28991 - https://packetstormsecurity.com/files/166590/Multi-Store-Inventory-Management-System-1.0-Information-Disclosure.html
|
|
CVE-2022-28992 - https://packetstormsecurity.com/files/166587/Online-Banquet-Booking-System-1.0-Cross-Site-Request-Forgery.html
|
|
CVE-2022-28993 - https://packetstormsecurity.com/files/166591/Multi-Store-Inventory-Management-System-1.0-Account-Takeover.html
|
|
CVE-2022-28994 - https://packetstormsecurity.com/files/166622/Small-HTTP-Server-3.06-Remote-Buffer-Overflow.html
|
|
CVE-2022-28997 - https://packetstormsecurity.com/files/166613/CSZCMS-1.3.0-SSRF-LFI-Remote-Code-Execution.html
|
|
CVE-2022-28998 - https://packetstormsecurity.com/files/166381/Xlight-FTP-3.9.3.2-Buffer-Overflow.html
|
|
CVE-2022-29002 - https://github.com/xuxueli/xxl-job/issues/2821
|
|
CVE-2022-29006 - https://www.exploit-db.com/exploits/50370
|
|
CVE-2022-29007 - https://www.exploit-db.com/exploits/50365
|
|
CVE-2022-29008 - https://www.exploit-db.com/exploits/50263
|
|
CVE-2022-29009 - https://www.exploit-db.com/exploits/50355
|
|
CVE-2022-2901 - https://huntr.dev/bounties/cf46e0a6-f1b5-4959-a952-be9e4bac03fe
|
|
CVE-2022-29013 - https://packetstormsecurity.com/files/166684/Razer-Sila-2.0.418-Command-Injection.html
|
|
CVE-2022-29013 - https://www.exploit-db.com/exploits/50865
|
|
CVE-2022-29014 - https://packetstormsecurity.com/files/166683/Razer-Sila-2.0.418-Local-File-Inclusion.html
|
|
CVE-2022-29014 - https://www.exploit-db.com/exploits/50864
|
|
CVE-2022-29017 - https://github.com/axiomatic-systems/Bento4/issues/691
|
|
CVE-2022-29021 - https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities
|
|
CVE-2022-29022 - https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities
|
|
CVE-2022-29023 - https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities
|
|
CVE-2022-2903 - https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864
|
|
CVE-2022-29034 - http://packetstormsecurity.com/files/167554/SIEMENS-SINEMA-Remote-Connect-3.0.1.0-01.01.00.02-Cross-Site-Scripting.html
|
|
CVE-2022-29034 - http://seclists.org/fulldisclosure/2022/Jun/35
|
|
CVE-2022-29072 - http://packetstormsecurity.com/files/166763/7-Zip-21.07-Code-Execution-Privilege-Escalation.html
|
|
CVE-2022-29072 - https://github.com/kagancapar/CVE-2022-29072
|
|
CVE-2022-29072 - https://news.ycombinator.com/item?id=31070256
|
|
CVE-2022-29072 - https://www.youtube.com/watch?v=sT1cvbu7ZTA
|
|
CVE-2022-29078 - https://eslam.io/posts/ejs-server-side-template-injection-rce/
|
|
CVE-2022-29080 - https://github.com/barneycarroll/npm-dependency-versions/issues/6
|
|
CVE-2022-29081 - https://www.tenable.com/security/research/tra-2022-14
|
|
CVE-2022-2909 - https://vuldb.com/?id.206845
|
|
CVE-2022-2912 - https://wpscan.com/vulnerability/fd9853e8-b3ae-4a10-8389-8a4a11a8297c
|
|
CVE-2022-2913 - https://wpscan.com/vulnerability/5231ac18-ea9a-4bb9-af9f-e3d95a3b54f1
|
|
CVE-2022-29156 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12
|
|
CVE-2022-29181 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-29181 - https://securitylab.github.com/advisories/GHSL-2022-031_GHSL-2022-032_Nokogiri/
|
|
CVE-2022-2921 - https://huntr.dev/bounties/51b32a1c-946b-4390-a212-b6c4b6e4115c
|
|
CVE-2022-29217 - https://github.com/jpadilla/pyjwt/commit/9c528670c455b8d948aff95ed50e22940d1ad3fc
|
|
CVE-2022-29217 - https://github.com/jpadilla/pyjwt/security/advisories/GHSA-ffqj-6fqr-9h24
|
|
CVE-2022-2922 - https://huntr.dev/bounties/74918f40-dc11-4218-abef-064eb71a0703
|
|
CVE-2022-29224 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-m4j9-86g3-8f49
|
|
CVE-2022-29225 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-75hv-2jjj-89hh
|
|
CVE-2022-29226 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-h45c-2f94-prxh
|
|
CVE-2022-29227 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-rm2p-qvf6-pvr6
|
|
CVE-2022-29228 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-rww6-8h7g-8jf6
|
|
CVE-2022-2923 - https://huntr.dev/bounties/fd3a3ab8-ab0f-452f-afea-8c613e283fd2
|
|
CVE-2022-2924 - https://huntr.dev/bounties/f0f3aded-6e97-4cf2-980a-c90f2c6ca0e0
|
|
CVE-2022-2925 - https://huntr.dev/bounties/a3b4148f-165f-4583-abed-5568696d99dc
|
|
CVE-2022-2926 - https://wpscan.com/vulnerability/2a440e1a-a7e4-4106-839a-d93895e16785
|
|
CVE-2022-29269 - https://github.com/4LPH4-NL/CVEs
|
|
CVE-2022-29269 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi
|
|
CVE-2022-2927 - https://huntr.dev/bounties/7fa956dd-f541-4dcd-987d-ba15caa6a886
|
|
CVE-2022-29270 - https://github.com/4LPH4-NL/CVEs
|
|
CVE-2022-29270 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi
|
|
CVE-2022-29271 - https://github.com/4LPH4-NL/CVEs
|
|
CVE-2022-29271 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi
|
|
CVE-2022-29272 - https://github.com/4LPH4-NL/CVEs
|
|
CVE-2022-29272 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi
|
|
CVE-2022-29287 - https://devnet.kentico.com/download/hotfixes
|
|
CVE-2022-29296 - http://packetstormsecurity.com/files/167341/Avantune-Genialcloud-ProJ-10-Cross-Site-Scripting.html
|
|
CVE-2022-29296 - https://dl.packetstormsecurity.net/2206-exploits/avantunegenialcloudproj10-xss.txt
|
|
CVE-2022-29298 - http://packetstormsecurity.com/files/167383/SolarView-Compact-6.00-Directory-Traversal.html
|
|
CVE-2022-2930 - https://huntr.dev/bounties/da6745e4-7bcc-4e9a-9e96-0709ec9f2477
|
|
CVE-2022-29303 - http://packetstormsecurity.com/files/167183/SolarView-Compact-6.0-Command-Injection.html
|
|
CVE-2022-29303 - https://drive.google.com/drive/folders/1tGr-WExbpfvhRg31XCoaZOFLWyt3r60g?usp=sharing
|
|
CVE-2022-29305 - https://github.com/helloxz/imgurl/issues/75
|
|
CVE-2022-29315 - https://the-it-wonders.blogspot.com/2022/04/csv-injection-in-acunetix-version.html
|
|
CVE-2022-2932 - https://huntr.dev/bounties/2-other-bustle/mobiledoc-kit
|
|
CVE-2022-29320 - https://www.exploit-db.com/exploits/50859
|
|
CVE-2022-29321 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/4
|
|
CVE-2022-29321 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-29322 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/5
|
|
CVE-2022-29322 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-29323 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/3
|
|
CVE-2022-29323 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-29324 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/6
|
|
CVE-2022-29324 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-29325 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/8
|
|
CVE-2022-29325 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-29326 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/7
|
|
CVE-2022-29326 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-29327 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/9
|
|
CVE-2022-29327 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-29328 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dap-1330/1
|
|
CVE-2022-29328 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-29329 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dap-1330/2
|
|
CVE-2022-29329 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-29332 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/d-link_dir-825_R2.pdf
|
|
CVE-2022-29333 - https://www.youtube.com/watch?v=r75k-ae3_ng
|
|
CVE-2022-29333 - https://youtu.be/B46wtd-ZNog
|
|
CVE-2022-29339 - https://github.com/gpac/gpac/issues/2165
|
|
CVE-2022-29340 - https://github.com/gpac/gpac/issues/2163
|
|
CVE-2022-29347 - https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2022-29347
|
|
CVE-2022-29349 - https://github.com/kekingcn/kkFileView/issues/347
|
|
CVE-2022-29351 - https://www.youtube.com/watch?v=F_DBx4psWns
|
|
CVE-2022-29358 - https://github.com/kevinboone/epub2txt2/issues/22
|
|
CVE-2022-29360 - https://blog.sonarsource.com/rainloop-emails-at-risk-due-to-code-flaw/
|
|
CVE-2022-29363 - https://github.com/qinggan/phpok/issues/12
|
|
CVE-2022-29368 - https://github.com/Moddable-OpenSource/moddable/issues/896
|
|
CVE-2022-29369 - https://github.com/nginx/njs/issues/467
|
|
CVE-2022-2938 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a06247c6804f1a7c86a2e5398a4c1f1db1471848
|
|
CVE-2022-29380 - https://www.exploit-db.com/exploits/49298
|
|
CVE-2022-29391 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/5.setStaticDhcpConfig
|
|
CVE-2022-29392 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/2.setPortForwardRules
|
|
CVE-2022-29393 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/3.setIpQosRules
|
|
CVE-2022-29394 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/1.setWiFiAclAddConfig
|
|
CVE-2022-29395 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/6.setWiFiRepeaterConfig
|
|
CVE-2022-29396 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/8.setIpPortFilterRules
|
|
CVE-2022-29397 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/4.setMacFilterRules
|
|
CVE-2022-29398 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/7.UploadCustomModule
|
|
CVE-2022-29399 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/9.setUrlFilterRules
|
|
CVE-2022-2941 - http://packetstormsecurity.com/files/168479/WordPress-WP-UserOnline-2.88.0-Cross-Site-Scripting.html
|
|
CVE-2022-2941 - https://packetstormsecurity.com/files/168479/wpuseronline2880-xss.txt
|
|
CVE-2022-2943 - https://gist.github.com/Xib3rR4dAr/f9a4b4838154854ec6cde7d5deb76bf9
|
|
CVE-2022-2945 - https://gist.github.com/Xib3rR4dAr/f9a4b4838154854ec6cde7d5deb76bf9
|
|
CVE-2022-29455 - https://rotem-bar.com/hacking-65-million-websites-greater-cve-2022-29455-elementor
|
|
CVE-2022-29457 - http://packetstormsecurity.com/files/167051/ManageEngine-ADSelfService-Plus-Build-6118-NTLMv2-Hash-Exposure.html
|
|
CVE-2022-29458 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-29458 - https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
|
|
CVE-2022-29458 - https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
|
|
CVE-2022-2946 - https://huntr.dev/bounties/5d389a18-5026-47df-a5d0-1548a9b555d5
|
|
CVE-2022-29464 - http://packetstormsecurity.com/files/166921/WSO-Arbitrary-File-Upload-Remote-Code-Execution.html
|
|
CVE-2022-29464 - http://www.openwall.com/lists/oss-security/2022/04/22/7
|
|
CVE-2022-29464 - https://github.com/hakivvi/CVE-2022-29464
|
|
CVE-2022-29465 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1526
|
|
CVE-2022-29468 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1534
|
|
CVE-2022-2947 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01
|
|
CVE-2022-29472 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1566
|
|
CVE-2022-29475 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1553
|
|
CVE-2022-29477 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1554
|
|
CVE-2022-29481 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1518
|
|
CVE-2022-2949 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01
|
|
CVE-2022-29496 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1524
|
|
CVE-2022-2950 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01
|
|
CVE-2022-29503 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1517
|
|
CVE-2022-2951 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01
|
|
CVE-2022-29511 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1530
|
|
CVE-2022-29517 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1529
|
|
CVE-2022-29520 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1561
|
|
CVE-2022-2953 - https://gitlab.com/libtiff/libtiff/-/issues/414
|
|
CVE-2022-29537 - https://github.com/gpac/gpac/issues/2173
|
|
CVE-2022-29538 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-29539 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-29540 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-29548 - http://packetstormsecurity.com/files/167587/WSO2-Management-Console-Cross-Site-Scripting.html
|
|
CVE-2022-29549 - http://packetstormsecurity.com/files/168367/Qualys-Cloud-Agent-Arbitrary-Code-Execution.html
|
|
CVE-2022-29549 - https://blog.qualys.com/vulnerabilities-threat-research
|
|
CVE-2022-29550 - http://packetstormsecurity.com/files/168367/Qualys-Cloud-Agent-Arbitrary-Code-Execution.html
|
|
CVE-2022-29550 - https://blog.qualys.com/vulnerabilities-threat-research
|
|
CVE-2022-29557 - https://github.com/Q2Flc2FySec/CVE-List/blob/main/CVE-2022-29557.txt
|
|
CVE-2022-29566 - https://blog.trailofbits.com/2022/04/13/part-1-coordinated-disclosure-of-vulnerabilities-affecting-girault-bulletproofs-and-plonk/
|
|
CVE-2022-29577 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-2958 - https://wpscan.com/vulnerability/8743534f-8ebd-496a-99bc-5052a8bac86a
|
|
CVE-2022-29581 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
|
|
CVE-2022-29581 - http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
|
|
CVE-2022-29581 - http://www.openwall.com/lists/oss-security/2022/05/18/2
|
|
CVE-2022-29581 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8
|
|
CVE-2022-29582 - http://www.openwall.com/lists/oss-security/2022/04/22/4
|
|
CVE-2022-29582 - http://www.openwall.com/lists/oss-security/2022/08/08/3
|
|
CVE-2022-29582 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.3
|
|
CVE-2022-29582 - https://www.openwall.com/lists/oss-security/2022/04/22/3
|
|
CVE-2022-29586 - https://sec-consult.com/vulnerability-lab/advisory/sandbox-escape-with-root-access-clear-text-passwords-in-konica-minolta-bizhub-mfp-printer-terminals/
|
|
CVE-2022-29587 - https://sec-consult.com/vulnerability-lab/advisory/sandbox-escape-with-root-access-clear-text-passwords-in-konica-minolta-bizhub-mfp-printer-terminals/
|
|
CVE-2022-29588 - http://packetstormsecurity.com/files/167166/Konica-Minolta-bizhub-MFP-Printer-Terminal-Sandbox-Escape.html
|
|
CVE-2022-2959 - https://github.com/torvalds/linux/commit/189b0ddc245139af81198d1a3637cac74f96e13a
|
|
CVE-2022-29592 - https://github.com/H4niz/Vulnerability/blob/main/Tenda-TX9-V22.03.02.10-19042022-3.md
|
|
CVE-2022-29593 - http://packetstormsecurity.com/files/167868/Dingtian-DT-R002-3.1.276A-Authentication-Bypass.html
|
|
CVE-2022-29593 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-29593-authentication-bypass-by-capture-replay-dingtian-dt-r002/
|
|
CVE-2022-29593 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/
|
|
CVE-2022-29596 - https://github.com/haxpunk1337/Microstrategy-Poc/blob/main/poc
|
|
CVE-2022-29597 - https://github.com/TheGetch/CVE-2022-29597
|
|
CVE-2022-29598 - https://github.com/TheGetch/CVE-2022-29598
|
|
CVE-2022-29603 - https://suumcuique.org/blog/posts/sql-injection-vulnerability-universis/
|
|
CVE-2022-29610 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-29611 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-29612 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-29613 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-29614 - http://packetstormsecurity.com/files/168409/SAP-SAPControl-Web-Service-Interface-Local-Privilege-Escalation.html
|
|
CVE-2022-29614 - http://seclists.org/fulldisclosure/2022/Sep/18
|
|
CVE-2022-29614 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-29615 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-29616 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-29618 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-29619 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-29620 - https://whichbuffer.medium.com/filezilla-client-cleartext-storage-of-sensitive-information-in-memory-vulnerability-83958c1e1643
|
|
CVE-2022-29620 - https://youtu.be/ErZl1i7McHk
|
|
CVE-2022-29622 - https://medium.com/@zsolt.imre/is-cybersecurity-the-next-supply-chain-vulnerability-9a00de745022
|
|
CVE-2022-29622 - https://www.youtube.com/watch?v=C6QPKooxhAo
|
|
CVE-2022-29631 - https://github.com/oblac/jodd-http/issues/9
|
|
CVE-2022-29631 - https://github.com/oblac/jodd/issues/787
|
|
CVE-2022-29633 - https://github.com/awake1t/linglong
|
|
CVE-2022-29638 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/2.md
|
|
CVE-2022-29640 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/3.md
|
|
CVE-2022-29641 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/4.md
|
|
CVE-2022-29642 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/5.md
|
|
CVE-2022-29643 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/6.md
|
|
CVE-2022-29646 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/9.md
|
|
CVE-2022-2965 - https://huntr.dev/bounties/61e3bdf7-3548-45ea-b105-967abc0977f4
|
|
CVE-2022-29650 - https://hackmd.io/@d4rkp0w4r/Online_Food_Ordering_System_Unauthenticated_Sql_Injection
|
|
CVE-2022-29651 - https://hackmd.io/@d4rkp0w4r/Online_Food_Ordering_System_Remote_Code_Execution
|
|
CVE-2022-29652 - https://packetstormsecurity.com/files/166641/Online-Sports-Complex-Booking-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2022-29654 - https://gist.github.com/naihsin/b96e2c5c2c81621b46557fd7aacd165f
|
|
CVE-2022-29659 - https://packetstormsecurity.com/files/158391/responsiveonlineblog10poc-sql.txt
|
|
CVE-2022-29660 - https://github.com/chshcms/cscms/issues/25#issue-1207649017
|
|
CVE-2022-29661 - https://github.com/chshcms/cscms/issues/21#issue-1207638326
|
|
CVE-2022-29663 - https://github.com/chshcms/cscms/issues/22#issue-1207641519
|
|
CVE-2022-29664 - https://github.com/chshcms/cscms/issues/23#issue-1207644525
|
|
CVE-2022-29666 - https://github.com/chshcms/cscms/issues/24#issue-1207646618
|
|
CVE-2022-29667 - https://github.com/chshcms/cscms/issues/26#issue-1207651726
|
|
CVE-2022-29669 - https://github.com/chshcms/cscms/issues/20#issue-1207634969
|
|
CVE-2022-29670 - https://github.com/chshcms/cscms/issues/21#issue-1207638326
|
|
CVE-2022-29676 - https://github.com/chshcms/cscms/issues/24#issue-1207646618
|
|
CVE-2022-29680 - https://github.com/chshcms/cscms/issues/31#issue-1209052957
|
|
CVE-2022-29681 - https://github.com/chshcms/cscms/issues/35#issue-1209058818
|
|
CVE-2022-29682 - https://github.com/chshcms/cscms/issues/36#issue-1209060196
|
|
CVE-2022-29683 - https://github.com/chshcms/cscms/issues/34#issue-1209056912
|
|
CVE-2022-29684 - https://github.com/chshcms/cscms/issues/33#issue-1209055493
|
|
CVE-2022-29685 - https://github.com/chshcms/cscms/issues/32#issue-1209054307
|
|
CVE-2022-29686 - https://github.com/chshcms/cscms/issues/29#issue-1209046027
|
|
CVE-2022-29687 - https://github.com/chshcms/cscms/issues/30#issue-1209049714
|
|
CVE-2022-29688 - https://github.com/chshcms/cscms/issues/27#issue-1209040138
|
|
CVE-2022-29689 - https://github.com/chshcms/cscms/issues/28#issue-1209044410
|
|
CVE-2022-29692 - https://github.com/unicorn-engine/unicorn/issues/1578
|
|
CVE-2022-29693 - https://github.com/unicorn-engine/unicorn/issues/1586
|
|
CVE-2022-29694 - https://github.com/unicorn-engine/unicorn/issues/1588
|
|
CVE-2022-29695 - https://github.com/unicorn-engine/unicorn/issues/1595
|
|
CVE-2022-29704 - https://www.youtube.com/watch?v=ECTu2QVAl1c
|
|
CVE-2022-29709 - https://packetstormsecurity.com/files/167240/CLink-Office-2.0-SQL-Injection.html
|
|
CVE-2022-29721 - https://github.com/PAINCLOWN/74cmsSE-Arbitrary-File-Reading/issues/2
|
|
CVE-2022-29727 - http://packetstormsecurity.com/files/167187/Survey-Sparrow-Enterprise-Survey-Software-2022-Cross-Site-Scripting.html
|
|
CVE-2022-29729 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5701.php
|
|
CVE-2022-29730 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5705.php
|
|
CVE-2022-29731 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5700.php
|
|
CVE-2022-29732 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5703.php
|
|
CVE-2022-29733 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5704.php
|
|
CVE-2022-29734 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5699.php
|
|
CVE-2022-29735 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5702.php
|
|
CVE-2022-2977 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d8e7007dc7c4d7c8366739bbcd3f5e51dcd470f
|
|
CVE-2022-29770 - https://github.com/xuxueli/xxl-job/issues/2836
|
|
CVE-2022-29776 - https://github.com/moehw/poc_exploits/tree/master/CVE-2022-29776
|
|
CVE-2022-29777 - https://github.com/moehw/poc_exploits/tree/master/CVE-2022-29777
|
|
CVE-2022-29778 - https://github.com/TyeYeah/DIR-890L-1.20-RCE
|
|
CVE-2022-29778 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-29779 - https://github.com/nginx/njs/issues/485
|
|
CVE-2022-29780 - https://github.com/nginx/njs/issues/486
|
|
CVE-2022-2980 - https://huntr.dev/bounties/6e7b12a5-242c-453d-b39e-9625d563b0ea
|
|
CVE-2022-29804 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
|
|
CVE-2022-29806 - http://packetstormsecurity.com/files/166980/ZoneMinder-Language-Settings-Remote-Code-Execution.html
|
|
CVE-2022-29806 - https://krastanoel.com/cve/2022-29806
|
|
CVE-2022-2981 - https://wpscan.com/vulnerability/30ce32ce-161c-4388-8d22-751350b7b305
|
|
CVE-2022-2982 - https://huntr.dev/bounties/53f53d9a-ba8a-4985-b7ba-23efbe6833be
|
|
CVE-2022-29824 - http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
|
|
CVE-2022-29824 - http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html
|
|
CVE-2022-29824 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-29825 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
|
CVE-2022-29826 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
|
CVE-2022-29827 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
|
CVE-2022-29828 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
|
CVE-2022-29829 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
|
CVE-2022-2983 - https://wpscan.com/vulnerability/e2af8c7f-9bd4-4902-8df8-72ffb414fdbf
|
|
CVE-2022-29830 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
|
CVE-2022-29831 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
|
CVE-2022-29832 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
|
CVE-2022-29833 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
|
CVE-2022-29835 - https://www.westerndigital.com/support/product-security/wdc-22014-wd-discovery-desktop-app-version-4-4-396
|
|
CVE-2022-29836 - https://www.westerndigital.com/support/product-security/wdc-22016-my-cloud-home-ibi-firmware-version-8-11-0-113
|
|
CVE-2022-29837 - https://www.westerndigital.com/support/product-security/wdc-22018-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-8-12-0-178
|
|
CVE-2022-29838 - https://www.westerndigital.com/support/product-security/wdc-22019-my-cloud-firmware-version-5-25-124
|
|
CVE-2022-29839 - https://www.westerndigital.com/support/product-security/wdc-22019-my-cloud-firmware-version-5-25-124
|
|
CVE-2022-29840 - https://www.westerndigital.com/support/product-security
|
|
CVE-2022-29841 - https://www.westerndigital.com/support/product-security/wdc-23002-my-cloud-firmware-version-5-26-119
|
|
CVE-2022-29842 - https://www.westerndigital.com/support/product-security/wdc-23002-my-cloud-firmware-version-5-26-119
|
|
CVE-2022-29851 - https://packetstormsecurity.com/files/168242/OX-App-Suite-Cross-Site-Scripting-Command-Injection.html
|
|
CVE-2022-29854 - http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html
|
|
CVE-2022-29854 - http://seclists.org/fulldisclosure/2022/Jun/32
|
|
CVE-2022-29854 - https://www.syss.de/pentest-blog/undocumented-functionality-backdoor-in-mitel-desk-phones-syss-2022-021
|
|
CVE-2022-29855 - http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html
|
|
CVE-2022-29855 - http://seclists.org/fulldisclosure/2022/Jun/32
|
|
CVE-2022-29855 - https://www.syss.de/pentest-blog/undocumented-functionality-backdoor-in-mitel-desk-phones-syss-2022-021
|
|
CVE-2022-29856 - https://dolosgroup.io/blog
|
|
CVE-2022-29858 - https://huntr.dev/bounties/90e17d95-9f2f-44eb-9f26-49fa13a41d5a/
|
|
CVE-2022-29862 - https://opcfoundation.org/security/
|
|
CVE-2022-29863 - https://opcfoundation.org/security/
|
|
CVE-2022-29864 - https://opcfoundation.org/security/
|
|
CVE-2022-29865 - https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29865.pdf
|
|
CVE-2022-29865 - https://opcfoundation.org/security/
|
|
CVE-2022-29866 - https://opcfoundation.org/security/
|
|
CVE-2022-2987 - https://wpscan.com/vulnerability/0d9638b9-bf8a-474f-992d-2618884d3f67
|
|
CVE-2022-29875 - https://www.siemens-healthineers.com/support-documentation/cybersecurity/shsa-455016
|
|
CVE-2022-29885 - http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html
|
|
CVE-2022-29885 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-29886 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1533
|
|
CVE-2022-29888 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1522
|
|
CVE-2022-29889 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1569
|
|
CVE-2022-2989 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
|
|
CVE-2022-29894 - https://github.com/strapi/strapi
|
|
CVE-2022-2990 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
|
|
CVE-2022-29909 - https://bugzilla.mozilla.org/show_bug.cgi?id=1755081
|
|
CVE-2022-29912 - https://bugzilla.mozilla.org/show_bug.cgi?id=1692655
|
|
CVE-2022-29914 - https://bugzilla.mozilla.org/show_bug.cgi?id=1746448
|
|
CVE-2022-29915 - https://bugzilla.mozilla.org/show_bug.cgi?id=1751678
|
|
CVE-2022-29916 - https://bugzilla.mozilla.org/show_bug.cgi?id=1760674
|
|
CVE-2022-2992 - http://packetstormsecurity.com/files/171008/GitLab-GitHub-Repo-Import-Deserialization-Remote-Code-Execution.html
|
|
CVE-2022-29932 - https://github.com/Off3nS3c/CVE-2022-29932/blob/main/Proof-of-Concept.md
|
|
CVE-2022-29933 - http://packetstormsecurity.com/files/166989/Craft-CMS-3.7.36-Password-Reset-Poisoning-Attack.html
|
|
CVE-2022-29933 - https://sec-consult.com/vulnerability-lab/advisory/password-reset-poisoning-attack-craft-cms/
|
|
CVE-2022-29938 - https://nitroteam.kz/index.php?action=researches&slug=librehealth_r
|
|
CVE-2022-29939 - https://nitroteam.kz/index.php?action=researches&slug=librehealth_r
|
|
CVE-2022-29940 - https://nitroteam.kz/index.php?action=researches&slug=librehealth_r
|
|
CVE-2022-29945 - https://www.theverge.com/2022/4/28/23046916/dji-aeroscope-signals-not-encrypted-drone-tracking
|
|
CVE-2022-29948 - http://packetstormsecurity.com/files/167550/Lepin-EP-KP001-KP001_V19-Authentication-Bypass.html
|
|
CVE-2022-29948 - http://seclists.org/fulldisclosure/2022/Jun/27
|
|
CVE-2022-29948 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-024.txt
|
|
CVE-2022-2995 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
|
|
CVE-2022-29950 - https://gist.github.com/Voidager88/73c2d512a72cceb0ef84dbf87a497d10
|
|
CVE-2022-29951 - https://www.forescout.com/blog/
|
|
CVE-2022-29952 - https://www.forescout.com/blog/
|
|
CVE-2022-29953 - https://www.forescout.com/blog/
|
|
CVE-2022-29957 - https://www.forescout.com/blog/
|
|
CVE-2022-29958 - https://www.forescout.com/blog/
|
|
CVE-2022-29959 - https://www.forescout.com/blog/
|
|
CVE-2022-29960 - https://www.forescout.com/blog/
|
|
CVE-2022-29962 - https://www.forescout.com/blog/
|
|
CVE-2022-29963 - https://www.forescout.com/blog/
|
|
CVE-2022-29964 - https://www.forescout.com/blog/
|
|
CVE-2022-29965 - https://www.forescout.com/blog/
|
|
CVE-2022-2997 - https://huntr.dev/bounties/c09bf21b-50d2-49f0-8c92-49f6b3c358d8
|
|
CVE-2022-29971 - https://www.magnitude.com/products/data-connectivity
|
|
CVE-2022-29972 - https://www.magnitude.com/products/data-connectivity
|
|
CVE-2022-29975 - https://github.com/haxpunk1337/MDaemon-/blob/main/MDaemon%20XSS%20at%20CC%20endpoint
|
|
CVE-2022-29976 - https://github.com/haxpunk1337/MDaemon-/blob/main/MDaemon%20XSS%20at%20BCC%20endpoint
|
|
CVE-2022-29977 - https://github.com/saitoha/libsixel/issues/165
|
|
CVE-2022-29978 - https://github.com/saitoha/libsixel/issues/166
|
|
CVE-2022-3000 - https://huntr.dev/bounties/a060d3dd-6fdd-4958-82a9-364df1cb770c
|
|
CVE-2022-30003 - https://packetstormsecurity.com/files/168250/omps10-xss.txt
|
|
CVE-2022-30004 - https://packetstormsecurity.com/files/168249/Online-Market-Place-Site-1.0-SQL-Injection.html
|
|
CVE-2022-30014 - https://github.com/offsecin/bugsdisclose/blob/main/csrf
|
|
CVE-2022-3002 - https://huntr.dev/bounties/d213d7ea-fe92-40b2-a1f9-2ba32dec50f5
|
|
CVE-2022-30036 - https://parzival.sh/posts/Pwning-a-Lighting-Console-in-a-Few-Minutes/
|
|
CVE-2022-30037 - https://weltolk.github.io/p/xunruicms-v4.3.3-to-v4.5.1-backstage-code-injection-vulnerabilityfile-write-and-file-inclusion/
|
|
CVE-2022-3004 - https://huntr.dev/bounties/461e5f8f-17cf-4be4-9149-111d0bd92d14
|
|
CVE-2022-30040 - https://github.com/Le1a/CVE-2022-30040
|
|
CVE-2022-30040 - https://github.com/Le1a/Tenda-AX1803-Denial-of-service
|
|
CVE-2022-30045 - https://sourceforge.net/p/ezxml/bugs/29/
|
|
CVE-2022-3005 - https://huntr.dev/bounties/4b144433-a979-4c4e-a627-659838acc217
|
|
CVE-2022-30052 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/acetech/2022/Home-Clean-Service-System
|
|
CVE-2022-30053 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Toll-Tax-Management-System
|
|
CVE-2022-30054 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Covid-19-Travel-Pass-Management
|
|
CVE-2022-30055 - https://packetstormsecurity.com/files/166840/Prime95-30.7-Build-9-Buffer-Overflow.html
|
|
CVE-2022-30067 - https://gitlab.gnome.org/GNOME/gimp/-/issues/8120
|
|
CVE-2022-30075 - http://packetstormsecurity.com/files/167522/TP-Link-AX50-Remote-Code-Execution.html
|
|
CVE-2022-30075 - https://github.com/aaronsvk
|
|
CVE-2022-30075 - https://github.com/aaronsvk/CVE-2022-30075
|
|
CVE-2022-30075 - https://www.exploit-db.com/exploits/50962
|
|
CVE-2022-30076 - http://packetstormsecurity.com/files/171777/ENTAB-ERP-1.0-Information-Disclosure.html
|
|
CVE-2022-30078 - https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30078/CVE-2022-30078.md
|
|
CVE-2022-30079 - https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30079/CVE-2022-30079.md
|
|
CVE-2022-3008 - https://github.com/syoyo/tinygltf/issues/368
|
|
CVE-2022-30105 - https://www.exploitee.rs/index.php/Belkin_N300#Remote_Root
|
|
CVE-2022-30111 - https://tiger-team-1337.blogspot.com/2022/05/rf-remote-mck-lock-predictable-rolling.html
|
|
CVE-2022-30111 - https://www.youtube.com/watch?v=EruaGuE-cWI
|
|
CVE-2022-30114 - https://str0ng4le.github.io/jekyll/update/2023/05/12/fastgate-bof-cve-2022-30114/
|
|
CVE-2022-3012 - https://vuldb.com/?id.207422
|
|
CVE-2022-30126 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-3013 - https://vuldb.com/?id.207423
|
|
CVE-2022-3014 - https://vuldb.com/?id.207424
|
|
CVE-2022-3015 - https://vuldb.com/?id.207425
|
|
CVE-2022-30150 - http://packetstormsecurity.com/files/167697/Windows-Defender-Remote-Credential-Guard-Authentication-Relay-Privilege-Escalation.html
|
|
CVE-2022-30155 - http://packetstormsecurity.com/files/167755/Windows-Kernel-nt-MiRelocateImage-Invalid-Read.html
|
|
CVE-2022-3016 - https://huntr.dev/bounties/260516c2-5c4a-4b7f-a01c-04b1aeeea371
|
|
CVE-2022-30164 - http://packetstormsecurity.com/files/167716/Windows-Kerberos-KerbRetrieveEncodedTicketMessage-AppContainer-Privilege-Escalation.html
|
|
CVE-2022-30165 - http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html
|
|
CVE-2022-30166 - http://packetstormsecurity.com/files/167754/Windows-LSA-Service-LsapGetClientInfo-Impersonation-Level-Check-Privilege-Escalation.html
|
|
CVE-2022-30168 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-30168
|
|
CVE-2022-3017 - https://huntr.dev/bounties/5250c4b1-132b-4da6-9bd6-db36cb56bea0
|
|
CVE-2022-30174 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-30174
|
|
CVE-2022-30190 - http://packetstormsecurity.com/files/167438/Microsoft-Office-Word-MSDTJS-Code-Execution.html
|
|
CVE-2022-3021 - https://wpscan.com/vulnerability/3c5ff229-85c2-49c2-8fb9-6419a8002a4e
|
|
CVE-2022-30239 - https://www.magnitude.com/products/data-connectivity
|
|
CVE-2022-3024 - https://wpscan.com/vulnerability/7f43cb8e-0c1b-4528-8c5c-b81ab42778dc
|
|
CVE-2022-30240 - https://www.magnitude.com/products/data-connectivity
|
|
CVE-2022-30242 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities
|
|
CVE-2022-30242 - https://www.honeywell.com/us/en/product-security
|
|
CVE-2022-30243 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities
|
|
CVE-2022-30243 - https://www.honeywell.com/us/en/product-security
|
|
CVE-2022-30244 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities
|
|
CVE-2022-30244 - https://www.honeywell.com/us/en/product-security
|
|
CVE-2022-30245 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities
|
|
CVE-2022-30245 - https://www.honeywell.com/us/en/product-security
|
|
CVE-2022-3025 - https://wpscan.com/vulnerability/66bc783b-67e1-4bd0-99c0-322873b3a22a
|
|
CVE-2022-30262 - https://www.forescout.com/blog/
|
|
CVE-2022-30264 - https://www.forescout.com/blog/
|
|
CVE-2022-30269 - https://www.forescout.com/blog/
|
|
CVE-2022-30270 - https://www.forescout.com/blog/
|
|
CVE-2022-30271 - https://www.forescout.com/blog/
|
|
CVE-2022-30272 - https://www.forescout.com/blog/
|
|
CVE-2022-30273 - https://www.forescout.com/blog/
|
|
CVE-2022-30274 - https://www.forescout.com/blog/
|
|
CVE-2022-30275 - https://www.forescout.com/blog/
|
|
CVE-2022-30276 - https://www.forescout.com/blog/
|
|
CVE-2022-30280 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-30284 - https://www.swascan.com/security-advisory-libnmap-2/
|
|
CVE-2022-30286 - http://packetstormsecurity.com/files/167069/PyScript-2022-05-04-Alpha-Source-Code-Disclosure.html
|
|
CVE-2022-30286 - https://cyber-guy.gitbook.io/cyber-guy/pocs/pyscript-file-read
|
|
CVE-2022-30286 - https://www.exploit-db.com/exploits/50918
|
|
CVE-2022-30292 - https://github.com/sprushed/CVE-2022-30292
|
|
CVE-2022-30293 - https://github.com/ChijinZ/security_advisories/tree/master/webkitgtk-2.36.0
|
|
CVE-2022-3030 - https://gitlab.com/gitlab-org/gitlab/-/issues/37959
|
|
CVE-2022-30312 - https://www.forescout.com/blog/
|
|
CVE-2022-30313 - https://www.forescout.com/blog/
|
|
CVE-2022-30314 - https://www.forescout.com/blog/
|
|
CVE-2022-30315 - https://www.forescout.com/blog/
|
|
CVE-2022-30316 - https://www.forescout.com/blog/
|
|
CVE-2022-30317 - https://www.forescout.com/blog/
|
|
CVE-2022-30318 - https://www.forescout.com/blog/
|
|
CVE-2022-30319 - https://www.forescout.com/blog/
|
|
CVE-2022-30320 - https://www.forescout.com/blog/
|
|
CVE-2022-30325 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/
|
|
CVE-2022-30325 - https://research.nccgroup.com/?research=Technical+advisories
|
|
CVE-2022-30326 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/
|
|
CVE-2022-30326 - https://research.nccgroup.com/?research=Technical+advisories
|
|
CVE-2022-30327 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/
|
|
CVE-2022-30327 - https://research.nccgroup.com/?research=Technical+advisories
|
|
CVE-2022-30328 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/
|
|
CVE-2022-30328 - https://research.nccgroup.com/?research=Technical+advisories
|
|
CVE-2022-30329 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/
|
|
CVE-2022-30329 - https://research.nccgroup.com/?research=Technical+advisories
|
|
CVE-2022-30330 - https://blog.inhq.net/posts/keepkey-CVE-2022-30330/
|
|
CVE-2022-30333 - http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html
|
|
CVE-2022-30333 - https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/
|
|
CVE-2022-30335 - https://gist.github.com/aliceicl/b2f25f3a0a3ba9973e4977f922d04008
|
|
CVE-2022-3035 - https://huntr.dev/bounties/0bbb1046-ea9e-4cb9-bc91-b294a72d1902
|
|
CVE-2022-30352 - https://www.exploit-db.com/exploits/50071
|
|
CVE-2022-3036 - https://wpscan.com/vulnerability/0dbc85dd-736c-492e-9db8-acb7195771aa
|
|
CVE-2022-3037 - https://huntr.dev/bounties/af4c2f2d-d754-4607-b565-9e92f3f717b5
|
|
CVE-2022-3038 - http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html
|
|
CVE-2022-30422 - https://www.swascan.com/it/security-advisory-proietti-planet-time-enterprise-cve-2022-30422/
|
|
CVE-2022-30425 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5706.php
|
|
CVE-2022-30426 - https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-30426/CVE-2022-30426.md
|
|
CVE-2022-30427 - https://github.com/gphper/ginadmin/issues/8
|
|
CVE-2022-30428 - https://github.com/gphper/ginadmin/issues/9
|
|
CVE-2022-30466 - https://github.com/nsbogam/ebike
|
|
CVE-2022-30467 - https://github.com/nsbogam/ebike-jammer
|
|
CVE-2022-30467 - https://github.com/nsbogam/ebike-jammer/blob/main/README.md
|
|
CVE-2022-30469 - https://github.com/blockomat2100/PoCs/blob/main/filerun/CVE-2022-30469.md
|
|
CVE-2022-30472 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/1
|
|
CVE-2022-30473 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/2
|
|
CVE-2022-30474 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/5
|
|
CVE-2022-30475 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/3
|
|
CVE-2022-30476 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/6
|
|
CVE-2022-30477 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/4
|
|
CVE-2022-30490 - https://github.com/yasinyildiz26/Badminton-Center-Management-System
|
|
CVE-2022-30503 - https://github.com/nginx/njs/issues/478
|
|
CVE-2022-30508 - https://github.com/1security/Vulnerability/blob/master/web/dedecms/1.md
|
|
CVE-2022-30515 - https://codingkoala.eu/posts/CVE202230515/
|
|
CVE-2022-30518 - https://packetstormsecurity.com/files/166984/ChatBot-Application-With-A-Suggestion-Feature-1.0-SQL-Injection.html
|
|
CVE-2022-30519 - http://packetstormsecurity.com/files/171627/Reprise-Software-RLM-14.2BL4-Cross-Site-Scripting.html
|
|
CVE-2022-30519 - https://github.com/earth2sky/Disclosed/blob/main/CVE-2022-30519
|
|
CVE-2022-30521 - https://github.com/winmt/CVE/blob/main/DIR-890L/README.md
|
|
CVE-2022-30521 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-30524 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42261
|
|
CVE-2022-30525 - http://packetstormsecurity.com/files/167176/Zyxel-Remote-Command-Execution.html
|
|
CVE-2022-30525 - http://packetstormsecurity.com/files/167182/Zyxel-Firewall-ZTP-Unauthenticated-Command-Injection.html
|
|
CVE-2022-30525 - http://packetstormsecurity.com/files/167372/Zyxel-USG-FLEX-5.21-Command-Injection.html
|
|
CVE-2022-30525 - http://packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.html
|
|
CVE-2022-30526 - http://packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.html
|
|
CVE-2022-30534 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1546
|
|
CVE-2022-30541 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1557
|
|
CVE-2022-30543 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1519
|
|
CVE-2022-30547 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1547
|
|
CVE-2022-30551 - https://opcfoundation.org
|
|
CVE-2022-30552 - https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/
|
|
CVE-2022-30557 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-30580 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
|
|
CVE-2022-30584 - https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/677341
|
|
CVE-2022-30585 - https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/677341
|
|
CVE-2022-30594 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
|
|
CVE-2022-30594 - http://packetstormsecurity.com/files/170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html
|
|
CVE-2022-30594 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
|
|
CVE-2022-3060 - https://gitlab.com/gitlab-org/gitlab/-/issues/365427
|
|
CVE-2022-30603 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1562
|
|
CVE-2022-30605 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1535
|
|
CVE-2022-30607 - https://www.ibm.com/support/pages/node/6595759
|
|
CVE-2022-3062 - https://wpscan.com/vulnerability/2e829bbe-1843-496d-a852-4150fa6d1f7a
|
|
CVE-2022-30629 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
|
|
CVE-2022-30634 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
|
|
CVE-2022-3065 - https://huntr.dev/bounties/5f3bc4b6-1d53-46b7-a23d-70f5faaf0c76
|
|
CVE-2022-3068 - https://huntr.dev/bounties/f45c24cb-9104-4c6e-a9e1-5c7e75e83884
|
|
CVE-2022-30688 - https://github.com/liske/needrestart/releases/tag/v3.6
|
|
CVE-2022-3069 - https://wpscan.com/vulnerability/a9918dfd-389c-43eb-afcc-03d29b42b369
|
|
CVE-2022-30690 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1539
|
|
CVE-2022-3070 - https://wpscan.com/vulnerability/cd8d71d1-030e-4ad4-866e-75d242883c6c
|
|
CVE-2022-30708 - https://github.com/esp0xdeadbeef/rce_webmin
|
|
CVE-2022-30708 - https://github.com/esp0xdeadbeef/rce_webmin/blob/main/exploit.py
|
|
CVE-2022-30708 - https://github.com/webmin/webmin/issues/1635
|
|
CVE-2022-30709 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30710 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30711 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30712 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30713 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30714 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30715 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30716 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30717 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30719 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-3072 - https://huntr.dev/bounties/9755ae6a-b08b-40a0-8089-c723b2d9ca52
|
|
CVE-2022-30720 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30721 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30722 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30723 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30724 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30725 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30726 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30727 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30728 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-30729 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
|
CVE-2022-3074 - https://wpscan.com/vulnerability/90ebaedc-89df-413f-b22e-753d4dd5e1c3
|
|
CVE-2022-30759 - https://packetstormsecurity.com/files/171971/Nokia-OneNDS-20.9-Insecure-Permissions-Privilege-Escalation.html
|
|
CVE-2022-3076 - https://wpscan.com/vulnerability/d18e695b-4d6e-4ff6-a060-312594a0d2bd
|
|
CVE-2022-30763 - https://blog.convisoappsec.com/en/bug-hunting-in-the-janet-language-interpreter/
|
|
CVE-2022-30768 - https://medium.com/@dk50u1/stored-xss-in-zoneminder-up-to-v1-36-12-f26b4bb68c31
|
|
CVE-2022-30769 - https://medium.com/@dk50u1/session-fixation-in-zoneminder-up-to-v1-36-12-3c850b1fbbf3
|
|
CVE-2022-30775 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42264
|
|
CVE-2022-30776 - https://medium.com/@bhattronit96/cve-2022-30776-cd34f977c2b9
|
|
CVE-2022-30777 - https://medium.com/@bhattronit96/cve-2022-30777-45725763ab59
|
|
CVE-2022-30778 - https://github.com/1nhann/vulns/issues/1
|
|
CVE-2022-30779 - https://github.com/1nhann/vulns/issues/2
|
|
CVE-2022-3078 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=e6a21a14106d9718aa4f8e115b1e474888eeba44
|
|
CVE-2022-30780 - https://podalirius.net/en/cves/2022-30780/
|
|
CVE-2022-30781 - http://packetstormsecurity.com/files/168400/Gitea-1.16.6-Remote-Code-Execution.html
|
|
CVE-2022-30781 - http://packetstormsecurity.com/files/169928/Gitea-Git-Fetch-Remote-Code-Execution.html
|
|
CVE-2022-30783 - http://www.openwall.com/lists/oss-security/2022/06/07/4
|
|
CVE-2022-30783 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2022-30783 - https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
|
|
CVE-2022-30784 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2022-30785 - http://www.openwall.com/lists/oss-security/2022/06/07/4
|
|
CVE-2022-30785 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2022-30785 - https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
|
|
CVE-2022-30786 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2022-30787 - http://www.openwall.com/lists/oss-security/2022/06/07/4
|
|
CVE-2022-30787 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2022-30787 - https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
|
|
CVE-2022-30788 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2022-30789 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2022-30790 - https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/
|
|
CVE-2022-3082 - https://wpscan.com/vulnerability/a91d0501-c2a9-4c6c-b5da-b3fc29442a4f
|
|
CVE-2022-30852 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/
|
|
CVE-2022-30858 - https://github.com/Marsman1996/pocs/blob/master/ngiflib/CVE-2022-30858/README.md
|
|
CVE-2022-30858 - https://github.com/miniupnp/ngiflib/issues/22
|
|
CVE-2022-30860 - https://github.com/fudforum/FUDforum/issues/23
|
|
CVE-2022-30861 - https://github.com/fudforum/FUDforum/issues/24
|
|
CVE-2022-30863 - https://github.com/fudforum/FUDforum/issues/24
|
|
CVE-2022-30874 - https://blog.stmcyber.com/vulns/cve-2022-30874/
|
|
CVE-2022-30874 - https://whitehub.net/submissions/2968
|
|
CVE-2022-30886 - https://packetstormsecurity.com/files/167001/School-Dormitory-Management-System-1.0-SQL-Injection.html
|
|
CVE-2022-30887 - https://packetstormsecurity.com/files/166786/Pharmacy-Management-System-1.0-Shell-Upload.html
|
|
CVE-2022-30898 - https://github.com/chshcms/cscms/issues/37
|
|
CVE-2022-30903 - https://medium.com/@shubhamvpandey/xss-found-in-nokia-g-2425g-a-home-wifi-router-f4fae083ed97
|
|
CVE-2022-30903 - https://youtu.be/CxBo_gQffOY
|
|
CVE-2022-30909 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/3
|
|
CVE-2022-30910 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/1
|
|
CVE-2022-30912 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/4
|
|
CVE-2022-30913 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/7
|
|
CVE-2022-30914 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/5
|
|
CVE-2022-30915 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/6
|
|
CVE-2022-30916 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/9
|
|
CVE-2022-30917 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/10
|
|
CVE-2022-30918 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/8
|
|
CVE-2022-30919 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/13
|
|
CVE-2022-30920 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/12
|
|
CVE-2022-30921 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/14
|
|
CVE-2022-30922 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/11
|
|
CVE-2022-30923 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/16
|
|
CVE-2022-30924 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/15
|
|
CVE-2022-30925 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/17
|
|
CVE-2022-30926 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/18
|
|
CVE-2022-30927 - https://github.com/ykosan1/Simple-Task-Scheduling-System-id-SQL-Injection-Unauthenticated
|
|
CVE-2022-30927 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/tss.zip
|
|
CVE-2022-30929 - https://github.com/AgainstTheLight/CVE-2022-30929
|
|
CVE-2022-30930 - https://medium.com/@pmmali/my-second-cve-2022-30930-4f9aab047518
|
|
CVE-2022-30931 - https://medium.com/@niteshbiwal2011/my-first-cve-2022-30931-e70b9cbecbba
|
|
CVE-2022-3096 - https://wpscan.com/vulnerability/46996537-a874-4b2e-9cd7-7d0832f9704d
|
|
CVE-2022-3097 - https://wpscan.com/vulnerability/9ebb8318-ebaf-4de7-b337-c91327685a43
|
|
CVE-2022-30974 - https://github.com/ccxvii/mujs/issues/162
|
|
CVE-2022-30975 - https://github.com/ccxvii/mujs/issues/161
|
|
CVE-2022-30976 - https://github.com/gpac/gpac/issues/2179
|
|
CVE-2022-3098 - https://wpscan.com/vulnerability/f4fcf41b-c05d-4236-8e67-a52d0f94c80a
|
|
CVE-2022-30981 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilies-in-gentics-cms/
|
|
CVE-2022-30982 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilies-in-gentics-cms/
|
|
CVE-2022-3099 - https://huntr.dev/bounties/403210c7-6cc7-4874-8934-b57f88bd4f5e
|
|
CVE-2022-3104 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=4a9800c81d2f34afb66b4b42e0330ae8298019a2
|
|
CVE-2022-3105 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=7694a7de22c53a312ea98960fcafc6ec62046531
|
|
CVE-2022-31056 - http://packetstormsecurity.com/files/171656/GLPI-10.0.2-SQL-Injection-Remote-Code-Execution.html
|
|
CVE-2022-3106 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=407ecd1bd726f240123f704620d46e285ff30dd9
|
|
CVE-2022-31062 - http://packetstormsecurity.com/files/171654/GLPI-Glpiinventory-1.0.1-Local-File-Inclusion.html
|
|
CVE-2022-31064 - http://packetstormsecurity.com/files/167682/BigBlueButton-2.3-2.4.7-Cross-Site-Scripting.html
|
|
CVE-2022-31064 - http://seclists.org/fulldisclosure/2022/Jun/52
|
|
CVE-2022-3107 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=886e44c9298a6b428ae046e2fa092ca52e822e6a
|
|
CVE-2022-3108 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=abfaf0eee97925905e742aa3b0b72e04a918fa9e
|
|
CVE-2022-3110 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=f94b47c6bde624d6c07f43054087607c52054a95
|
|
CVE-2022-31101 - http://packetstormsecurity.com/files/168003/Prestashop-Blockwishlist-2.1.0-SQL-Injection.html
|
|
CVE-2022-31108 - https://github.com/mermaid-js/mermaid/security/advisories/GHSA-x3vm-38hw-55wf
|
|
CVE-2022-3111 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=6dee930f6f6776d1e5a7edf542c6863b47d9f078
|
|
CVE-2022-31110 - https://github.com/DIYgod/RSSHub/issues/10045
|
|
CVE-2022-3112 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=c8c80c996182239ff9b05eda4db50184cf3b2e99
|
|
CVE-2022-31125 - http://packetstormsecurity.com/files/171648/Roxy-WI-6.1.0.0-Improper-Authentication-Control.html
|
|
CVE-2022-31129 - https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/
|
|
CVE-2022-3113 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=e25a89f743b18c029bfbe5e1663ae0c7190912b0
|
|
CVE-2022-31133 - https://huntr.dev/bounties/89d996a2-de30-4261-8e3f-98e54cb25f76
|
|
CVE-2022-31137 - http://packetstormsecurity.com/files/167805/Roxy-WI-Remote-Command-Execution.html
|
|
CVE-2022-31137 - http://packetstormsecurity.com/files/171648/Roxy-WI-6.1.0.0-Improper-Authentication-Control.html
|
|
CVE-2022-31137 - http://packetstormsecurity.com/files/171652/Roxy-WI-6.1.1.0-Remote-Code-Execution.html
|
|
CVE-2022-31137 - http://packetstormsecurity.com/files/172547/Roxy-WI-6.1.0.0-Remote-Command-Execution.html
|
|
CVE-2022-31138 - https://github.com/ly1g3/Mailcow-CVE-2022-31138
|
|
CVE-2022-3114 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=ed713e2bc093239ccd380c2ce8ae9e4162f5c037
|
|
CVE-2022-3115 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=73c3ed7495c67b8fbdc31cf58e6ca8757df31a33
|
|
CVE-2022-31160 - https://www.drupal.org/sa-contrib-2022-052
|
|
CVE-2022-31161 - http://packetstormsecurity.com/files/171652/Roxy-WI-6.1.1.0-Remote-Code-Execution.html
|
|
CVE-2022-31173 - https://github.com/graphql-rust/juniper/security/advisories/GHSA-4rx6-g5vg-5f3j
|
|
CVE-2022-3118 - https://vuldb.com/?id.207845
|
|
CVE-2022-31188 - http://packetstormsecurity.com/files/169814/CVAT-2.0-Server-Side-Request-Forgery.html
|
|
CVE-2022-3119 - https://wpscan.com/vulnerability/55b83cee-a8a5-4f9d-a976-a3eed9a558e5
|
|
CVE-2022-3120 - https://github.com/joinia/webray.com.cn/blob/main/Clinic's-Patient-Management-System/cpms.md
|
|
CVE-2022-3120 - https://vuldb.com/?id.207847
|
|
CVE-2022-31201 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-softguard-network-management-extension-snmp/
|
|
CVE-2022-31202 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-softguard-network-management-extension-snmp/
|
|
CVE-2022-31204 - https://www.forescout.com/blog/
|
|
CVE-2022-31205 - https://www.forescout.com/blog/
|
|
CVE-2022-31206 - https://www.forescout.com/blog/
|
|
CVE-2022-31207 - https://www.forescout.com/blog/
|
|
CVE-2022-31208 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/
|
|
CVE-2022-31209 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/
|
|
CVE-2022-3121 - https://vuldb.com/?id.207853
|
|
CVE-2022-31210 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/
|
|
CVE-2022-31211 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/
|
|
CVE-2022-31212 - https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/
|
|
CVE-2022-31213 - https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/
|
|
CVE-2022-31214 - https://www.openwall.com/lists/oss-security/2022/06/08/10
|
|
CVE-2022-3122 - https://github.com/joinia/webray.com.cn/blob/main/Clinic's-Patient-Management-System/cpmssql.md
|
|
CVE-2022-3122 - https://vuldb.com/?id.207854
|
|
CVE-2022-3123 - https://huntr.dev/bounties/d72a979b-57db-4201-9500-66b49a5c1345
|
|
CVE-2022-31237 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en
|
|
CVE-2022-31239 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en
|
|
CVE-2022-3124 - https://wpscan.com/vulnerability/00f76765-95af-4dbc-8c37-f1b15a0e8608
|
|
CVE-2022-31244 - https://packetstormsecurity.com/files/171970/Nokia-OneNDS-17-Insecure-Permissions-Privilege-Escalation.html
|
|
CVE-2022-31245 - https://github.com/ly1g3/Mailcow-CVE-2022-31245
|
|
CVE-2022-3125 - https://wpscan.com/vulnerability/d3d9dc9a-226b-4f76-995e-e2af1dd6b17e
|
|
CVE-2022-31250 - https://bugzilla.suse.com/show_bug.cgi?id=1200885
|
|
CVE-2022-31251 - https://bugzilla.suse.com/show_bug.cgi?id=1201674
|
|
CVE-2022-31254 - https://bugzilla.suse.com/show_bug.cgi?id=1204285
|
|
CVE-2022-3126 - https://wpscan.com/vulnerability/7db363bf-7bef-4d47-9963-c30d6fdd2fb8
|
|
CVE-2022-31262 - https://github.com/secure-77/CVE-2022-31262
|
|
CVE-2022-31262 - https://secure77.de/category/subjects/researches/
|
|
CVE-2022-31262 - https://secure77.de/gog-galaxy-cve-2022-31262/
|
|
CVE-2022-31262 - https://www.youtube.com/watch?v=Bgdbx5TJShI
|
|
CVE-2022-31264 - https://github.com/Ainevsia/CVE-Request/tree/main/Solana/1
|
|
CVE-2022-31266 - https://medium.com/@bcksec/in-ilias-through-7-10-620c0de685ee
|
|
CVE-2022-31268 - https://github.com/metaStor/Vuls/blob/main/gitblit/gitblit%20V1.9.3%20path%20traversal/gitblit%20V1.9.3%20path%20traversal.md
|
|
CVE-2022-31269 - http://packetstormsecurity.com/files/167990/Nortek-Linear-eMerge-E3-Series-Credential-Disclosure.html
|
|
CVE-2022-31269 - https://eg.linkedin.com/in/omar-1-hashem
|
|
CVE-2022-31269 - https://gist.github.com/omarhashem123/71ec9223e90ea76a76096d777d9b945c
|
|
CVE-2022-3127 - https://huntr.dev/bounties/6cea89d1-39dc-4023-82fa-821f566b841a
|
|
CVE-2022-3128 - https://wpscan.com/vulnerability/97201998-1859-4428-9b81-9c2748806cf4
|
|
CVE-2022-31282 - https://github.com/axiomatic-systems/Bento4/issues/708
|
|
CVE-2022-31285 - https://github.com/axiomatic-systems/Bento4/issues/702
|
|
CVE-2022-31287 - https://github.com/axiomatic-systems/Bento4/issues/703
|
|
CVE-2022-3129 - https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/arbitrary_file_upload.md
|
|
CVE-2022-3129 - https://vuldb.com/?id.207872
|
|
CVE-2022-31290 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/
|
|
CVE-2022-3130 - https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/sql_injection.md
|
|
CVE-2022-3130 - https://vuldb.com/?id.207873
|
|
CVE-2022-31306 - https://github.com/nginx/njs/issues/481
|
|
CVE-2022-31307 - https://github.com/nginx/njs/issues/482
|
|
CVE-2022-31308 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20AC1200.md
|
|
CVE-2022-31309 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20AC1200_check_live.md
|
|
CVE-2022-3131 - https://wpscan.com/vulnerability/b6c62e53-ae49-4fe0-aed9-0c493fc4442d
|
|
CVE-2022-31311 - https://github.com/pghuanghui/CVE_Request/blob/main/AERIAL%20X%201200_Command%20Execution%20Vulnerability.md
|
|
CVE-2022-3132 - https://wpscan.com/vulnerability/ed2dc1b9-f9f9-4e99-87b3-a614c223dd64
|
|
CVE-2022-31322 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb
|
|
CVE-2022-31324 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb
|
|
CVE-2022-31325 - http://packetstormsecurity.com/files/167483/ChurchCRM-4.4.5-SQL-Injection.html
|
|
CVE-2022-31325 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-31325
|
|
CVE-2022-31325 - https://www.nu11secur1ty.com/2022/06/cve-2022-31325.htm
|
|
CVE-2022-3133 - https://huntr.dev/bounties/2d93052f-efc6-4647-9a6d-8b08dc251223
|
|
CVE-2022-3134 - https://huntr.dev/bounties/6ec79e49-c7ab-4cd6-a517-e7934c2eb9dc
|
|
CVE-2022-3135 - https://wpscan.com/vulnerability/3505481d-141a-4516-bdbb-d4dad4e1eb01
|
|
CVE-2022-31358 - https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/
|
|
CVE-2022-3136 - https://wpscan.com/vulnerability/913d7e78-23f6-4b0d-aca3-17051a2dc649
|
|
CVE-2022-31361 - https://www.swascan.com/security-advisory-docebo-community-edition/
|
|
CVE-2022-31362 - https://www.swascan.com/security-advisory-docebo-community-edition/
|
|
CVE-2022-31366 - https://erpaciocco.github.io/2022/eve-ng-rce/
|
|
CVE-2022-31367 - https://github.com/strapi/strapi/releases/tag/v3.6.10
|
|
CVE-2022-31367 - https://github.com/strapi/strapi/releases/tag/v4.1.10
|
|
CVE-2022-3137 - https://wpscan.com/vulnerability/524928d6-d4e9-4a2f-b410-46958da549d8
|
|
CVE-2022-31373 - https://github.com/badboycxcc/SolarView_Compact_6.0_xss
|
|
CVE-2022-3138 - https://huntr.dev/bounties/1816a207-6abf-408c-b19a-e497e24172b3
|
|
CVE-2022-31382 - https://github.com/laotun-s/POC/blob/main/CVE-2022-31382.txt
|
|
CVE-2022-31383 - https://github.com/laotun-s/POC/blob/main/CVE-2022-31383.txt
|
|
CVE-2022-31384 - https://github.com/laotun-s/POC/blob/main/CVE-2022-31384.txt
|
|
CVE-2022-31386 - https://github.com/Fanli2012/nbnbk/issues/5
|
|
CVE-2022-3139 - https://wpscan.com/vulnerability/11c89925-4fe9-45f7-9020-55fe7bbae3db
|
|
CVE-2022-31390 - https://github.com/Cherry-toto/jizhicms/issues/75
|
|
CVE-2022-31393 - https://github.com/Cherry-toto/jizhicms/issues/76
|
|
CVE-2022-31395 - https://n0ur5sec.medium.com/achievement-unlocked-cve-2022-31395-33299f32cc00
|
|
CVE-2022-31398 - https://youtu.be/OungdOub18c
|
|
CVE-2022-31400 - https://youtu.be/uqO6hluHDB4
|
|
CVE-2022-3141 - http://packetstormsecurity.com/files/171479/WordPress-Translatepress-Multilingual-SQL-Injection.html
|
|
CVE-2022-3141 - https://medium.com/@elias.hohl/authenticated-sql-injection-vulnerability-in-translatepress-multilingual-wordpress-plugin-effc08eda514
|
|
CVE-2022-3141 - https://wpscan.com/vulnerability/1fa355d1-cca8-4b27-9d21-0b420a2e1bf3
|
|
CVE-2022-31414 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-31415 - https://researchinthebin.org/posts/ofrs-sql-injection/
|
|
CVE-2022-3142 - http://packetstormsecurity.com/files/171477/WordPress-NEX-Forms-SQL-Injection.html
|
|
CVE-2022-3142 - https://medium.com/@elias.hohl/authenticated-sql-injection-vulnerability-in-nex-forms-wordpress-plugin-35b8558dd0f5
|
|
CVE-2022-3142 - https://wpscan.com/vulnerability/8acc0fc6-efe6-4662-b9ac-6342a7823328
|
|
CVE-2022-31446 - https://github.com/wshidamowang/Router/blob/main/Tenda/AC18/RCE_1.md
|
|
CVE-2022-31464 - https://r0h1rr1m.medium.com/adaware-protect-local-privilege-escalation-through-insecure-service-permissions-44d0eeb6c933
|
|
CVE-2022-31468 - https://packetstormsecurity.com/files/168242/OX-App-Suite-Cross-Site-Scripting-Command-Injection.html
|
|
CVE-2022-31469 - https://seclists.org/fulldisclosure/2022/Nov/18
|
|
CVE-2022-3147 - https://mattermost.com/security-updates/
|
|
CVE-2022-31470 - http://packetstormsecurity.com/files/174551/Axigen-10.5.0-4370c946-Cross-Site-Scripting.html
|
|
CVE-2022-31478 - https://medium.com/@bcksec/ilias-lms-usertakeover-4-0-1-vulnerability-b2824679403
|
|
CVE-2022-3148 - https://huntr.dev/bounties/1f730015-b4d0-4f84-8cac-9cf1e57a091a
|
|
CVE-2022-3149 - https://wpscan.com/vulnerability/4c13a93d-2100-4721-8937-a1205378655f
|
|
CVE-2022-31492 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
|
|
CVE-2022-31493 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
|
|
CVE-2022-31494 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
|
|
CVE-2022-31495 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
|
|
CVE-2022-31496 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
|
|
CVE-2022-31497 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
|
|
CVE-2022-31498 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
|
|
CVE-2022-31499 - http://packetstormsecurity.com/files/167991/Nortek-Linear-eMerge-E3-Series-Command-Injection.html
|
|
CVE-2022-31499 - https://eg.linkedin.com/in/omar-1-hashem
|
|
CVE-2022-31499 - https://gist.github.com/omarhashem123/5f0c6f1394099b555740fdc5c7651ee2
|
|
CVE-2022-3150 - https://wpscan.com/vulnerability/bb0806d7-21e3-4a65-910c-bf0625c338ec
|
|
CVE-2022-31501 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31502 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31503 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31504 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31505 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31506 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31507 - https://github.com/ganga-devs/ganga/commit/730e7aba192407d35eb37dd7938d49071124be8c
|
|
CVE-2022-31507 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31508 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31509 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-3151 - https://wpscan.com/vulnerability/27816c70-58ad-4ffb-adcc-69eb1b210744
|
|
CVE-2022-31510 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31510 - https://github.com/sergeKashkin/Simple-RAT/pull/11
|
|
CVE-2022-31511 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31512 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31513 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31514 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31515 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31516 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31517 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31518 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31519 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-3152 - https://huntr.dev/bounties/b3f888d2-5c71-4682-8287-42613401fd5a
|
|
CVE-2022-31520 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31521 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31522 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31523 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31524 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31525 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31526 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31527 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31528 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31529 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-3153 - https://huntr.dev/bounties/68331124-620d-48bc-a8fa-cd947b26270a
|
|
CVE-2022-31530 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31531 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31532 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31533 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31534 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31535 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31536 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31537 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31538 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31539 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-3154 - https://wpscan.com/vulnerability/cda978b2-b31f-495d-8601-0aaa3e4b45cd
|
|
CVE-2022-31540 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31541 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31542 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31543 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31544 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31545 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31546 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31547 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31548 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31549 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31549 - https://github.com/olmax99/helm-flask-celery/commit/28c985d712d7ac26893433e8035e2e3678fcae9f
|
|
CVE-2022-3155 - https://bugzilla.mozilla.org/show_bug.cgi?id=1789061
|
|
CVE-2022-31550 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31551 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31552 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31553 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31554 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31555 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31556 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31557 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31558 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31559 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31560 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31561 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31562 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31563 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31564 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31564 - https://github.com/woduq1414/munhak-moa/commit/e8f800373b20cb22de70c7a994325b8903877da0
|
|
CVE-2022-31565 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31566 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31567 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31568 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31570 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31571 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31572 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31573 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31574 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31575 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31576 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31577 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31578 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31579 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31580 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31581 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31581 - https://github.com/scorelab/OpenMF/issues/262
|
|
CVE-2022-31582 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31583 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31584 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31585 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31586 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31587 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31588 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
|
CVE-2022-31589 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-31590 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-31591 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-31592 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-31593 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-31594 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-31595 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-31596 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-31597 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-31598 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-31620 - https://github.com/thorfdbg/libjpeg/issues/70
|
|
CVE-2022-31628 - https://bugs.php.net/bug.php?id=81726
|
|
CVE-2022-31629 - http://www.openwall.com/lists/oss-security/2024/04/12/11
|
|
CVE-2022-31647 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2
|
|
CVE-2022-31650 - https://sourceforge.net/p/sox/bugs/360/
|
|
CVE-2022-31651 - https://sourceforge.net/p/sox/bugs/360/
|
|
CVE-2022-31656 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
|
CVE-2022-31657 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
|
CVE-2022-31658 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
|
CVE-2022-31659 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
|
CVE-2022-31660 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
|
CVE-2022-31661 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
|
CVE-2022-31662 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
|
CVE-2022-31663 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
|
CVE-2022-31664 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
|
CVE-2022-31665 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
|
CVE-2022-3167 - https://huntr.dev/bounties/e5c2625b-34cc-4805-8223-80f2689e4e5c
|
|
CVE-2022-31678 - https://www.vmware.com/security/advisories/VMSA-2022-0027.html
|
|
CVE-2022-31680 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1587
|
|
CVE-2022-31704 - http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2022-31706 - http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2022-31711 - http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2022-3173 - https://huntr.dev/bounties/6d8ffcc6-c6e3-4385-8ead-bdbbbacf79e9
|
|
CVE-2022-31736 - https://bugzilla.mozilla.org/show_bug.cgi?id=1735923
|
|
CVE-2022-31739 - https://bugzilla.mozilla.org/show_bug.cgi?id=1765049
|
|
CVE-2022-3174 - https://huntr.dev/bounties/d8a32bd6-c76d-4140-a5ca-ef368a3058ce
|
|
CVE-2022-31741 - https://bugzilla.mozilla.org/show_bug.cgi?id=1767590
|
|
CVE-2022-31743 - https://bugzilla.mozilla.org/show_bug.cgi?id=1747388
|
|
CVE-2022-3175 - https://huntr.dev/bounties/c40badc3-c9e7-4b69-9e2e-2b9f05865159
|
|
CVE-2022-3178 - https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0
|
|
CVE-2022-31782 - https://gitlab.freedesktop.org/freetype/freetype-demos/-/issues/8
|
|
CVE-2022-31783 - https://github.com/liblouis/liblouis/issues/1214
|
|
CVE-2022-31786 - https://gist.github.com/RNPG/e10524f1781a9981b50fb27bb473b0fe
|
|
CVE-2022-31787 - https://gist.github.com/RNPG/ef10c0acceb650d43625a77d3472dd84
|
|
CVE-2022-31787 - https://gist.github.com/This-is-Neo/c91e1a0ed5d40fbcf0dada43ea1d7479
|
|
CVE-2022-31788 - https://gist.github.com/RNPG/b154f4b2e90340d2f39605989af06bee
|
|
CVE-2022-31788 - https://gist.github.com/This-is-Neo/cc5b08ad8a3a60cd81fd1b9c1cb573b4
|
|
CVE-2022-3179 - https://huntr.dev/bounties/58eae29e-3619-449d-9bba-fdcbabcba5fe
|
|
CVE-2022-31790 - https://www.ambionics.io/blog/hacking-watchguard-firewalls
|
|
CVE-2022-31793 - https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/08/millions-of-arris-routers-are-vulnerable-to-path-traversal-attacks/
|
|
CVE-2022-31793 - https://derekabdine.com/blog/2022-arris-advisory
|
|
CVE-2022-31794 - https://research.nccgroup.com/2022/05/27/technical-advisory-fujitsu-centricstor-control-center-v8-1-unauthenticated-command-injection/
|
|
CVE-2022-31795 - https://research.nccgroup.com/2022/05/27/technical-advisory-fujitsu-centricstor-control-center-v8-1-unauthenticated-command-injection/
|
|
CVE-2022-31796 - https://github.com/thorfdbg/libjpeg/issues/71
|
|
CVE-2022-31798 - http://packetstormsecurity.com/files/167992/Nortek-Linear-eMerge-E3-Series-Account-Takeover.html
|
|
CVE-2022-31798 - https://eg.linkedin.com/in/omar-1-hashem
|
|
CVE-2022-31798 - https://gist.github.com/omarhashem123/bccdcec70ab7e8f00519d56ea2e3fd79
|
|
CVE-2022-31814 - http://packetstormsecurity.com/files/168743/pfSense-pfBlockerNG-2.1.4_26-Shell-Upload.html
|
|
CVE-2022-31814 - http://packetstormsecurity.com/files/171123/pfBlockerNG-2.1.4_26-Remote-Code-Execution.html
|
|
CVE-2022-31814 - https://www.ihteam.net/advisory/pfblockerng-unauth-rce-vulnerability/
|
|
CVE-2022-31827 - https://github.com/zer0yu/CVE_Request/blob/master/MonstaFTP/MonstaFTP_v2_10_3_SSRF.md
|
|
CVE-2022-31830 - https://github.com/fex-team/kityminder/issues/345
|
|
CVE-2022-31845 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3__check_live.md
|
|
CVE-2022-31846 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3__live_mfg.md
|
|
CVE-2022-31847 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN579%20X3__Sensitive%20information%20leakage.md
|
|
CVE-2022-31854 - http://packetstormsecurity.com/files/167782/CodoForum-5.1-Remote-Code-Execution.html
|
|
CVE-2022-31856 - https://www.exploit-db.com/exploits/50942
|
|
CVE-2022-31860 - https://securityblog101.blogspot.com/2022/09/cve-2022-31860.html
|
|
CVE-2022-31861 - https://securityblog101.blogspot.com/2022/09/cve-2022-31861.html
|
|
CVE-2022-31873 - https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md
|
|
CVE-2022-31874 - https://github.com/jayus0821/uai-poc/blob/main/ASUS/RT-N53/command%20injection.md
|
|
CVE-2022-31875 - https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md
|
|
CVE-2022-31876 - https://github.com/jayus0821/uai-poc/blob/main/Netgear/WNAP320/unauth.md
|
|
CVE-2022-31877 - https://patsch.dev/2022/07/08/cve-2022-31877-privilege-escalation-in-msi-centers-msi-terminalserver-exe/
|
|
CVE-2022-31879 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Fire-Reporting
|
|
CVE-2022-31884 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/unauthorized-delete-add-api-users-api-keys
|
|
CVE-2022-31885 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/os-command-injection
|
|
CVE-2022-31886 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/2fa-bypass-via-x-csrf
|
|
CVE-2022-31887 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/0-click-account-takeover
|
|
CVE-2022-31888 - https://checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/
|
|
CVE-2022-31889 - https://checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/
|
|
CVE-2022-31890 - https://checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/
|
|
CVE-2022-31897 - https://packetstormsecurity.com/files/167572/Zoo-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2022-31898 - https://boschko.ca/glinet-router
|
|
CVE-2022-31901 - https://github.com/CDACesec/CVE-2022-31901
|
|
CVE-2022-31902 - https://github.com/CDACesec/CVE-2022-31902
|
|
CVE-2022-3194 - https://wpscan.com/vulnerability/85e32913-dc2a-44c9-addd-7abde618e995/
|
|
CVE-2022-3199 - http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html
|
|
CVE-2022-32030 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/formSetQosBand
|
|
CVE-2022-32031 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/fromSetRouteStatic
|
|
CVE-2022-32032 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/A18/formAddMacfilterRule
|
|
CVE-2022-32033 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/formSetVirtualSer
|
|
CVE-2022-32034 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formdelMasteraclist
|
|
CVE-2022-32035 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formMasterMng
|
|
CVE-2022-32036 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetStoreWeb
|
|
CVE-2022-32037 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetAPCfg
|
|
CVE-2022-32039 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/fromDhcpListClient
|
|
CVE-2022-32040 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetCfm
|
|
CVE-2022-32041 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formGetPassengerAnalyseData
|
|
CVE-2022-32043 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetAccessCodeInfo
|
|
CVE-2022-32044 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/5.setWiFiRepeaterCfg
|
|
CVE-2022-32045 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/4.setWiFiScheduleCfg
|
|
CVE-2022-32046 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/8.setMacFilterRules
|
|
CVE-2022-32047 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/1.setIpPortFilterRules
|
|
CVE-2022-32048 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/10.setTracerouteCfg
|
|
CVE-2022-32049 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/7.setUrlFilterRules
|
|
CVE-2022-3205 - https://bugzilla.redhat.com/show_bug.cgi?id=2120597
|
|
CVE-2022-32050 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/9.setWanCfg
|
|
CVE-2022-32051 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/2.setParentalRules
|
|
CVE-2022-32052 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/3.setWiFiAclRules
|
|
CVE-2022-32053 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/6.setWizardCfg
|
|
CVE-2022-32055 - https://github.com/bigb0x/CVEs/blob/main/Inout-Homestay-2-2-sqli.md
|
|
CVE-2022-32056 - https://github.com/JackyG0/Online-Accreditation-Management-System-v1.0-SQLi
|
|
CVE-2022-32060 - https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-site-scripting-b15becc1a5ea
|
|
CVE-2022-32061 - https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-site-scripting-c02e46fa72ab
|
|
CVE-2022-32065 - https://gitee.com/y_project/RuoYi/issues/I57IME
|
|
CVE-2022-32065 - https://github.com/yangzongzhuan/RuoYi/issues/118
|
|
CVE-2022-3207 - https://wpscan.com/vulnerability/b57272ea-9a8a-482a-bbaa-5f202ca5b9aa
|
|
CVE-2022-3208 - https://wpscan.com/vulnerability/80d475ca-b475-4789-8eef-9c4d880853b7
|
|
CVE-2022-32081 - https://jira.mariadb.org/browse/MDEV-26420
|
|
CVE-2022-32085 - https://jira.mariadb.org/browse/MDEV-26407
|
|
CVE-2022-32086 - https://jira.mariadb.org/browse/MDEV-26412
|
|
CVE-2022-32088 - https://jira.mariadb.org/browse/MDEV-26419
|
|
CVE-2022-32089 - https://jira.mariadb.org/browse/MDEV-26410
|
|
CVE-2022-3209 - https://wpscan.com/vulnerability/7a244fb1-fa0b-4294-9b51-588bf5d673a2
|
|
CVE-2022-32092 - https://github.com/fxc233/iot-vul/tree/main/D-Link/DIR-645
|
|
CVE-2022-32092 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-3211 - https://huntr.dev/bounties/31ac0506-ae38-4128-a46d-71d5d079f8b7
|
|
CVE-2022-32114 - https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/content-type-builder/admin/src/components/AllowedTypesSelect/index.js#L14
|
|
CVE-2022-32114 - https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/upload/admin/src/components/MediaLibraryInput/index.js#L33
|
|
CVE-2022-32114 - https://grimthereaperteam.medium.com/strapi-v4-1-12-unrestricted-file-upload-b993bfd07e4e
|
|
CVE-2022-32115 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/
|
|
CVE-2022-3212 - https://research.jfrog.com/vulnerabilities/axum-core-dos/
|
|
CVE-2022-3213 - https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2
|
|
CVE-2022-3213 - https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750
|
|
CVE-2022-32159 - https://www.mend.io/vulnerability-database/CVE-2022-32159
|
|
CVE-2022-3216 - https://vuldb.com/?id.208606
|
|
CVE-2022-32167 - https://www.mend.io/vulnerability-database/CVE-2022-32167
|
|
CVE-2022-32168 - https://www.mend.io/vulnerability-database/CVE-2022-32168
|
|
CVE-2022-32169 - https://www.mend.io/vulnerability-database/CVE-2022-32169
|
|
CVE-2022-3217 - https://www.tenable.com/security/research/tra-2022-31
|
|
CVE-2022-32170 - https://www.mend.io/vulnerability-database/CVE-2022-32170
|
|
CVE-2022-32171 - https://www.mend.io/vulnerability-database/CVE-2022-32171
|
|
CVE-2022-32172 - https://www.mend.io/vulnerability-database/CVE-2022-32172
|
|
CVE-2022-32173 - https://www.mend.io/vulnerability-database/CVE-2022-32173
|
|
CVE-2022-32174 - https://www.mend.io/vulnerability-database/CVE-2022-32174
|
|
CVE-2022-32175 - https://www.mend.io/vulnerability-database/CVE-2022-32175
|
|
CVE-2022-32176 - https://www.mend.io/vulnerability-database/CVE-2022-32176
|
|
CVE-2022-32177 - https://www.mend.io/vulnerability-database/CVE-2022-32177
|
|
CVE-2022-3218 - http://packetstormsecurity.com/files/168509/WiFi-Mouse-1.8.3.4-Remote-Code-Execution.html
|
|
CVE-2022-3218 - https://www.exploit-db.com/exploits/49601
|
|
CVE-2022-3218 - https://www.exploit-db.com/exploits/50972
|
|
CVE-2022-32199 - https://github.com/Toxich4/CVE-2022-32199
|
|
CVE-2022-3220 - https://wpscan.com/vulnerability/cb6f4953-e68b-48f3-a821-a1d77e5476ef
|
|
CVE-2022-32200 - https://github.com/davea42/libdwarf-code/issues/116
|
|
CVE-2022-32200 - https://www.prevanders.net/dwarfbug.html
|
|
CVE-2022-32201 - https://github.com/thorfdbg/libjpeg/issues/73
|
|
CVE-2022-32202 - https://github.com/thorfdbg/libjpeg/issues/74
|
|
CVE-2022-32205 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-32206 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-32207 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-32208 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-3221 - https://huntr.dev/bounties/1fa1aac9-b16a-4a70-a7da-960b3908ae1d
|
|
CVE-2022-3222 - https://huntr.dev/bounties/b29c69fa-3eac-41e4-9d4f-d861aba18235
|
|
CVE-2022-32221 - http://seclists.org/fulldisclosure/2023/Jan/19
|
|
CVE-2022-3223 - https://huntr.dev/bounties/125791b6-3a68-4235-8866-6bc3a52332ba
|
|
CVE-2022-32230 - https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/
|
|
CVE-2022-32235 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-32236 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-32237 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-32238 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-32239 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-3224 - https://huntr.dev/bounties/3587a567-7fcd-4702-b7c9-d9ca565e3c62
|
|
CVE-2022-32240 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-32241 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-32242 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-32243 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-32244 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-32245 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-32246 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-32247 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-32248 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-32249 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-32250 - http://www.openwall.com/lists/oss-security/2022/06/03/1
|
|
CVE-2022-32250 - http://www.openwall.com/lists/oss-security/2022/08/25/1
|
|
CVE-2022-32250 - http://www.openwall.com/lists/oss-security/2022/09/02/9
|
|
CVE-2022-32250 - https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/
|
|
CVE-2022-32250 - https://bugzilla.redhat.com/show_bug.cgi?id=2092427
|
|
CVE-2022-32250 - https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd
|
|
CVE-2022-32250 - https://www.openwall.com/lists/oss-security/2022/05/31/1
|
|
CVE-2022-32269 - https://github.com/Edubr2020/RealPlayer_G2_RCE
|
|
CVE-2022-32269 - https://www.youtube.com/watch?v=9c9Q4VZQOUk
|
|
CVE-2022-32270 - https://github.com/Edubr2020/RP_Import_RCE
|
|
CVE-2022-32270 - https://youtu.be/CONlijEgDLc
|
|
CVE-2022-32271 - https://github.com/Edubr2020/RP_DCP_Code_Exec
|
|
CVE-2022-32271 - https://youtu.be/AMODp3iTnqY
|
|
CVE-2022-32272 - http://packetstormsecurity.com/files/171549/OPSWAT-Metadefender-Core-4.21.1-Privilege-Escalation.html
|
|
CVE-2022-32274 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-040.txt
|
|
CVE-2022-32275 - https://github.com/BrotherOfJhonny/grafana
|
|
CVE-2022-32275 - https://github.com/BrotherOfJhonny/grafana/blob/main/README.md
|
|
CVE-2022-32276 - https://github.com/BrotherOfJhonny/grafana/blob/main/README.md
|
|
CVE-2022-32277 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/squiz-matrix-cms-authenticated-privilege-escalation-through-idor/
|
|
CVE-2022-32282 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1545
|
|
CVE-2022-3229 - https://github.com/rapid7/metasploit-framework/pull/16989
|
|
CVE-2022-32294 - https://medium.com/@soheil.samanabadi/zimbra-8-8-15-zmprove-ca-command-incorrect-access-control-8088032638e
|
|
CVE-2022-32296 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9
|
|
CVE-2022-32298 - https://github.com/landley/toybox/issues/346
|
|
CVE-2022-32308 - https://github.com/uBlockOrigin/uBlock-issues/issues/1992
|
|
CVE-2022-3231 - https://huntr.dev/bounties/bcb6ee68-1452-4fdb-932a-f1031d10984f
|
|
CVE-2022-32310 - https://packetstormsecurity.com/files/167291/Ingredient-Stock-Management-System-1.0-Account-Takeover.html
|
|
CVE-2022-32311 - https://packetstormsecurity.com/files/167290/Ingredient-Stock-Management-System-1.0-SQL-Injection.html
|
|
CVE-2022-32317 - https://bugs.gentoo.org/show_bug.cgi?id=858107
|
|
CVE-2022-32317 - https://github.com/b17fr13nds/MPlayer_cve_poc
|
|
CVE-2022-32318 - https://packetstormsecurity.com/files/167309/Fast-Food-Ordering-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2022-3232 - https://huntr.dev/bounties/15c8fd98-7f50-4d46-b013-42710af1f99c
|
|
CVE-2022-3233 - https://huntr.dev/bounties/5ec206e0-eca0-4957-9af4-fdd9185d1db3
|
|
CVE-2022-3234 - https://huntr.dev/bounties/90fdf374-bf04-4386-8a23-38c83b88f0da
|
|
CVE-2022-3235 - https://huntr.dev/bounties/96d5f7a0-a834-4571-b73b-0fe523b941af
|
|
CVE-2022-32353 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/product-show-room-site/SQLi-1.md
|
|
CVE-2022-3237 - https://wpscan.com/vulnerability/cd2fd6cd-a839-4de8-af28-b5134873c40e
|
|
CVE-2022-32387 - https://devnet.kentico.com/download/hotfixes
|
|
CVE-2022-3239 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d
|
|
CVE-2022-32391 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32391.md
|
|
CVE-2022-32392 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32392.md
|
|
CVE-2022-32393 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32393.md
|
|
CVE-2022-32394 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32394.md
|
|
CVE-2022-32395 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32395.md
|
|
CVE-2022-32396 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32396.md
|
|
CVE-2022-32397 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32397.md
|
|
CVE-2022-32398 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32398.md
|
|
CVE-2022-32399 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32399.md
|
|
CVE-2022-32400 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32400.md
|
|
CVE-2022-32401 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32401.md
|
|
CVE-2022-32402 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32402.md
|
|
CVE-2022-32403 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32403.md
|
|
CVE-2022-32404 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32404.md
|
|
CVE-2022-32405 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32405.md
|
|
CVE-2022-32407 - https://riteshgohil-25.medium.com/softr-version-2-0-33463a6bf766
|
|
CVE-2022-32409 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt
|
|
CVE-2022-32409 - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion
|
|
CVE-2022-3241 - https://wpscan.com/vulnerability/a995dd67-43fc-4087-a7f1-5db57f4c828c
|
|
CVE-2022-32414 - https://github.com/nginx/njs/issues/483
|
|
CVE-2022-3242 - https://huntr.dev/bounties/3e6b218a-a5a6-40d9-9f7e-5ab0c6214faf
|
|
CVE-2022-32429 - http://packetstormsecurity.com/files/169819/MSNSwitch-Firmware-MNT.2408-Remote-Code-Execution.html
|
|
CVE-2022-32429 - https://elifulkerson.com/CVE-2022-32429/
|
|
CVE-2022-3243 - https://wpscan.com/vulnerability/9f03bc1a-214f-451a-89fd-2cd3517e8f8a
|
|
CVE-2022-32434 - https://github.com/EIPStackGroup/OpENer/issues/374
|
|
CVE-2022-32441 - https://code610.blogspot.com/2022/06/night-fuzzing-session-idapro-66-part-2.html
|
|
CVE-2022-32449 - https://github.com/winmt/CVE/blob/main/TOTOLINK%20EX300_V2/README.md
|
|
CVE-2022-3245 - https://huntr.dev/bounties/747c2924-95ca-4311-9e69-58ee0fb440a0
|
|
CVE-2022-32450 - http://packetstormsecurity.com/files/167608/AnyDesk-7.0.9-Arbitrary-File-Write-Denial-Of-Service.html
|
|
CVE-2022-32450 - http://seclists.org/fulldisclosure/2022/Jul/9
|
|
CVE-2022-32450 - https://seclists.org/fulldisclosure/2022/Jun/44
|
|
CVE-2022-32454 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1560
|
|
CVE-2022-3246 - https://wpscan.com/vulnerability/ece049b2-9a21-463d-9e8b-b4ce61919f0c
|
|
CVE-2022-3247 - https://wpscan.com/vulnerability/ee312f22-ca58-451d-a1cb-3f78a6e5ecaf
|
|
CVE-2022-32480 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en
|
|
CVE-2022-3249 - https://wpscan.com/vulnerability/6503da78-a2bf-4b4c-b56d-21c8c55b076e
|
|
CVE-2022-3250 - https://huntr.dev/bounties/39889a3f-8bb7-448a-b0d4-a18c671bbd23
|
|
CVE-2022-32502 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
|
CVE-2022-32503 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
|
CVE-2022-32504 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
|
CVE-2022-32505 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
|
CVE-2022-32506 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
|
CVE-2022-32507 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
|
CVE-2022-32508 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
|
CVE-2022-32509 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
|
CVE-2022-3251 - https://huntr.dev/bounties/b9a1b411-060b-4235-9426-e39bd0a1d6d9
|
|
CVE-2022-32510 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
|
CVE-2022-3254 - https://wpscan.com/vulnerability/546c47c2-5b4b-46db-b754-c6b43aef2660
|
|
CVE-2022-32543 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1527
|
|
CVE-2022-32548 - https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers
|
|
CVE-2022-3255 - https://huntr.dev/bounties/0ea45cf9-b256-454c-9031-2435294c0902
|
|
CVE-2022-3256 - https://huntr.dev/bounties/8336a3df-212a-4f8d-ae34-76ef1f936bb3
|
|
CVE-2022-32567 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-039.txt
|
|
CVE-2022-3257 - https://mattermost.com/security-updates/
|
|
CVE-2022-32572 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1548
|
|
CVE-2022-32573 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1528
|
|
CVE-2022-32574 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1565
|
|
CVE-2022-32585 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1570
|
|
CVE-2022-32586 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1563
|
|
CVE-2022-32588 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1544
|
|
CVE-2022-3267 - https://huntr.dev/bounties/7b6ec9f4-4fe9-4716-8dba-3491ffa3f6f2
|
|
CVE-2022-3268 - https://huntr.dev/bounties/00e464ce-53b9-485d-ac62-6467881654c2
|
|
CVE-2022-3269 - https://huntr.dev/bounties/67c25969-5e7a-4424-817e-e1a918f63cc6
|
|
CVE-2022-3272 - https://huntr.dev/bounties/733678b9-daa1-4d6a-875a-382fa09a6e38
|
|
CVE-2022-3273 - https://huntr.dev/bounties/a6df4bad-3382-4add-8918-760d885690f6
|
|
CVE-2022-3274 - https://huntr.dev/bounties/8834c356-4ddb-4be7-898b-d76f480e9c3f
|
|
CVE-2022-32760 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1555
|
|
CVE-2022-32761 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1549
|
|
CVE-2022-32763 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1541
|
|
CVE-2022-32765 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1576
|
|
CVE-2022-32768 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1536
|
|
CVE-2022-32769 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1536
|
|
CVE-2022-32770 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538
|
|
CVE-2022-32771 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538
|
|
CVE-2022-32772 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538
|
|
CVE-2022-32773 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1556
|
|
CVE-2022-32774 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1600
|
|
CVE-2022-32775 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1564
|
|
CVE-2022-32777 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1542
|
|
CVE-2022-32778 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1542
|
|
CVE-2022-3278 - https://huntr.dev/bounties/a9fad77e-f245-4ce9-ba15-c7d4c86c4612
|
|
CVE-2022-32795 - http://seclists.org/fulldisclosure/2022/Oct/39
|
|
CVE-2022-32795 - http://seclists.org/fulldisclosure/2022/Oct/40
|
|
CVE-2022-3282 - https://wpscan.com/vulnerability/035dffef-4b4b-4afb-9776-7f6c5e56452c
|
|
CVE-2022-32827 - http://packetstormsecurity.com/files/169929/AppleAVD-deallocateKernelMemoryInternal-Missing-Surface-Lock.html
|
|
CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/39
|
|
CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/40
|
|
CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/45
|
|
CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/49
|
|
CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/39
|
|
CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/40
|
|
CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/45
|
|
CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/47
|
|
CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/49
|
|
CVE-2022-32868 - http://seclists.org/fulldisclosure/2022/Oct/39
|
|
CVE-2022-32868 - http://seclists.org/fulldisclosure/2022/Oct/40
|
|
CVE-2022-32868 - http://seclists.org/fulldisclosure/2022/Oct/50
|
|
CVE-2022-32872 - http://seclists.org/fulldisclosure/2022/Oct/39
|
|
CVE-2022-32872 - http://seclists.org/fulldisclosure/2022/Oct/40
|
|
CVE-2022-3288 - https://gitlab.com/gitlab-org/gitlab/-/issues/354948
|
|
CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/39
|
|
CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/40
|
|
CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/45
|
|
CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/49
|
|
CVE-2022-32886 - http://seclists.org/fulldisclosure/2022/Oct/39
|
|
CVE-2022-32886 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-32893 - http://seclists.org/fulldisclosure/2022/Oct/49
|
|
CVE-2022-32893 - http://www.openwall.com/lists/oss-security/2022/08/29/1
|
|
CVE-2022-32893 - http://www.openwall.com/lists/oss-security/2022/08/29/2
|
|
CVE-2022-32893 - http://www.openwall.com/lists/oss-security/2022/09/13/1
|
|
CVE-2022-32894 - http://seclists.org/fulldisclosure/2022/Oct/45
|
|
CVE-2022-32894 - http://seclists.org/fulldisclosure/2022/Oct/49
|
|
CVE-2022-3290 - https://huntr.dev/bounties/d8b8519d-96a5-484c-8141-624c54290bf5
|
|
CVE-2022-32907 - http://packetstormsecurity.com/files/169930/AppleAVD-AppleAVDUserClient-decodeFrameFig-Memory-Corruption.html
|
|
CVE-2022-32908 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-32911 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/39
|
|
CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/40
|
|
CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/47
|
|
CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/49
|
|
CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/50
|
|
CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/39
|
|
CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/40
|
|
CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/43
|
|
CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/45
|
|
CVE-2022-3292 - https://huntr.dev/bounties/e9309018-e94f-4e15-b7d1-5d38b6021c5d
|
|
CVE-2022-32924 - http://packetstormsecurity.com/files/170010/XNU-Dangling-PTE-Entry.html
|
|
CVE-2022-32942 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-32942 - http://seclists.org/fulldisclosure/2022/Dec/24
|
|
CVE-2022-32942 - http://seclists.org/fulldisclosure/2022/Dec/25
|
|
CVE-2022-32943 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-32943 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-3295 - https://huntr.dev/bounties/202dd03a-3d97-4c64-bc73-1a0f36614233
|
|
CVE-2022-3296 - https://huntr.dev/bounties/958866b8-526a-4979-9471-39392e0c9077
|
|
CVE-2022-3297 - https://huntr.dev/bounties/1aa9ec92-0355-4710-bf85-5bce9effa01c
|
|
CVE-2022-32978 - https://github.com/thorfdbg/libjpeg/issues/75
|
|
CVE-2022-3298 - https://huntr.dev/bounties/f9fedf94-41c9-49c4-8552-e407123a44e7
|
|
CVE-2022-32985 - https://sec-consult.com/vulnerability-lab/advisory/hardcoded-backdoor-user-outdated-software-components-nexans-ftto-gigaswitch/
|
|
CVE-2022-32988 - https://github.com/FedericoHeichou/CVE-2022-32988
|
|
CVE-2022-32988 - https://github.com/FedericoHeichou/DSL-N14U-XSS
|
|
CVE-2022-32993 - https://github.com/laotun-s/POC/blob/main/CVE-2022-32993.txt
|
|
CVE-2022-32994 - https://github.com/zongdeiqianxing/cve-reports/issues/1
|
|
CVE-2022-32995 - https://github.com/zongdeiqianxing/cve-reports/issues/2
|
|
CVE-2022-3300 - https://wpscan.com/vulnerability/ddc9ed69-d942-4fad-bbf4-1be3b86460d9
|
|
CVE-2022-3301 - https://huntr.dev/bounties/d3bf1e5d-055a-44b8-8d60-54ab966ed63a
|
|
CVE-2022-33011 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/
|
|
CVE-2022-33012 - https://blog.jitendrapatro.me/cve-2022-33012-account-takeover-through-password-reset-poisoning/
|
|
CVE-2022-3302 - https://wpscan.com/vulnerability/1b5a018d-f2d4-4373-be1e-5162cc5c928b
|
|
CVE-2022-33024 - https://github.com/LibreDWG/libredwg/issues/492
|
|
CVE-2022-33025 - https://github.com/LibreDWG/libredwg/issues/487
|
|
CVE-2022-33026 - https://github.com/LibreDWG/libredwg/issues/484
|
|
CVE-2022-33027 - https://github.com/LibreDWG/libredwg/issues/490
|
|
CVE-2022-33028 - https://github.com/LibreDWG/libredwg/issues/489
|
|
CVE-2022-3303 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d
|
|
CVE-2022-33032 - https://github.com/LibreDWG/libredwg/issues/488
|
|
CVE-2022-33033 - https://github.com/LibreDWG/libredwg/issues/493
|
|
CVE-2022-33034 - https://github.com/LibreDWG/libredwg/issues/494
|
|
CVE-2022-33043 - https://github.com/chen-jerry-php/vim/blob/main/core_tmp.md
|
|
CVE-2022-33047 - https://drive.google.com/file/d/1g3MQajVLZAaZMRfIQHSLT6XRw-B4Dmz8/view?usp=sharing
|
|
CVE-2022-33065 - https://github.com/libsndfile/libsndfile/issues/789
|
|
CVE-2022-33075 - https://packetstormsecurity.com/files/167603/Zoo-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2022-33077 - https://medium.com/@rohan_pagey/cve-2022-33077-idor-to-change-address-of-any-customer-via-parameter-pollution-in-nopcommerce-4-5-2fa4bc763cc6
|
|
CVE-2022-33087 - https://github.com/cilan2/iot/blob/main/4.md
|
|
CVE-2022-33099 - https://github.com/lua/lua/commit/42d40581dd919fb134c07027ca1ce0844c670daf
|
|
CVE-2022-33099 - https://lua-users.org/lists/lua-l/2022-05/msg00035.html
|
|
CVE-2022-33103 - https://lore.kernel.org/all/CALO=DHFB+yBoXxVr5KcsK0iFdg+e7ywko4-e+72kjbcS8JBfPw@mail.gmail.com/
|
|
CVE-2022-33108 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42284
|
|
CVE-2022-33108 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42286
|
|
CVE-2022-33108 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42287
|
|
CVE-2022-33116 - https://emaragkos.gr/gunet-open-eclass-authenticated-path-traversal/
|
|
CVE-2022-33119 - https://github.com/badboycxcc/nuuo-xss/blob/main/README.md
|
|
CVE-2022-33121 - https://github.com/bg5sbk/MiniCMS/issues/45
|
|
CVE-2022-33122 - https://github.com/eyoucms/eyoucms/issues/24
|
|
CVE-2022-33124 - https://github.com/aio-libs/aiohttp/issues/6772
|
|
CVE-2022-33147 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551
|
|
CVE-2022-33148 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551
|
|
CVE-2022-33149 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551
|
|
CVE-2022-33150 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1577
|
|
CVE-2022-33171 - http://packetstormsecurity.com/files/168096/TypeORM-0.3.7-Information-Disclosure.html
|
|
CVE-2022-33174 - https://gynvael.coldwind.pl/?lang=en&id=748
|
|
CVE-2022-33175 - https://gynvael.coldwind.pl/?lang=en&id=748
|
|
CVE-2022-33189 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1558
|
|
CVE-2022-33192 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559
|
|
CVE-2022-33193 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559
|
|
CVE-2022-33194 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559
|
|
CVE-2022-33195 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559
|
|
CVE-2022-33204 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568
|
|
CVE-2022-33205 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568
|
|
CVE-2022-33206 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568
|
|
CVE-2022-33207 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568
|
|
CVE-2022-3323 - https://www.tenable.com/security/research/tra-2022-32
|
|
CVE-2022-3324 - https://huntr.dev/bounties/e414e55b-f332-491f-863b-c18dca97403c
|
|
CVE-2022-3326 - https://huntr.dev/bounties/1f6a5e49-23f2-45f7-8661-19f9cee8ae97
|
|
CVE-2022-3327 - https://huntr.dev/bounties/02207c8f-2b15-4a31-a86a-74fd2fca0ed1
|
|
CVE-2022-33312 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572
|
|
CVE-2022-33313 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572
|
|
CVE-2022-33314 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572
|
|
CVE-2022-33321 - https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-010.pdf
|
|
CVE-2022-33322 - https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-011.pdf
|
|
CVE-2022-33325 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573
|
|
CVE-2022-33326 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573
|
|
CVE-2022-33327 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573
|
|
CVE-2022-33328 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573
|
|
CVE-2022-33329 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573
|
|
CVE-2022-3333 - https://wpscan.com/vulnerability/bfd8a7aa-5977-4fe5-b2fc-12bf93caf3ed
|
|
CVE-2022-3334 - https://wpscan.com/vulnerability/0e735502-eaa2-4047-949e-bc8eb6b39fc9
|
|
CVE-2022-3335 - https://wpscan.com/vulnerability/39514705-c887-4a02-a77b-36e1dcca8f5d
|
|
CVE-2022-3336 - https://wpscan.com/vulnerability/57bc6633-1aeb-4c20-a2a5-9b3fa10ba95d
|
|
CVE-2022-3338 - https://kcm.trellix.com/corporate/index?page=content&id=SB10387
|
|
CVE-2022-3339 - https://kcm.trellix.com/corporate/index?page=content&id=SB10387
|
|
CVE-2022-3343 - https://wpscan.com/vulnerability/e507b1b5-1a56-4b2f-b7e7-e22f6da1e32a
|
|
CVE-2022-3350 - https://wpscan.com/vulnerability/6d796b83-03c0-49f8-8d07-5c63ce8a32b9
|
|
CVE-2022-3352 - https://huntr.dev/bounties/d058f182-a49b-40c7-9234-43d4c5a29f60
|
|
CVE-2022-3354 - https://vuldb.com/?id.209686
|
|
CVE-2022-3355 - https://huntr.dev/bounties/4b7fb92c-f06b-4bbf-82dc-9f013b30b6a6
|
|
CVE-2022-3357 - https://wpscan.com/vulnerability/2e28a4e7-e7d3-485c-949c-e300e5b66cbd
|
|
CVE-2022-3359 - https://wpscan.com/vulnerability/08f3ce22-94a0-496a-aaf9-d35b6b0f5bb6
|
|
CVE-2022-3360 - https://wpscan.com/vulnerability/acea7a54-a964-4127-a93f-f38f883074e3
|
|
CVE-2022-3362 - https://huntr.dev/bounties/ca428c31-858d-47fa-adc9-2a59f8e8b2b1
|
|
CVE-2022-3363 - https://huntr.dev/bounties/b8a40ba6-2452-4abe-a80a-2d065ee8891e
|
|
CVE-2022-3364 - https://huntr.dev/bounties/e70ad507-1424-463b-bdf1-c4a6fbe6e720
|
|
CVE-2022-3366 - https://wpscan.com/vulnerability/72639924-e7a7-4f7d-bd50-015d05ffd4fb
|
|
CVE-2022-3368 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
|
CVE-2022-3371 - https://huntr.dev/bounties/4e8f6136-50c7-4fa1-ac98-699bcb7b35ce
|
|
CVE-2022-3374 - https://wpscan.com/vulnerability/22fd3f28-9036-4bd5-ad98-ff78bd1b51bc
|
|
CVE-2022-3376 - https://huntr.dev/bounties/a9021e93-6d18-4ac1-98ce-550c4697a4ed
|
|
CVE-2022-3380 - https://wpscan.com/vulnerability/a42272a2-f9ce-4aab-9a94-8a4d85008746
|
|
CVE-2022-3389 - https://huntr.dev/bounties/f7d2a6ab-2faf-4719-bdb6-e4e5d6065752
|
|
CVE-2022-33891 - http://packetstormsecurity.com/files/168309/Apache-Spark-Unauthenticated-Command-Injection.html
|
|
CVE-2022-33896 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1574
|
|
CVE-2022-33897 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1579
|
|
CVE-2022-3391 - https://wpscan.com/vulnerability/ecc51420-ee50-4e39-a38d-09686f1996f2
|
|
CVE-2022-33910 - https://mantisbt.org/bugs/view.php?id=29135
|
|
CVE-2022-33910 - https://mantisbt.org/bugs/view.php?id=30384
|
|
CVE-2022-33916 - https://opcfoundation.org
|
|
CVE-2022-33917 - http://packetstormsecurity.com/files/168147/Arm-Mali-CSF-VMA-Split-Mishandling.html
|
|
CVE-2022-3392 - https://wpscan.com/vulnerability/2296156e-b177-478e-a01c-b1ea4fee0aca
|
|
CVE-2022-3393 - https://wpscan.com/vulnerability/689b4c42-c516-4c57-8ec7-3a6f12a3594e
|
|
CVE-2022-33932 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en
|
|
CVE-2022-33938 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1584
|
|
CVE-2022-3394 - https://wpscan.com/vulnerability/3266eb59-a8b2-4a5a-ab48-01a9af631b2c
|
|
CVE-2022-3395 - https://wpscan.com/vulnerability/10742154-368a-40be-a67d-80ea848493a0
|
|
CVE-2022-33981 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.6
|
|
CVE-2022-33981 - https://seclists.org/oss-sec/2022/q2/66
|
|
CVE-2022-34000 - https://github.com/libjxl/libjxl/issues/1477
|
|
CVE-2022-34001 - https://prisminfosec.com/cve-2022-34001/
|
|
CVE-2022-34002 - https://assura.atlassian.net/wiki/spaces/VULNS/pages/1843134469/CVE-2022-34002+Personnel+Data+Systems+PDS+Vista+7+-+Local+File+Inclusion
|
|
CVE-2022-34005 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf
|
|
CVE-2022-34006 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf
|
|
CVE-2022-34007 - https://packetstormsecurity.com/files/167706/EQS-Integrity-Line-Cross-Site-Scripting-Information-Disclosure.html
|
|
CVE-2022-34008 - https://r0h1rr1m.medium.com/comodo-antivirus-local-privilege-escalation-through-insecure-file-move-476a4601d9b8
|
|
CVE-2022-34020 - https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
|
|
CVE-2022-34020 - https://securityblog101.blogspot.com/2022/09/cve-2022-34020.html
|
|
CVE-2022-34021 - https://securityblog101.blogspot.com/2022/09/cve-id-cve-2022-34021.html
|
|
CVE-2022-34022 - https://securityblog101.blogspot.com/2022/09/cve-id-cve-2022-34022.html
|
|
CVE-2022-34027 - https://github.com/nginx/njs/issues/504
|
|
CVE-2022-34028 - https://github.com/nginx/njs/issues/522
|
|
CVE-2022-34029 - https://github.com/nginx/njs/issues/506
|
|
CVE-2022-34030 - https://github.com/nginx/njs/issues/540
|
|
CVE-2022-34031 - https://github.com/nginx/njs/issues/523
|
|
CVE-2022-34032 - https://github.com/nginx/njs/issues/524
|
|
CVE-2022-34033 - https://github.com/michaelrsweet/htmldoc/issues/425
|
|
CVE-2022-34035 - https://github.com/michaelrsweet/htmldoc/issues/426
|
|
CVE-2022-34046 - http://packetstormsecurity.com/files/167890/Wavlink-WN533A8-Password-Disclosure.html
|
|
CVE-2022-34047 - http://packetstormsecurity.com/files/167891/Wavlink-WN530HG4-Password-Disclosure.html
|
|
CVE-2022-3405 - https://herolab.usd.de/security-advisories/usd-2022-0008/
|
|
CVE-2022-34067 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Warehouse-Management-System
|
|
CVE-2022-3408 - https://wpscan.com/vulnerability/395bc893-2067-4f76-b49f-9ed8e1e8f330
|
|
CVE-2022-34092 - https://github.com/edmarmoretti/i3geo/issues/3
|
|
CVE-2022-34092 - https://github.com/saladesituacao/i3geo/issues/3
|
|
CVE-2022-34092 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L23
|
|
CVE-2022-34093 - https://github.com/edmarmoretti/i3geo/issues/4
|
|
CVE-2022-34093 - https://github.com/saladesituacao/i3geo/issues/4
|
|
CVE-2022-34093 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L44
|
|
CVE-2022-34094 - https://github.com/edmarmoretti/i3geo/issues/5
|
|
CVE-2022-34094 - https://github.com/saladesituacao/i3geo/issues/5
|
|
CVE-2022-34094 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L65
|
|
CVE-2022-34100 - https://www.crestron.com/Security/Security_Advisories
|
|
CVE-2022-34101 - https://www.crestron.com/Security/Security_Advisories
|
|
CVE-2022-34102 - https://www.crestron.com/Security/Security_Advisories
|
|
CVE-2022-34113 - https://github.com/dataease/dataease/issues/2431
|
|
CVE-2022-34121 - https://github.com/CuppaCMS/CuppaCMS/issues/18
|
|
CVE-2022-34121 - https://github.com/hansmach1ne/MyExploits/tree/main/LFI_in_CuppaCMS_templates
|
|
CVE-2022-34125 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/
|
|
CVE-2022-34126 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/
|
|
CVE-2022-34127 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/
|
|
CVE-2022-34128 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/
|
|
CVE-2022-3414 - https://vuldb.com/?id.210246
|
|
CVE-2022-34140 - http://packetstormsecurity.com/files/168012/Feehi-CMS-2.1.1-Cross-Site-Scripting.html
|
|
CVE-2022-34140 - http://packetstormsecurity.com/files/168476/Feehi-CMS-2.1.1-Remote-Code-Execution.html
|
|
CVE-2022-3415 - https://wpscan.com/vulnerability/012c5b64-ef76-4539-afd8-40f6c329ae88
|
|
CVE-2022-3416 - https://wpscan.com/vulnerability/f927dbe0-3939-4882-a469-1309ac737ee6
|
|
CVE-2022-34169 - http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
|
|
CVE-2022-34169 - https://www.oracle.com/security-alerts/cpujul2022.html
|
|
CVE-2022-3418 - https://wpscan.com/vulnerability/ccbb74f5-1b8f-4ea6-96bc-ddf62af7f94d
|
|
CVE-2022-3419 - https://wpscan.com/vulnerability/5909a423-9841-449c-a569-f687c609817b
|
|
CVE-2022-3420 - https://wpscan.com/vulnerability/ce5fac6e-8da1-4042-9cf8-7988613f92a5
|
|
CVE-2022-3422 - https://huntr.dev/bounties/02da53ab-f613-4171-8766-96b31c671551
|
|
CVE-2022-3423 - https://huntr.dev/bounties/94639d8e-8301-4432-ab80-e76e1346e631
|
|
CVE-2022-3425 - https://wpscan.com/vulnerability/df1c36bb-9861-4272-89c9-ae76e62f687c
|
|
CVE-2022-3426 - https://wpscan.com/vulnerability/bc90594e-1018-494a-b473-6416e274c59f
|
|
CVE-2022-34267 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver
|
|
CVE-2022-34268 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver
|
|
CVE-2022-34269 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver
|
|
CVE-2022-34270 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver
|
|
CVE-2022-34292 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2
|
|
CVE-2022-34296 - https://github.com/zalando/skipper/releases/tag/v0.13.218
|
|
CVE-2022-34299 - https://github.com/davea42/libdwarf-code/issues/119
|
|
CVE-2022-34300 - https://github.com/syoyo/tinyexr/issues/167
|
|
CVE-2022-34328 - https://github.com/jenaye/PMB
|
|
CVE-2022-3434 - https://vuldb.com/?id.210356
|
|
CVE-2022-3436 - http://packetstormsecurity.com/files/176007/Online-Student-Clearance-System-1.0-Shell-Upload.html
|
|
CVE-2022-3438 - https://huntr.dev/bounties/bc5689e4-221a-4200-a8ab-42c659f89f67
|
|
CVE-2022-3439 - https://huntr.dev/bounties/37b86c45-b240-4626-bd53-b6f02d10e0d7
|
|
CVE-2022-34393 - https://www.dell.com/support/kbdoc/000204686
|
|
CVE-2022-3440 - https://wpscan.com/vulnerability/e39fcf30-1e69-4399-854c-4c5b6ccc22a2
|
|
CVE-2022-3441 - https://wpscan.com/vulnerability/7b51b1f0-17ca-46b7-ada1-20bd926f3023
|
|
CVE-2022-3442 - https://vuldb.com/?id.210374
|
|
CVE-2022-3442 - https://www.pentagrid.ch/en/blog/reflected-xss-vulnerability-in-crealogix-ebics-implementation/
|
|
CVE-2022-34446 - https://www.dell.com/support/kbdoc/000205404
|
|
CVE-2022-34447 - https://www.dell.com/support/kbdoc/000205404
|
|
CVE-2022-34448 - https://www.dell.com/support/kbdoc/000205404
|
|
CVE-2022-34449 - https://www.dell.com/support/kbdoc/000205404
|
|
CVE-2022-34450 - https://www.dell.com/support/kbdoc/000205404
|
|
CVE-2022-34451 - https://www.dell.com/support/kbdoc/000205404
|
|
CVE-2022-34460 - https://www.dell.com/support/kbdoc/000204686
|
|
CVE-2022-34468 - https://bugzilla.mozilla.org/show_bug.cgi?id=1768537
|
|
CVE-2022-34474 - https://bugzilla.mozilla.org/show_bug.cgi?id=1677138
|
|
CVE-2022-34482 - https://bugzilla.mozilla.org/show_bug.cgi?id=845880
|
|
CVE-2022-34494 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.4
|
|
CVE-2022-34495 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.4
|
|
CVE-2022-34496 - https://github.com/feric/Findings/tree/main/Hiby/Web%20Server/File%20uploading
|
|
CVE-2022-34502 - https://github.com/radareorg/radare2/issues/20336
|
|
CVE-2022-3451 - https://wpscan.com/vulnerability/d8005cd0-8232-4d43-a4e4-14728eaf1300
|
|
CVE-2022-3452 - https://vuldb.com/?id.210436
|
|
CVE-2022-34520 - https://github.com/radareorg/radare2/issues/20354
|
|
CVE-2022-34526 - https://gitlab.com/libtiff/libtiff/-/issues/433
|
|
CVE-2022-34526 - https://gitlab.com/libtiff/libtiff/-/issues/486
|
|
CVE-2022-34527 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-34528 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-34529 - https://github.com/wasm3/wasm3/issues/337
|
|
CVE-2022-3453 - https://vuldb.com/?id.210437
|
|
CVE-2022-34549 - https://github.com/rawchen/sims/issues/6
|
|
CVE-2022-34550 - https://github.com/rawchen/sims/issues/8
|
|
CVE-2022-34551 - https://github.com/rawchen/sims/issues/7
|
|
CVE-2022-3456 - https://huntr.dev/bounties/b34412ca-50c5-4615-b7e3-5d07d33acfce
|
|
CVE-2022-34567 - https://www.redteam.tips/mango-vulnerability-disclosure-report/
|
|
CVE-2022-34570 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN579%20X3__messages.md
|
|
CVE-2022-34571 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_syslog.shtml.md
|
|
CVE-2022-34572 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_tftp.md
|
|
CVE-2022-34573 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_mb_wifibasic.assets/WiFi-Repeater_mb_wifibasic.md
|
|
CVE-2022-34574 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_Tftpd32.assets/WiFi-Repeater_Tftpd32.md
|
|
CVE-2022-34575 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_fctest.assets/WiFi-Repeater_fctest.md
|
|
CVE-2022-34576 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3_Sensitive%20information%20leakage.md
|
|
CVE-2022-34577 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3_Command%20Execution%20Vulnerability.md
|
|
CVE-2022-34578 - https://grimthereaperteam.medium.com/open-source-point-of-sale-v3-3-7-file-upload-cross-site-scripting-4900d717b2c3
|
|
CVE-2022-34592 - https://github.com/winmt/CVE/blob/main/WAVLINK%20WL-WN575A3/README.md
|
|
CVE-2022-34592 - https://github.com/winmt/my-vuls/tree/main/WAVLINK%20WL-WN575A3
|
|
CVE-2022-34593 - https://github.com/Liyou-ZY/POC/issues/1
|
|
CVE-2022-34595 - https://github.com/zhefox/IOT_Vul/blob/main/Tenda/tendaAX1803/readme_en.md
|
|
CVE-2022-34596 - https://github.com/zhefox/IOT_Vul/blob/main/Tenda/tendaAX1803/2/readme_en.md
|
|
CVE-2022-34597 - https://github.com/zhefox/IOT_Vul/blob/main/Tenda/TendaAX1806/readme_en.md
|
|
CVE-2022-34599 - https://github.com/Darry-lang1/vuln/tree/main/H3C/1
|
|
CVE-2022-34600 - https://github.com/Darry-lang1/vuln/tree/main/H3C/3
|
|
CVE-2022-34601 - https://github.com/Darry-lang1/vuln/tree/main/H3C/2
|
|
CVE-2022-34602 - https://github.com/Darry-lang1/vuln/tree/main/H3C/4
|
|
CVE-2022-34603 - https://github.com/Darry-lang1/vuln/tree/main/H3C/5
|
|
CVE-2022-34604 - https://github.com/Darry-lang1/vuln/tree/main/H3C/11
|
|
CVE-2022-34605 - https://github.com/Darry-lang1/vuln/tree/main/H3C/10
|
|
CVE-2022-34606 - https://github.com/Darry-lang1/vuln/tree/main/H3C/6
|
|
CVE-2022-34607 - https://github.com/Darry-lang1/vuln/tree/main/H3C/8
|
|
CVE-2022-34608 - https://github.com/Darry-lang1/vuln/tree/main/H3C/7
|
|
CVE-2022-34609 - https://github.com/Darry-lang1/vuln/tree/main/H3C/9
|
|
CVE-2022-34610 - https://github.com/Darry-lang1/vuln/tree/main/H3C/12
|
|
CVE-2022-34618 - https://huntr.dev/bounties/aa610613-6ebb-4544-9aa6-046dc28fe4ff/
|
|
CVE-2022-34619 - https://huntr.dev/bounties/aa610613-6ebb-4544-9aa6-046dc28fe4ff/
|
|
CVE-2022-3462 - https://wpscan.com/vulnerability/b583de48-1332-4984-8c0c-a7ed4a2397cd
|
|
CVE-2022-3463 - https://wpscan.com/vulnerability/e2a59481-db45-4b8e-b17a-447303469364
|
|
CVE-2022-3464 - https://vuldb.com/?id.210699
|
|
CVE-2022-34652 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551
|
|
CVE-2022-34668 - http://packetstormsecurity.com/files/171483/NVFLARE-Unsafe-Deserialization.html
|
|
CVE-2022-34669 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34670 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34671 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34671 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1719
|
|
CVE-2022-34671 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1720
|
|
CVE-2022-34671 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1721
|
|
CVE-2022-34672 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34673 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34674 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34675 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34676 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34677 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34678 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34679 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34680 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34681 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34682 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34683 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-34684 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-3469 - https://wpscan.com/vulnerability/017ca231-e019-4694-afa2-ab7f8481ae63
|
|
CVE-2022-3470 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20sc%20parameter%20is%20injected.pdf
|
|
CVE-2022-34704 - http://packetstormsecurity.com/files/168329/Windows-Credential-Guard-Non-Constant-Time-Comparison-Information-Disclosure.html
|
|
CVE-2022-34705 - http://packetstormsecurity.com/files/168315/Windows-Credential-Guard-BCrypt-Context-Use-After-Free-Privilege-Escalation.html
|
|
CVE-2022-34707 - http://packetstormsecurity.com/files/168311/Windows-Kernel-Refcount-Overflow-Use-After-Free.html
|
|
CVE-2022-34708 - http://packetstormsecurity.com/files/168312/Windows-Kernel-Unchecked-Blink-Cell-Index-Invalid-Read-Write.html
|
|
CVE-2022-34709 - http://packetstormsecurity.com/files/168314/Windows-Credential-Guard-ASN1-Decoder-Type-Confusion-Privilege-Escalation.html
|
|
CVE-2022-3471 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20searccity%20parameter%20is%20injected.pdf
|
|
CVE-2022-3471 - https://vuldb.com/?id.210715
|
|
CVE-2022-34710 - http://packetstormsecurity.com/files/168318/Windows-Credential-Guard-Insufficient-Checks-On-Kerberos-Encryption-Type-Use.html
|
|
CVE-2022-34711 - http://packetstormsecurity.com/files/168325/Windows-Credential-Guard-KerbIumCreateApReqAuthenticator-Key-Information-Disclosure.html
|
|
CVE-2022-34712 - http://packetstormsecurity.com/files/168326/Windows-Credential-Guard-KerbIumGetNtlmSupplementalCredential-Information-Disclosure.html
|
|
CVE-2022-34716 - http://packetstormsecurity.com/files/168332/.NET-XML-Signature-Verification-External-Entity-Injection.html
|
|
CVE-2022-3472 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20cityedit%20parameter%20is%20injected.pdf
|
|
CVE-2022-3472 - https://vuldb.com/?id.210716
|
|
CVE-2022-3473 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20ci%20parameter%20is%20injected.pdf
|
|
CVE-2022-3473 - https://vuldb.com/?id.210717
|
|
CVE-2022-34753 - http://packetstormsecurity.com/files/167783/Schneider-Electric-SpaceLogic-C-Bus-Home-Controller-5200WHC2-Remote-Root.html
|
|
CVE-2022-34756 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-04_Easergy_P5_Security_Notification.pdf
|
|
CVE-2022-34757 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-04_Easergy_P5_Security_Notification.pdf
|
|
CVE-2022-34758 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-04_Easergy_P5_Security_Notification.pdf
|
|
CVE-2022-3477 - https://wpscan.com/vulnerability/993a95d2-6fce-48de-ae17-06ce2db829ef
|
|
CVE-2022-3481 - https://wpscan.com/vulnerability/c5e395f8-257e-49eb-afbd-9c1e26045373
|
|
CVE-2022-3484 - https://wpscan.com/vulnerability/3afaed61-6187-4915-acf0-16e79d5c2464
|
|
CVE-2022-34845 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1580
|
|
CVE-2022-34850 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1578
|
|
CVE-2022-3486 - https://gitlab.com/gitlab-org/gitlab/-/issues/377810
|
|
CVE-2022-34873 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-34874 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-34875 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-3489 - https://wpscan.com/vulnerability/36d78b6c-0da5-44f8-b7b3-eae78edac505
|
|
CVE-2022-3490 - https://wpscan.com/vulnerability/0c9f22e0-1d46-4957-9ba5-5cca78861136
|
|
CVE-2022-34903 - http://www.openwall.com/lists/oss-security/2022/07/02/1
|
|
CVE-2022-34903 - https://www.openwall.com/lists/oss-security/2022/06/30/1
|
|
CVE-2022-34906 - https://claroty.com/2022/07/25/blog-research-with-management-comes-risk-finding-flaws-in-filewave-mdm/
|
|
CVE-2022-34906 - https://kb.filewave.com/pages/viewpage.action?pageId=55544244
|
|
CVE-2022-34907 - https://claroty.com/2022/07/25/blog-research-with-management-comes-risk-finding-flaws-in-filewave-mdm/
|
|
CVE-2022-34907 - https://kb.filewave.com/pages/viewpage.action?pageId=55544244
|
|
CVE-2022-3491 - https://huntr.dev/bounties/6e6e05c2-2cf7-4aa5-a817-a62007bf92cb
|
|
CVE-2022-34914 - https://www.webswing.org/blog/header-injection-vulnerability-cve-2022-34914
|
|
CVE-2022-34918 - http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
|
|
CVE-2022-34918 - http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html
|
|
CVE-2022-34918 - http://www.openwall.com/lists/oss-security/2022/07/05/1
|
|
CVE-2022-34918 - https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/#u
|
|
CVE-2022-34918 - https://www.openwall.com/lists/oss-security/2022/07/02/3
|
|
CVE-2022-34918 - https://www.randorisec.fr/crack-linux-firewall/
|
|
CVE-2022-34937 - https://github.com/u5cms/u5cms/issues/51
|
|
CVE-2022-3494 - https://wpscan.com/vulnerability/71db75c0-5907-4237-884f-8db88b1a9b34
|
|
CVE-2022-3495 - https://github.com/Hakcoder/Simple-Online-Public-Access-Catalog-OPAC---SQL-injection/blob/main/POC
|
|
CVE-2022-3495 - https://vuldb.com/?id.210784
|
|
CVE-2022-34955 - https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261
|
|
CVE-2022-34956 - https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261
|
|
CVE-2022-34961 - https://grimthereaperteam.medium.com/cve-2022-34961-ossn-6-3-lts-stored-xss-vulnerability-at-users-timeline-819a9d4e5e6c
|
|
CVE-2022-34962 - https://grimthereaperteam.medium.com/cve-2022-34962-ossn-6-3-lts-stored-xss-vulnerability-at-group-timeline-6ebe28dd6034
|
|
CVE-2022-34963 - https://grimthereaperteam.medium.com/cve-2022-34963-ossn-6-3-lts-stored-xss-vulnerability-at-news-feed-b8ae8f2fa5f3
|
|
CVE-2022-34964 - https://grimthereaperteam.medium.com/ossn-6-3-lts-stored-xss-vulnerability-at-sitepages-ba91bbeccf1c
|
|
CVE-2022-34965 - https://grimthereaperteam.medium.com/cve-2022-34965-open-source-social-network-6-3-3f61db82880
|
|
CVE-2022-34966 - https://grimthereaperteam.medium.com/cve-2022-34966-ossn-6-3-lts-html-injection-vulnerability-at-location-parameter-3fe791dd22c6
|
|
CVE-2022-34968 - https://jira.percona.com/browse/PS-8294
|
|
CVE-2022-34970 - https://github.com/0xhebi/CVE-2022-34970/blob/master/report.md
|
|
CVE-2022-34972 - https://packetstormsecurity.com/files/167605/OpenCart-3.x-So-Filter-Shop-By-SQL-Injection.html
|
|
CVE-2022-34973 - https://github.com/1759134370/iot/blob/main/DIR-820L.md
|
|
CVE-2022-34973 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-34974 - https://github.com/1759134370/iot/blob/main/DIR-810L.md
|
|
CVE-2022-34974 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-34988 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Inout-Blockchain-AltExchanger/2022/Cross-site-scripting-DOM-based-IG-js
|
|
CVE-2022-34989 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Md-Saiful-Islam-creativesaiful/2021/Ecommerce-project-with-php-and-mysqli-Fruits-Bazar
|
|
CVE-2022-35014 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35014.md
|
|
CVE-2022-35015 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35015.md
|
|
CVE-2022-35016 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35016.md
|
|
CVE-2022-35017 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35017.md
|
|
CVE-2022-35018 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35018.md
|
|
CVE-2022-35019 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35019.md
|
|
CVE-2022-3502 - https://github.com/draco1725/POC/blob/main/Exploit/Stored%20Xss
|
|
CVE-2022-35020 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35020.md
|
|
CVE-2022-35021 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35021.md
|
|
CVE-2022-35022 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35022.md
|
|
CVE-2022-35023 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35023.md
|
|
CVE-2022-35024 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35024.md
|
|
CVE-2022-35025 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35025.md
|
|
CVE-2022-35026 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35026.md
|
|
CVE-2022-35027 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35027.md
|
|
CVE-2022-35028 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35028.md
|
|
CVE-2022-35029 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35029.md
|
|
CVE-2022-3503 - https://github.com/DisguisedRoot/Exploit/blob/main/Persistent%20XSS/PoC
|
|
CVE-2022-35030 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35030.md
|
|
CVE-2022-35031 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35031.md
|
|
CVE-2022-35032 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35032.md
|
|
CVE-2022-35034 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35034.md
|
|
CVE-2022-35035 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35035.md
|
|
CVE-2022-35036 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35036.md
|
|
CVE-2022-35037 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35037.md
|
|
CVE-2022-35038 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35038.md
|
|
CVE-2022-35039 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35039.md
|
|
CVE-2022-35040 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35040.md
|
|
CVE-2022-35041 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35041.md
|
|
CVE-2022-35042 - https://drive.google.com/file/d/1Gj8rA1kD89lxUZVb_t-s3-18-ospJRJC/view?usp=sharing
|
|
CVE-2022-35042 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35042.md
|
|
CVE-2022-35043 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35043.md
|
|
CVE-2022-35044 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35044.md
|
|
CVE-2022-35045 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35045.md
|
|
CVE-2022-35046 - https://drive.google.com/file/d/1M8imA5zUlsMA6lgUbvLQ6rbEn6CO6QKq/view?usp=sharing
|
|
CVE-2022-35046 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35046.md
|
|
CVE-2022-35047 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35047.md
|
|
CVE-2022-35048 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35048.md
|
|
CVE-2022-35049 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35049.md
|
|
CVE-2022-35050 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35050.md
|
|
CVE-2022-35051 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35051.md
|
|
CVE-2022-35052 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35052.md
|
|
CVE-2022-35053 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35053.md
|
|
CVE-2022-35054 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35054.md
|
|
CVE-2022-35055 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35055.md
|
|
CVE-2022-35056 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35056.md
|
|
CVE-2022-35058 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35058.md
|
|
CVE-2022-35059 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35059.md
|
|
CVE-2022-3506 - https://huntr.dev/bounties/08251542-88f6-4264-9074-a89984034828
|
|
CVE-2022-35060 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35060.md
|
|
CVE-2022-35061 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35061.md
|
|
CVE-2022-35062 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35062.md
|
|
CVE-2022-35063 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35063.md
|
|
CVE-2022-35064 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35064.md
|
|
CVE-2022-35065 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35065.md
|
|
CVE-2022-35066 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35066.md
|
|
CVE-2022-35067 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35067.md
|
|
CVE-2022-35068 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35068.md
|
|
CVE-2022-35069 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35069.md
|
|
CVE-2022-35070 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35070.md
|
|
CVE-2022-35080 - https://github.com/Cvjark/Poc/blob/main/swftools/png2swf/CVE-2022-35080.md
|
|
CVE-2022-35081 - https://github.com/Cvjark/Poc/blob/main/swftools/png2swf/CVE-2022-35081.md
|
|
CVE-2022-35085 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35085.md
|
|
CVE-2022-35086 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35086.md
|
|
CVE-2022-35087 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35087.md
|
|
CVE-2022-35088 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35088.md
|
|
CVE-2022-35089 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35089.md
|
|
CVE-2022-35090 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35090.md
|
|
CVE-2022-35091 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35091.md
|
|
CVE-2022-35092 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35092.md
|
|
CVE-2022-35093 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35093.md
|
|
CVE-2022-35094 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35094.md
|
|
CVE-2022-35095 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35095.md
|
|
CVE-2022-35096 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35096.md
|
|
CVE-2022-35097 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35097.md
|
|
CVE-2022-35098 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35098.md
|
|
CVE-2022-35099 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35099.md
|
|
CVE-2022-35107 - https://github.com/matthiaskramm/swftools/issues/184
|
|
CVE-2022-35108 - https://github.com/matthiaskramm/swftools/issues/184
|
|
CVE-2022-35109 - https://github.com/matthiaskramm/swftools/issues/184
|
|
CVE-2022-3511 - https://wpscan.com/vulnerability/9e57285a-0023-4711-874c-6e7b3c2673d1
|
|
CVE-2022-35110 - https://github.com/matthiaskramm/swftools/issues/184
|
|
CVE-2022-35111 - https://github.com/matthiaskramm/swftools/issues/184
|
|
CVE-2022-35122 - https://www.pizzapower.me/2022/06/30/the-incredibly-insecure-weather-station/
|
|
CVE-2022-35131 - https://github.com/laurent22/joplin/releases/tag/v2.9.1
|
|
CVE-2022-35131 - https://github.com/ly1g3/Joplin-CVE-2022-35131
|
|
CVE-2022-35134 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35134.html
|
|
CVE-2022-35135 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35135-cve-2022-35136.html
|
|
CVE-2022-35136 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35135-cve-2022-35136.html
|
|
CVE-2022-35137 - https://securityblog101.blogspot.com/2022/09/cve-id-cve-2022-35137.html
|
|
CVE-2022-3514 - https://gitlab.com/gitlab-org/gitlab/-/issues/377978
|
|
CVE-2022-35147 - https://github.com/doramart/DoraCMS/issues/256
|
|
CVE-2022-35150 - https://github.com/To-LingJing/CVE-Issues/blob/main/baijiacms/upload_file.md
|
|
CVE-2022-35151 - https://github.com/kekingcn/kkFileView/issues/366
|
|
CVE-2022-35154 - https://github.com/secf0ra11/secf0ra11.github.io/blob/main/Shopro_SQL_injection.md
|
|
CVE-2022-35155 - https://github.com/shellshok3/Cross-Site-Scripting-XSS/blob/main/Bus%20Pass%20Management%20System%201.0.md
|
|
CVE-2022-35156 - https://packetstormsecurity.com/files/168555/Bus-Pass-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2022-3516 - https://huntr.dev/bounties/734bb5eb-715c-4b64-bd33-280300a63748
|
|
CVE-2022-35164 - https://github.com/LibreDWG/libredwg/issues/497
|
|
CVE-2022-35165 - https://github.com/axiomatic-systems/Bento4/issues/712
|
|
CVE-2022-35166 - https://github.com/thorfdbg/libjpeg/issues/76
|
|
CVE-2022-35168 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35169 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35170 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35171 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35172 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35173 - https://github.com/nginx/njs/issues/553
|
|
CVE-2022-35174 - https://www.youtube.com/watch?v=0lngc_zPTSg
|
|
CVE-2022-3518 - https://github.com/lohith19/CVE-2022-3518/blob/main/POC
|
|
CVE-2022-35191 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-35192 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-35193 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35193
|
|
CVE-2022-35194 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35194
|
|
CVE-2022-35195 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35195
|
|
CVE-2022-35196 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35196
|
|
CVE-2022-3520 - https://huntr.dev/bounties/c1db3b70-f4fe-481f-8a24-0b1449c94246
|
|
CVE-2022-35203 - https://medium.com/@shrutukapoor25/cve-2022-35203-2372a0728279
|
|
CVE-2022-35204 - https://github.com/vitejs/vite/issues/8498
|
|
CVE-2022-35206 - https://sourceware.org/bugzilla/show_bug.cgi?id=29290
|
|
CVE-2022-3521 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec7eede369fe5b0d085ac51fdbb95184f87bfc6c
|
|
CVE-2022-35224 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35225 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35226 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35227 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35228 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-3523 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16ce101db85db694a91380aa4c89b25530871d33
|
|
CVE-2022-3524 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11
|
|
CVE-2022-35244 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1582
|
|
CVE-2022-3525 - https://huntr.dev/bounties/ed048e8d-87af-440a-a91f-be1e65a40330
|
|
CVE-2022-35260 - http://seclists.org/fulldisclosure/2023/Jan/19
|
|
CVE-2022-35261 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
|
CVE-2022-35262 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
|
CVE-2022-35263 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
|
CVE-2022-35264 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
|
CVE-2022-35265 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
|
CVE-2022-35266 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
|
CVE-2022-35267 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
|
CVE-2022-35268 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
|
CVE-2022-35269 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
|
CVE-2022-35270 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
|
CVE-2022-35271 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
|
CVE-2022-35290 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35291 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35292 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35293 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35294 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35295 - http://packetstormsecurity.com/files/170233/SAP-Host-Agent-Privilege-Escalation.html
|
|
CVE-2022-35295 - http://seclists.org/fulldisclosure/2022/Dec/12
|
|
CVE-2022-35295 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35296 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35297 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35298 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-35299 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-3536 - https://wpscan.com/vulnerability/6af63aab-b7a6-4ef6-8604-4b4b99467a34
|
|
CVE-2022-3537 - https://wpscan.com/vulnerability/696868f7-409d-422d-87f4-92fc6bf6e74e
|
|
CVE-2022-3538 - https://wpscan.com/vulnerability/337ee7ed-9ade-4567-b976-88386cbcf036
|
|
CVE-2022-3539 - https://wpscan.com/vulnerability/ab3b0052-1a74-4ba3-b6d2-78cfe56029db
|
|
CVE-2022-35401 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1586
|
|
CVE-2022-35405 - http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html
|
|
CVE-2022-35405 - https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html
|
|
CVE-2022-35411 - http://packetstormsecurity.com/files/167872/rpc.py-0.6.0-Remote-Code-Execution.html
|
|
CVE-2022-35411 - https://medium.com/@elias.hohl/remote-code-execution-0-day-in-rpc-py-709c76690c30
|
|
CVE-2022-35413 - https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview
|
|
CVE-2022-35413 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb
|
|
CVE-2022-35414 - https://sick.codes/sick-2022-113
|
|
CVE-2022-3546 - https://github.com/thehackingverse/Stored-xss-/blob/main/Poc
|
|
CVE-2022-3547 - https://github.com/lakshaya0557/POCs/blob/main/POC
|
|
CVE-2022-3548 - https://github.com/Ramansh123454/POCs/blob/main/POC
|
|
CVE-2022-3548 - https://vuldb.com/?id.211048
|
|
CVE-2022-3549 - https://github.com/Ramansh123454/POCs/blob/main/CSMS_RCE
|
|
CVE-2022-35493 - https://github.com/Keyvanhardani/Exploit-eShop-Multipurpose-Ecommerce-Store-Website-3.0.4-Cross-Site-Scripting-XSS/blob/main/README.md
|
|
CVE-2022-35503 - https://osm.etsi.org/
|
|
CVE-2022-35503 - https://osm.etsi.org/news-events/blog/83-cve-2022-35503-disclosure
|
|
CVE-2022-35505 - https://github.com/h3xduck/TripleCross/issues/40
|
|
CVE-2022-35506 - https://github.com/h3xduck/TripleCross/issues/40
|
|
CVE-2022-35507 - https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/
|
|
CVE-2022-35508 - https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/
|
|
CVE-2022-35513 - http://packetstormsecurity.com/files/168428/Blink1Control2-2.2.7-Weak-Password-Encryption.html
|
|
CVE-2022-35513 - https://github.com/p1ckzi/CVE-2022-35513
|
|
CVE-2022-35516 - https://github.com/whitehatl/Vulnerability/blob/main/web/dedecms/5.7.93/Login.poc.md
|
|
CVE-2022-35517 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wizard_router_meshshtml-command-injection-in-admcgi
|
|
CVE-2022-35518 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-nas_diskshtml-command-injection-in-nascgi
|
|
CVE-2022-35519 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#command-injection-occurs-when-deleting-blacklist-in-wavlink-router-ac1200-page-cli_black_listshtml-in-firewallcgi
|
|
CVE-2022-3552 - http://packetstormsecurity.com/files/171542/BoxBilling-4.22.1.5-Remote-Code-Execution.html
|
|
CVE-2022-3552 - https://huntr.dev/bounties/c6e2973d-386d-4667-9426-10d10828539b
|
|
CVE-2022-35520 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-ledonoffshtml-hidden-parameter-ufconf-command-injection-in-apicgi
|
|
CVE-2022-35521 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-man_securityshtml-command-injection-in-firewallcgi
|
|
CVE-2022-35522 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wanshtml-command-injection-in-admcgi
|
|
CVE-2022-35523 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#command-injection-occurs-when-adding-blacklist-in-wavlink-router-ac1200-page-cli_black_listshtml-in-firewallcgi
|
|
CVE-2022-35524 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wizard_repshtml-command-injection-in-admcgi
|
|
CVE-2022-35525 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-ledonoffshtml-command-injection-in-admcgi
|
|
CVE-2022-35526 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-loginshtml-command-injection-in-logincgi
|
|
CVE-2022-35533 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-qosshtml-hidden-parameters-command-injection-in-qoscgi
|
|
CVE-2022-35534 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-wifi_multi_ssidshtml-command-injection-in-wirelesscgi
|
|
CVE-2022-35535 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#command-injection-occurs-when-adding-extender-in-wavlink-router-ac1200-page-wifi_meshshtml-in-wirelesscgi
|
|
CVE-2022-35536 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-qosshtml-command-injection-in-qoscgi
|
|
CVE-2022-35537 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-wifi_meshshtml-hidden-parameter-command-injection-in-wirelesscgi
|
|
CVE-2022-35538 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#command-injection-occurs-when-clicking-the-button-in-wavlink-router-ac1200-page-wifi_meshshtml-in-wirelesscgi
|
|
CVE-2022-35540 - https://github.com/dotnetcore/AgileConfig/issues/91
|
|
CVE-2022-3558 - https://wpscan.com/vulnerability/e3d72e04-9cdf-4b7d-953e-876e26abdfc6
|
|
CVE-2022-35582 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb
|
|
CVE-2022-35583 - http://packetstormsecurity.com/files/171446/wkhtmltopdf-0.12.6-Server-Side-Request-Forgery.html
|
|
CVE-2022-35583 - https://drive.google.com/file/d/1LAmf_6CJLk5qDp0an2s_gVQ0TN2wmht5/view?usp=sharing
|
|
CVE-2022-35585 - https://huntr.dev/bounties/5-other-forkcms/
|
|
CVE-2022-35587 - https://huntr.dev/bounties/6-other-forkcms/
|
|
CVE-2022-35589 - https://huntr.dev/bounties/7-other-forkcms/
|
|
CVE-2022-35590 - https://huntr.dev/bounties/4-other-forkcms/
|
|
CVE-2022-35598 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
|
CVE-2022-35599 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
|
CVE-2022-35601 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
|
CVE-2022-35602 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
|
CVE-2022-35603 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
|
CVE-2022-35604 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
|
CVE-2022-35605 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
|
CVE-2022-35606 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
|
CVE-2022-35611 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35611.html
|
|
CVE-2022-35612 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35612.html
|
|
CVE-2022-35619 - https://github.com/1759134370/iot/blob/main/DIR-818L.md
|
|
CVE-2022-35619 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-3562 - https://huntr.dev/bounties/bb9f76db-1314-44ae-9ccc-2b69679aa657
|
|
CVE-2022-35620 - https://github.com/1759134370/iot/blob/main/DIR-818L.md
|
|
CVE-2022-35620 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-35621 - https://github.com/MacherCS/CVE_Evoh_Contract
|
|
CVE-2022-3569 - http://packetstormsecurity.com/files/169430/Zimbra-Privilege-Escalation.html
|
|
CVE-2022-3570 - https://gitlab.com/libtiff/libtiff/-/issues/381
|
|
CVE-2022-3570 - https://gitlab.com/libtiff/libtiff/-/issues/386
|
|
CVE-2022-35737 - https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/
|
|
CVE-2022-35739 - https://raxis.com/blog/cve-2022-35739
|
|
CVE-2022-3574 - https://wpscan.com/vulnerability/0eae5189-81af-4344-9e96-dd1f4e223d41
|
|
CVE-2022-35768 - http://packetstormsecurity.com/files/168313/Windows-Kernel-Registry-Hive-Memory-Problems.html
|
|
CVE-2022-3577 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=945a9a8e448b65bec055d37eba58f711b39f66f0
|
|
CVE-2022-3577 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc4ef9d5724973193bfa5ebed181dba6de3a56db
|
|
CVE-2022-35771 - http://packetstormsecurity.com/files/168319/Windows-Credential-Guard-Kerberos-Change-Password-Privilege-Escalation.html
|
|
CVE-2022-3578 - https://wpscan.com/vulnerability/17596b0e-ff45-4d0c-8e57-a31101e30345
|
|
CVE-2022-3579 - https://github.com/DisguisedRoot/Exploit/blob/main/SQLInj/POC
|
|
CVE-2022-3579 - https://vuldb.com/?id.211186
|
|
CVE-2022-3582 - https://github.com/jusstSahil/CSRF-/blob/main/POC
|
|
CVE-2022-35822 - http://packetstormsecurity.com/files/168331/Windows-Credential-Guard-TGT-Renewal-Information-Disclosure.html
|
|
CVE-2022-3583 - https://github.com/joinia/webray.com.cn/blob/main/Canteen-Management-System/Canteensql1.md
|
|
CVE-2022-3583 - https://vuldb.com/?id.211192
|
|
CVE-2022-3584 - https://github.com/joinia/webray.com.cn/blob/main/Canteen-Management-System/Canteensql2.md
|
|
CVE-2022-3585 - https://github.com/souravkr529/CSRF-in-Cold-Storage-Management-System/blob/main/PoC
|
|
CVE-2022-35866 - http://packetstormsecurity.com/files/176794/Vinchin-Backup-And-Recovery-7.2-Default-MySQL-Credentials.html
|
|
CVE-2022-3587 - https://github.com/rsrahulsingh05/POC/blob/main/Stored%20XSS
|
|
CVE-2022-35874 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581
|
|
CVE-2022-35875 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581
|
|
CVE-2022-35876 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581
|
|
CVE-2022-35877 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581
|
|
CVE-2022-35878 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583
|
|
CVE-2022-35879 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583
|
|
CVE-2022-35880 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583
|
|
CVE-2022-35881 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583
|
|
CVE-2022-35884 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585
|
|
CVE-2022-35885 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585
|
|
CVE-2022-35886 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585
|
|
CVE-2022-35887 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585
|
|
CVE-2022-35890 - https://github.com/sourceincite/randy
|
|
CVE-2022-35899 - https://github.com/AngeloPioAmirante/CVE-2022-35899
|
|
CVE-2022-35899 - https://packetstormsecurity.com/files/167763/Asus-GameSDK-1.0.0.4-Unquoted-Service-Path.html
|
|
CVE-2022-35899 - https://www.exploit-db.com/exploits/50985
|
|
CVE-2022-3590 - https://wpscan.com/vulnerability/c8814e6e-78b3-4f63-a1d3-6906a84c1f11
|
|
CVE-2022-3591 - https://huntr.dev/bounties/a5a998c2-4b07-47a7-91be-dbc1886b3921
|
|
CVE-2022-35911 - https://packetstormsecurity.com/files/167797/Patlite-1.46-Buffer-Overflow.html
|
|
CVE-2022-35913 - https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2022-July/020737.html
|
|
CVE-2022-35914 - http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html
|
|
CVE-2022-35919 - http://packetstormsecurity.com/files/175010/Minio-2022-07-29T19-40-48Z-Path-Traversal.html
|
|
CVE-2022-35923 - https://huntr.dev/bounties/2d92f644-593b-43b4-bfd1-c8042ac60609/
|
|
CVE-2022-35925 - https://huntr.dev/bounties/ebee593d-3fd0-4985-bf5e-7e7927e08bf6/
|
|
CVE-2022-35953 - https://huntr.dev/bounties/67ca22bd-19c6-466b-955a-b1ee2da0c575/
|
|
CVE-2022-3597 - https://gitlab.com/libtiff/libtiff/-/issues/413
|
|
CVE-2022-3598 - https://gitlab.com/libtiff/libtiff/-/issues/435
|
|
CVE-2022-3599 - https://gitlab.com/libtiff/libtiff/-/issues/398
|
|
CVE-2022-3600 - https://wpscan.com/vulnerability/16e2d970-19d0-42d1-8fb1-e7cb14ace1d0
|
|
CVE-2022-3601 - https://wpscan.com/vulnerability/28b7ee77-5826-4c98-b09a-8f197e1a6d18
|
|
CVE-2022-3602 - http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html
|
|
CVE-2022-3603 - https://wpscan.com/vulnerability/376e2bc7-2eb9-4e0a-809c-1582940ebdc7
|
|
CVE-2022-3604 - https://wpscan.com/vulnerability/300ebfcd-c500-464e-b919-acfeb72593de/
|
|
CVE-2022-3605 - https://wpscan.com/vulnerability/28ecdf61-e478-42c3-87c0-80a9912eadb2
|
|
CVE-2022-36067 - https://github.com/patriksimek/vm2/issues/467
|
|
CVE-2022-36067 - https://www.oxeye.io/blog/vm2-sandbreak-vulnerability-cve-2022-36067
|
|
CVE-2022-36069 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/
|
|
CVE-2022-3608 - https://huntr.dev/bounties/8f0f3635-9d81-4c55-9826-2ba955c3a850
|
|
CVE-2022-36082 - https://github.com/mansuf/mangadex-downloader/security/advisories/GHSA-r9x7-2xmr-v8fw
|
|
CVE-2022-36087 - https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7
|
|
CVE-2022-3609 - https://wpscan.com/vulnerability/b893cac2-6511-4e2a-9eff-baf0f3cc9d7e
|
|
CVE-2022-3610 - https://wpscan.com/vulnerability/33b52dd7-613f-46e4-b8ee-beddd31689eb
|
|
CVE-2022-36111 - https://github.com/codenotary/immudb/tree/master/docs/security/vulnerabilities/linear-fake
|
|
CVE-2022-36115 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
|
|
CVE-2022-36116 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
|
|
CVE-2022-36117 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
|
|
CVE-2022-36118 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
|
|
CVE-2022-36119 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
|
|
CVE-2022-36120 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
|
|
CVE-2022-36121 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
|
|
CVE-2022-36123 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.13
|
|
CVE-2022-36123 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2022-128.md
|
|
CVE-2022-36123 - https://sick.codes/sick-2022-128
|
|
CVE-2022-36126 - https://github.com/sourceincite/randy
|
|
CVE-2022-36126 - https://srcincite.io/advisories/src-2022-0014/
|
|
CVE-2022-36131 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-038.txt
|
|
CVE-2022-36136 - https://grimthereaperteam.medium.com/churchcrm-version-4-4-5-stored-xss-vulnerability-at-deposit-commend-839d2c587d6e
|
|
CVE-2022-36137 - https://grimthereaperteam.medium.com/churchcrm-version-4-4-5-stored-xss-vulnerability-at-sheader-2ed4184030f7
|
|
CVE-2022-36139 - https://github.com/djcsdy/swfmill/issues/56
|
|
CVE-2022-36140 - https://github.com/djcsdy/swfmill/issues/57
|
|
CVE-2022-36141 - https://github.com/djcsdy/swfmill/issues/58
|
|
CVE-2022-36142 - https://github.com/djcsdy/swfmill/issues/61
|
|
CVE-2022-36143 - https://github.com/djcsdy/swfmill/issues/62
|
|
CVE-2022-36144 - https://github.com/djcsdy/swfmill/issues/63
|
|
CVE-2022-36145 - https://github.com/djcsdy/swfmill/issues/64
|
|
CVE-2022-36146 - https://github.com/djcsdy/swfmill/issues/65
|
|
CVE-2022-36148 - https://github.com/nu774/fdkaac/issues/52
|
|
CVE-2022-36161 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2022/Orange-Station-1.0
|
|
CVE-2022-36170 - https://github.com/prismbreak/vulnerabilities/issues/2
|
|
CVE-2022-36171 - https://github.com/prismbreak/vulnerabilities/issues/2
|
|
CVE-2022-36173 - https://public-exposure.inform.social/post/integrity-checking/
|
|
CVE-2022-36174 - https://public-exposure.inform.social/post/integrity-checking/
|
|
CVE-2022-36179 - https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/
|
|
CVE-2022-3618 - https://wpscan.com/vulnerability/2011dc7b-8e8c-4190-ab34-de288e14685b
|
|
CVE-2022-36180 - https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/
|
|
CVE-2022-36182 - https://packetstormsecurity.com/files/168654/Hashicorp-Boundary-Clickjacking.html
|
|
CVE-2022-36186 - https://github.com/gpac/gpac/issues/2223
|
|
CVE-2022-36190 - https://github.com/gpac/gpac/issues/2220
|
|
CVE-2022-36191 - https://github.com/gpac/gpac/issues/2218
|
|
CVE-2022-36193 - https://github.com/G37SYS73M/Advisory_G37SYS73M/blob/main/CVE-2022-36193/POC.md
|
|
CVE-2022-36194 - http://packetstormsecurity.com/files/168149/Centreon-22.04.0-Cross-Site-Scripting.html
|
|
CVE-2022-36194 - https://github.com/amdsyad/poc-dump/blob/main/Stored%20XSS%20in%20name%20parameter%20in%20Centreon%20version%2022.04.0
|
|
CVE-2022-36197 - https://github.com/bigtreecms/BigTree-CMS/issues/392
|
|
CVE-2022-36198 - https://github.com/jcarabantes/Bus-Vulnerabilities
|
|
CVE-2022-36200 - https://github.com/afaq1337/CVE-2022-36200
|
|
CVE-2022-36201 - http://packetstormsecurity.com/files/168212/Doctors-Appointment-System-1.0-SQL-Injection.html
|
|
CVE-2022-36203 - http://packetstormsecurity.com/files/168211/Doctors-Appointment-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2022-36215 - https://github.com/whitehatl/Vulnerability/blob/main/web/dedebiz/6.0.0/sys_info.poc.md
|
|
CVE-2022-36216 - https://github.com/whitehatl/Vulnerability/blob/main/web/dedecms/5.7.94/member_toadmin.poc.md
|
|
CVE-2022-36223 - https://medium.com/@cupc4k3/administrator-account-takeover-in-emby-media-server-616fc2a6704f
|
|
CVE-2022-36224 - https://github.com/dayrui/xunruicms/issues/1
|
|
CVE-2022-36225 - https://github.com/weng-xianhu/eyoucms/issues/26
|
|
CVE-2022-36226 - https://github.com/we1h0/SiteServer-CMS-Remote-download-Getshell
|
|
CVE-2022-36227 - https://github.com/libarchive/libarchive/issues/1754
|
|
CVE-2022-36231 - https://github.com/affix/CVE-2022-36231
|
|
CVE-2022-36234 - https://github.com/kashimAstro/SimpleNetwork/issues/22
|
|
CVE-2022-36251 - https://github.com/ZhenKaiHe/bug_report/blob/main/vendors/onetnom23/clinics-patient-management-system/XSS-1.md
|
|
CVE-2022-36254 - https://gist.github.com/ziyishen97/c464b459df73c4cef241e7ec774b7cf6
|
|
CVE-2022-36255 - https://gist.github.com/ziyishen97/268678bca3034c64861b135946ee9fc3
|
|
CVE-2022-36255 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
|
CVE-2022-36256 - https://gist.github.com/ziyishen97/0fd90a5939ffb401e8a74f4a415e1610
|
|
CVE-2022-36256 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
|
CVE-2022-36257 - https://gist.github.com/ziyishen97/ff3816032a76796f45368ed243ab3343
|
|
CVE-2022-36257 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
|
CVE-2022-36258 - https://gist.github.com/ziyishen97/3553468b534c250f7b0d47e8a4c5fa52
|
|
CVE-2022-36258 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
|
CVE-2022-36259 - https://gist.github.com/ziyishen97/47666f584cd4cdad1d0f6af5f33a56db
|
|
CVE-2022-36259 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
|
CVE-2022-3626 - https://gitlab.com/libtiff/libtiff/-/issues/426
|
|
CVE-2022-36262 - https://github.com/taogogo/taocms/issues/34
|
|
CVE-2022-36262 - https://github.com/taogogo/taocms/issues/34?by=xboy(topsec)
|
|
CVE-2022-36266 - http://packetstormsecurity.com/files/168114/FLIX-AX8-1.46.16-Remote-Command-Execution.html
|
|
CVE-2022-36267 - http://packetstormsecurity.com/files/168047/AirSpot-5410-0.3.4.1-4-Remote-Command-Injection.html
|
|
CVE-2022-36271 - https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271
|
|
CVE-2022-36273 - https://github.com/F0und-icu/CVEIDs/tree/main/TendaAC9
|
|
CVE-2022-36279 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1605
|
|
CVE-2022-36280 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2071
|
|
CVE-2022-36306 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9
|
|
CVE-2022-36309 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4
|
|
CVE-2022-3631 - https://wpscan.com/vulnerability/13966b61-7e65-4493-8bd8-828d6d4441d5
|
|
CVE-2022-36310 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm
|
|
CVE-2022-36314 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
|
CVE-2022-36315 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
|
CVE-2022-36316 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
|
CVE-2022-36317 - https://bugzilla.mozilla.org/show_bug.cgi?id=1759951
|
|
CVE-2022-36317 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
|
CVE-2022-36318 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
|
CVE-2022-36319 - https://bugzilla.mozilla.org/show_bug.cgi?id=1737722
|
|
CVE-2022-36319 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
|
CVE-2022-3632 - https://wpscan.com/vulnerability/4c1b0e5e-245a-4d1f-a561-e91af906e62d
|
|
CVE-2022-36320 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
|
CVE-2022-36329 - https://www.westerndigital.com/support/product-security/wdc-23003-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-9-4-0-191
|
|
CVE-2022-36330 - https://www.westerndigital.com/support/product-security/wdc-23003-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-9-4-0-191
|
|
CVE-2022-3634 - https://wpscan.com/vulnerability/b5eeefb0-fb5e-4ca6-a6f0-67f4be4a2b10
|
|
CVE-2022-36354 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1629
|
|
CVE-2022-36402 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2072
|
|
CVE-2022-36429 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1597
|
|
CVE-2022-3643 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
|
CVE-2022-36436 - https://cert.grnet.gr/en/blog/cve-2022-36436-twisted-vnc-authentication-proxy-authentication-bypass/
|
|
CVE-2022-36440 - https://github.com/spwpun/pocs
|
|
CVE-2022-36440 - https://github.com/spwpun/pocs/blob/main/frr-bgpd.md
|
|
CVE-2022-36442 - https://www.zebra.com/us/en/products/software/mobile-computers/mobile-app-utilities/enterprise-home-screen.html
|
|
CVE-2022-36443 - https://www.zebra.com/us/en/products/software/mobile-computers/mobile-app-utilities/enterprise-home-screen.html
|
|
CVE-2022-36446 - http://packetstormsecurity.com/files/167894/Webmin-1.996-Remote-Code-Execution.html
|
|
CVE-2022-36446 - http://packetstormsecurity.com/files/168049/Webmin-Package-Updates-Command-Injection.html
|
|
CVE-2022-36446 - https://www.exploit-db.com/exploits/50998
|
|
CVE-2022-36447 - https://www.chia.net/2022/07/25/upgrading-the-cat-standard.en.html
|
|
CVE-2022-36449 - http://packetstormsecurity.com/files/168431/Arm-Mali-Released-Buffer-Use-After-Free.html
|
|
CVE-2022-36449 - http://packetstormsecurity.com/files/168432/Arm-Mali-Physical-Address-Exposure.html
|
|
CVE-2022-36449 - http://packetstormsecurity.com/files/168433/Arm-Mali-Race-Condition.html
|
|
CVE-2022-36449 - http://packetstormsecurity.com/files/168434/Arm-Mali-CSF-Missing-Buffer-Size-Check.html
|
|
CVE-2022-36455 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3600R/1/readme.md
|
|
CVE-2022-36456 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A720R/1
|
|
CVE-2022-36458 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/2/readme.md
|
|
CVE-2022-36459 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/3/readme.md
|
|
CVE-2022-36460 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/4/readme.md
|
|
CVE-2022-36461 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/5/readme.md
|
|
CVE-2022-36462 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/6/readme.md
|
|
CVE-2022-36463 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/8/readme.md
|
|
CVE-2022-36464 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/10/readme.md
|
|
CVE-2022-36465 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/9/readme.md
|
|
CVE-2022-36466 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/7/readme.md
|
|
CVE-2022-36467 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/4/readme.md
|
|
CVE-2022-36468 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/5/readme.md
|
|
CVE-2022-36469 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/7/readme.md
|
|
CVE-2022-36470 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/6/readme.md
|
|
CVE-2022-36471 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/2/readme.md
|
|
CVE-2022-36472 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/8/readme.md
|
|
CVE-2022-36473 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/10/readme.md
|
|
CVE-2022-36474 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/9/readme.md
|
|
CVE-2022-36475 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/3/readme.md
|
|
CVE-2022-36477 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/12/readme.md
|
|
CVE-2022-36478 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/11/readme.md
|
|
CVE-2022-36479 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/3
|
|
CVE-2022-36480 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/8
|
|
CVE-2022-36481 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/1
|
|
CVE-2022-36482 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/6
|
|
CVE-2022-36483 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/9
|
|
CVE-2022-36484 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/7
|
|
CVE-2022-36485 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/5
|
|
CVE-2022-36486 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/4
|
|
CVE-2022-36487 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/2
|
|
CVE-2022-36488 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/10
|
|
CVE-2022-36489 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/1
|
|
CVE-2022-36490 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/5
|
|
CVE-2022-36491 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/2
|
|
CVE-2022-36492 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/4
|
|
CVE-2022-36493 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/8
|
|
CVE-2022-36494 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/7
|
|
CVE-2022-36495 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/6
|
|
CVE-2022-36496 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/9
|
|
CVE-2022-36497 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/10
|
|
CVE-2022-36498 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/3
|
|
CVE-2022-36499 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/19
|
|
CVE-2022-3650 - https://seclists.org/oss-sec/2022/q4/41
|
|
CVE-2022-36500 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/13
|
|
CVE-2022-36501 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/16
|
|
CVE-2022-36502 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/18
|
|
CVE-2022-36503 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/17
|
|
CVE-2022-36504 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/11
|
|
CVE-2022-36505 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/20
|
|
CVE-2022-36506 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/14
|
|
CVE-2022-36507 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/12
|
|
CVE-2022-36508 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/15
|
|
CVE-2022-36509 - https://github.com/Darry-lang1/vuln/blob/main/H3C/GR3200/1/readme.md
|
|
CVE-2022-36510 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR2200/1
|
|
CVE-2022-36511 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/2
|
|
CVE-2022-36513 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/5
|
|
CVE-2022-36514 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/1
|
|
CVE-2022-36515 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/4
|
|
CVE-2022-36516 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/3
|
|
CVE-2022-36517 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/7
|
|
CVE-2022-36518 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/8
|
|
CVE-2022-36519 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/9
|
|
CVE-2022-36520 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/10
|
|
CVE-2022-36522 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-36522/README.md
|
|
CVE-2022-36522 - https://seclists.org/fulldisclosure/2021/Jul/0
|
|
CVE-2022-36523 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-36524 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-36525 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-36526 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-36532 - https://lutrasecurity.com/en/articles/cve-2022-36532/
|
|
CVE-2022-36534 - http://packetstormsecurity.com/files/170245/Syncovery-For-Linux-Web-GUI-Authenticated-Remote-Command-Execution.html
|
|
CVE-2022-36537 - https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw/
|
|
CVE-2022-3654 - http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html
|
|
CVE-2022-36543 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md
|
|
CVE-2022-36544 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md
|
|
CVE-2022-36545 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md
|
|
CVE-2022-36546 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md
|
|
CVE-2022-36551 - http://packetstormsecurity.com/files/171548/Label-Studio-1.5.0-Server-Side-Request-Forgery.html
|
|
CVE-2022-36561 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42308
|
|
CVE-2022-36568 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/3/tenda_ac9_setPptpUserList.md
|
|
CVE-2022-36569 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/4/tenda_ac9_setMacFilterCfg.md
|
|
CVE-2022-36570 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/1/tenda_ac9_SetLEDCfg.md
|
|
CVE-2022-36571 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/2/tenda_ac9_WanParameterSetting.md
|
|
CVE-2022-36572 - https://github.com/BreakALegCml/try/blob/main/SinSiuEnterpriseWebsiteSystem
|
|
CVE-2022-36577 - https://github.com/Cherry-toto/jizhicms/issues/77
|
|
CVE-2022-36579 - https://github.com/wellcms/wellcms/issues/11
|
|
CVE-2022-36580 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Online-Ordering-System/Arbitrary-File-Upload-Vulnerability.md
|
|
CVE-2022-36581 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Online-Ordering-System/SQL-Injection-Vulnerability.md
|
|
CVE-2022-36582 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Garage-Management-System/Arbitrary-File-Upload-Vulnerability.md
|
|
CVE-2022-36588 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-36593 - https://github.com/kekingcn/kkFileView/issues/370
|
|
CVE-2022-36606 - https://github.com/cloudwebsoft/ywoa/issues/25
|
|
CVE-2022-36617 - https://startrekdude.github.io/arqbackup.html
|
|
CVE-2022-36619 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/setmac/readme.md
|
|
CVE-2022-36619 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-3662 - https://github.com/axiomatic-systems/Bento4/issues/802
|
|
CVE-2022-36620 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/addRouting
|
|
CVE-2022-36620 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/addRouting/readme.md
|
|
CVE-2022-36620 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-3663 - https://github.com/axiomatic-systems/Bento4/issues/800
|
|
CVE-2022-3663 - https://vuldb.com/?id.212003
|
|
CVE-2022-36633 - http://packetstormsecurity.com/files/168477/Teleport-10.1.1-Remote-Code-Execution.html
|
|
CVE-2022-36633 - https://github.com/gravitational/teleport
|
|
CVE-2022-36633 - https://packetstormsecurity.com/files/168137/Teleport-9.3.6-Command-Injection.html
|
|
CVE-2022-36634 - https://seclists.org/fulldisclosure/2022/Sep/29
|
|
CVE-2022-36636 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/
|
|
CVE-2022-36637 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/
|
|
CVE-2022-36638 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/
|
|
CVE-2022-36639 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/
|
|
CVE-2022-3664 - https://github.com/axiomatic-systems/Bento4/issues/794
|
|
CVE-2022-36640 - http://influxdata.com
|
|
CVE-2022-36640 - http://influxdb.com
|
|
CVE-2022-36640 - https://www.influxdata.com/
|
|
CVE-2022-36642 - https://cyber-guy.gitbook.io/cyber-guy/pocs/omnia-node-mpx-auth-bypass-via-lfd
|
|
CVE-2022-36642 - https://www.exploit-db.com/exploits/50996
|
|
CVE-2022-36647 - https://github.com/pkuvcl/davs2/issues/29
|
|
CVE-2022-3665 - https://github.com/axiomatic-systems/Bento4/issues/794
|
|
CVE-2022-36657 - https://github.com/z1pwn/bug_report/blob/main/vendors/kingbhob02/library-management-system/XSS-1.md
|
|
CVE-2022-3666 - https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip
|
|
CVE-2022-3666 - https://github.com/axiomatic-systems/Bento4/issues/793
|
|
CVE-2022-36664 - https://packetstormsecurity.com/files/168599/Password-Manager-For-IIS-2.0-Cross-Site-Scripting.html
|
|
CVE-2022-36667 - https://github.com/saitamang/POC-DUMP/blob/main/Garage%20Management%20System/README.md
|
|
CVE-2022-36668 - https://github.com/saitamang/POC-DUMP/blob/main/Garage%20Management%20System/README.md
|
|
CVE-2022-36669 - https://github.com/saitamang/POC-DUMP/blob/main/Hospital%20Information%20System/README.md
|
|
CVE-2022-36669 - https://github.com/saitamang/POC-DUMP/tree/main/Hospital%20Information%20System
|
|
CVE-2022-36669 - https://packetstormsecurity.com/files/167803/Hospital-Information-System-1.0-SQL-Injection.html
|
|
CVE-2022-3668 - https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip
|
|
CVE-2022-3668 - https://github.com/axiomatic-systems/Bento4/issues/776
|
|
CVE-2022-3669 - https://github.com/axiomatic-systems/Bento4/files/9675042/Bug_2_POC.zip
|
|
CVE-2022-3669 - https://github.com/axiomatic-systems/Bento4/issues/776
|
|
CVE-2022-3670 - https://github.com/axiomatic-systems/Bento4/files/9675049/Bug_3_POC.zip
|
|
CVE-2022-3670 - https://github.com/axiomatic-systems/Bento4/issues/776
|
|
CVE-2022-36736 - https://github.com/UditChavda/Udit-Chavda-CVE/blob/main/CVE-2022-36736
|
|
CVE-2022-36755 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-36756 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-36759 - https://hackmd.io/@hieuleuxuan/OFOS_Sql_Injection
|
|
CVE-2022-3677 - https://wpscan.com/vulnerability/5a7c6367-a3e6-4411-8865-2a9dbc9f1450
|
|
CVE-2022-36788 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1593
|
|
CVE-2022-3679 - https://wpscan.com/vulnerability/ec4b9bf7-71d6-4528-9dd1-cc7779624760
|
|
CVE-2022-36804 - http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html
|
|
CVE-2022-36804 - http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html
|
|
CVE-2022-36879 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
|
|
CVE-2022-3688 - https://wpscan.com/vulnerability/03b2c6e6-b86e-4143-a84a-7a99060c4848
|
|
CVE-2022-3689 - https://wpscan.com/vulnerability/e9c551a3-7482-4421-8197-5886d028776c
|
|
CVE-2022-3690 - https://wpscan.com/vulnerability/725f6ae4-7ec5-4d7c-9533-c9b61b59cc2b
|
|
CVE-2022-3691 - https://wpscan.com/vulnerability/4248a0af-1b7e-4e29-8129-3f40c1d0c560
|
|
CVE-2022-3694 - https://wpscan.com/vulnerability/ad12bab7-9baf-4646-a93a-0d3286407c1e
|
|
CVE-2022-36943 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-vgvw-6xcf-qqfc
|
|
CVE-2022-37030 - http://www.openwall.com/lists/oss-security/2022/08/04/1
|
|
CVE-2022-37030 - https://bugzilla.suse.com/show_bug.cgi?id=1201949
|
|
CVE-2022-37035 - https://docs.google.com/document/d/1TqYEcZbFeDTMKe2N4XRFwyAjw_mynIHfvzwbx1fmJj8/edit?usp=sharing
|
|
CVE-2022-37035 - https://github.com/FRRouting/frr/issues/11698
|
|
CVE-2022-3704 - https://github.com/rails/rails/issues/46244
|
|
CVE-2022-37042 - http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html
|
|
CVE-2022-37047 - https://github.com/appneta/tcpreplay/issues/734
|
|
CVE-2022-37048 - https://github.com/appneta/tcpreplay/issues/735
|
|
CVE-2022-37049 - https://github.com/appneta/tcpreplay/issues/736
|
|
CVE-2022-3705 - http://seclists.org/fulldisclosure/2023/Jan/19
|
|
CVE-2022-37050 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1274
|
|
CVE-2022-37051 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1276
|
|
CVE-2022-37052 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1278
|
|
CVE-2022-37055 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-37056 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-37057 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-37060 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html
|
|
CVE-2022-37060 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5493.php
|
|
CVE-2022-37061 - http://packetstormsecurity.com/files/168114/FLIX-AX8-1.46.16-Remote-Command-Execution.html
|
|
CVE-2022-37061 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html
|
|
CVE-2022-37061 - http://packetstormsecurity.com/files/169701/FLIR-AX8-1.46.16-Remote-Command-Injection.html
|
|
CVE-2022-37061 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5491.php
|
|
CVE-2022-37062 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html
|
|
CVE-2022-37063 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html
|
|
CVE-2022-37066 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/15
|
|
CVE-2022-37067 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/17
|
|
CVE-2022-37068 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/14
|
|
CVE-2022-37069 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/12
|
|
CVE-2022-37070 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/19
|
|
CVE-2022-37071 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/18
|
|
CVE-2022-37072 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/16
|
|
CVE-2022-37073 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/13
|
|
CVE-2022-37074 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/11
|
|
CVE-2022-37075 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/7
|
|
CVE-2022-37076 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/4
|
|
CVE-2022-37077 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/9
|
|
CVE-2022-37078 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/6
|
|
CVE-2022-37079 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/5
|
|
CVE-2022-37080 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/8
|
|
CVE-2022-37081 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/2
|
|
CVE-2022-37082 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/3
|
|
CVE-2022-37083 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/1
|
|
CVE-2022-37084 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/10
|
|
CVE-2022-37085 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/9
|
|
CVE-2022-37086 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/3
|
|
CVE-2022-37087 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/6
|
|
CVE-2022-37088 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/4
|
|
CVE-2022-37089 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/2
|
|
CVE-2022-37090 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/8
|
|
CVE-2022-37091 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/10
|
|
CVE-2022-37092 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/5
|
|
CVE-2022-37093 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/1
|
|
CVE-2022-37094 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/7
|
|
CVE-2022-37095 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/16
|
|
CVE-2022-37096 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/11
|
|
CVE-2022-37097 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/13
|
|
CVE-2022-37098 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/12
|
|
CVE-2022-37099 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/14
|
|
CVE-2022-37100 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/15
|
|
CVE-2022-37109 - http://packetstormsecurity.com/files/171478/Raspberry-Pi-Camera-Server-1.0-Authentication-Bypass.html
|
|
CVE-2022-37109 - https://medium.com/@elias.hohl/authentication-bypass-vulnerability-in-camp-a-raspberry-pi-camera-server-477e5d270904
|
|
CVE-2022-37122 - https://packetstormsecurity.com/files/167684/
|
|
CVE-2022-37122 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5709.php
|
|
CVE-2022-37123 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/form2userconfig_cgi/readme.md
|
|
CVE-2022-37123 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-37125 - https://github.com/z1r00/IOT_Vul/tree/main/dlink/Dir816/form2systime_cgi
|
|
CVE-2022-37125 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-37128 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/wizard_end/readme.md
|
|
CVE-2022-37128 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-37129 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/SystemCommand/readme.md
|
|
CVE-2022-37129 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-37130 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/Diagnosis
|
|
CVE-2022-37130 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/Diagnosis/readme.md
|
|
CVE-2022-37130 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-37133 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/doReboot/readme.md
|
|
CVE-2022-37133 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-37134 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/form2Wan_cgi/readme.md
|
|
CVE-2022-37134 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-37137 - https://github.com/saitamang/POC-DUMP/tree/main/PayMoney
|
|
CVE-2022-37138 - https://github.com/saitamang/POC-DUMP/blob/main/Loan%20Management%20System/README.md
|
|
CVE-2022-37139 - https://github.com/saitamang/POC-DUMP/blob/main/Loan%20Management%20System/README.md
|
|
CVE-2022-37140 - https://github.com/saitamang/POC-DUMP/tree/main/PayMoney
|
|
CVE-2022-37149 - https://github.com/fxc233/iot-vul/blob/main/WAVLINK/WN575A3/Readme.md
|
|
CVE-2022-37155 - https://github.com/Abyss-W4tcher/ab4yss-wr4iteups/blob/ffa980faa9e3598d49d6fb7def4f7a67cfb5f427/SPIP%20-%20Pentest/SPIP%204.1.2/SPIP_4.1.2_AUTH_RCE/SPIP_4.1.2_AUTH_RCE_Abyss_Watcher_12_07_22.md
|
|
CVE-2022-37155 - https://spawnzii.github.io/posts/2022/07/how-we-have-pwned-root-me-in-2022/
|
|
CVE-2022-37159 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/rce/rce_file_upload.md
|
|
CVE-2022-37160 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/csrf/csrf.md
|
|
CVE-2022-37161 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/svg_xss/svg_xss.md
|
|
CVE-2022-37162 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/calendar_xss/calendar_xss.md
|
|
CVE-2022-37175 - https://www.cnblogs.com/Amalll/p/16527552.html
|
|
CVE-2022-37176 - https://drive.google.com/drive/folders/1L6ojSooP8sbZLQYRsAxlb0IWVAZef8Z7?usp=sharing
|
|
CVE-2022-37183 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Piwigo/2022/12.3.0
|
|
CVE-2022-37184 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2022/Garage-Management-System-1.0-SFU
|
|
CVE-2022-37191 - https://github.com/CuppaCMS/CuppaCMS/issues/20
|
|
CVE-2022-37191 - https://github.com/badru8612/CuppaCMS-Authenticated-LFI-Vulnerability
|
|
CVE-2022-37197 - https://www.exploit-db.com/exploits/51029
|
|
CVE-2022-3720 - https://wpscan.com/vulnerability/0139a23c-4896-4aef-ab56-dcf7f07f01e5
|
|
CVE-2022-37201 - https://github.com/AgainstTheLight/CVE-2022-37201/blob/main/README.md
|
|
CVE-2022-37201 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql4.md
|
|
CVE-2022-37202 - https://github.com/AgainstTheLight/CVE-2022-37202/blob/main/README.md
|
|
CVE-2022-37202 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql1.md
|
|
CVE-2022-37203 - https://github.com/AgainstTheLight/CVE-2022-37203/blob/main/README.md
|
|
CVE-2022-37203 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql3.md
|
|
CVE-2022-37204 - https://github.com/AgainstTheLight/CVE-2022-37204/blob/main/README.md
|
|
CVE-2022-37204 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql7.md
|
|
CVE-2022-37205 - https://github.com/AgainstTheLight/CVE-2022-37205/blob/main/README.md
|
|
CVE-2022-37205 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql8.md
|
|
CVE-2022-37207 - https://github.com/AgainstTheLight/CVE-2022-37207/blob/main/README.md
|
|
CVE-2022-37207 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql10.md
|
|
CVE-2022-37208 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql5.md
|
|
CVE-2022-37209 - https://github.com/AgainstTheLight/CVE-2022-37209/tree/main
|
|
CVE-2022-37209 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql9.md
|
|
CVE-2022-3721 - https://huntr.dev/bounties/a3c506f0-5f8a-4eaa-b8cc-46fb9e35cf7a
|
|
CVE-2022-37237 - https://github.com/ZLMediaKit/ZLMediaKit/issues/1839
|
|
CVE-2022-3725 - https://gitlab.com/wireshark/wireshark/-/issues/18378
|
|
CVE-2022-37253 - https://packetstormsecurity.com/files/167875/Crime-Reporting-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2022-37255 - http://packetstormsecurity.com/files/171540/Tapo-C310-RTSP-Server-1.3.0-Unauthorized-Video-Stream-Access.html
|
|
CVE-2022-37292 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/1
|
|
CVE-2022-37298 - https://github.com/dbyio/cve-2022-37298
|
|
CVE-2022-3730 - https://vuldb.com/?id.212412
|
|
CVE-2022-37301 - https://www.se.com/us/en/download/document/SEVD-2022-221-02/
|
|
CVE-2022-37306 - http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html
|
|
CVE-2022-37307 - https://seclists.org/fulldisclosure/2022/Nov/18
|
|
CVE-2022-37308 - https://seclists.org/fulldisclosure/2022/Nov/18
|
|
CVE-2022-37309 - https://seclists.org/fulldisclosure/2022/Nov/18
|
|
CVE-2022-37310 - https://seclists.org/fulldisclosure/2022/Nov/18
|
|
CVE-2022-37311 - https://seclists.org/fulldisclosure/2022/Nov/18
|
|
CVE-2022-37312 - https://seclists.org/fulldisclosure/2022/Nov/18
|
|
CVE-2022-37313 - https://seclists.org/fulldisclosure/2022/Nov/18
|
|
CVE-2022-37326 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2
|
|
CVE-2022-37331 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1672
|
|
CVE-2022-37332 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1602
|
|
CVE-2022-37337 - https://kb.netgear.com/000065417/Security-Advisory-for-Command-Injection-on-Some-Orbi-WiFi-Systems-PSV-2022-0187
|
|
CVE-2022-37337 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1596
|
|
CVE-2022-3739 - https://wpscan.com/vulnerability/b9f39ced-1e0f-4559-b861-39ddcbcd1249/
|
|
CVE-2022-37393 - https://attackerkb.com/topics/92AeLOE1M1/cve-2022-37393/rapid7-analysis
|
|
CVE-2022-37400 - https://www.openoffice.org/security/cves/CVE-2022-37400.html
|
|
CVE-2022-37401 - https://www.openoffice.org/security/cves/CVE-2022-37401.html
|
|
CVE-2022-3741 - https://huntr.dev/bounties/46f6e07e-f438-4540-938a-510047f987d0
|
|
CVE-2022-37415 - https://gist.github.com/alfarom256/220cb75816ca2b5556e7fc8d8d2803a0
|
|
CVE-2022-37416 - https://issuetracker.google.com/issues/231026247
|
|
CVE-2022-37424 - https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/
|
|
CVE-2022-37425 - https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/
|
|
CVE-2022-37426 - https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/
|
|
CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/37
|
|
CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/38
|
|
CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/41
|
|
CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/42
|
|
CVE-2022-37434 - https://github.com/ivd38/zlib_overflow
|
|
CVE-2022-37450 - https://medium.com/@aviv.yaish/uncle-maker-time-stamping-out-the-competition-in-ethereum-d27c1cb62fef
|
|
CVE-2022-37454 - https://mouha.be/sha-3-buffer-overflow/
|
|
CVE-2022-37461 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=30693
|
|
CVE-2022-37462 - https://www.campusguard.com/post/going-beyond-pen-testing-to-identify-zero-day-exploits
|
|
CVE-2022-3747 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3747.txt
|
|
CVE-2022-3750 - https://wpscan.com/vulnerability/5019db80-0356-497d-b488-a26a5de78676
|
|
CVE-2022-3751 - https://huntr.dev/bounties/a04cff99-5d53-45e5-a882-771b0fad62c9
|
|
CVE-2022-3753 - https://wpscan.com/vulnerability/8e88a5b9-6f1d-40de-99fc-8e1e66646c2b
|
|
CVE-2022-3754 - https://huntr.dev/bounties/f4711d7f-1368-48ab-9bef-45f32e356c47
|
|
CVE-2022-37599 - https://github.com/webpack/loader-utils/issues/216
|
|
CVE-2022-37601 - https://github.com/webpack/loader-utils/issues/212
|
|
CVE-2022-37601 - https://github.com/webpack/loader-utils/issues/212#issuecomment-1319192884
|
|
CVE-2022-37601 - https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826
|
|
CVE-2022-37611 - https://github.com/tschaub/gh-pages/blob/e363b144defe8e555f5a54251a6f7f1297c0e3f6/lib/util.js#L11
|
|
CVE-2022-37611 - https://github.com/tschaub/gh-pages/blob/e363b144defe8e555f5a54251a6f7f1297c0e3f6/lib/util.js#L16
|
|
CVE-2022-37616 - https://github.com/xmldom/xmldom/issues/436
|
|
CVE-2022-37616 - https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826
|
|
CVE-2022-37616 - https://github.com/xmldom/xmldom/issues/436#issuecomment-1327776560
|
|
CVE-2022-3762 - https://wpscan.com/vulnerability/96ef4bb8-a054-48ae-b29c-b3060acd01ac
|
|
CVE-2022-3763 - https://wpscan.com/vulnerability/7ab15530-8321-487d-97a5-1469b51fcc3f
|
|
CVE-2022-3764 - https://wpscan.com/vulnerability/9d49df6b-e2f1-4662-90d2-84c29c3b1cb0/
|
|
CVE-2022-3765 - https://huntr.dev/bounties/613143a1-8e51-449a-b214-12458308835d
|
|
CVE-2022-3766 - https://huntr.dev/bounties/d9666520-4ff5-43bb-aacf-50c8e5570983
|
|
CVE-2022-37661 - http://packetstormsecurity.com/files/168336/SmartRG-Router-2.6.13-Remote-Code-Execution.html
|
|
CVE-2022-37661 - http://packetstormsecurity.com/files/169816/SmartRG-Router-SR510n-2.6.13-Remote-Code-Execution.html
|
|
CVE-2022-37661 - https://packetstormsecurity.com/files/cve/CVE-2022-37661
|
|
CVE-2022-3768 - https://bulletin.iese.de/post/wp-smart-contracts_1-3-11/
|
|
CVE-2022-3768 - https://wpscan.com/vulnerability/1d8bf5bb-5a17-49b7-a5ba-5f2866e1f8a3
|
|
CVE-2022-3769 - https://bulletin.iese.de/post/owm-weather_5-6-8/
|
|
CVE-2022-3769 - https://wpscan.com/vulnerability/2f9ffc1e-c8a9-47bb-a76b-d043c93e63f8
|
|
CVE-2022-37700 - https://medium.com/@sc0p3hacker/cve-2022-37700-directory-transversal-in-zentao-easy-soft-alm-2573c1f0fc21
|
|
CVE-2022-37703 - https://github.com/MaherAzzouzi/CVE-2022-37703
|
|
CVE-2022-37704 - https://github.com/MaherAzzouzi/CVE-2022-37704
|
|
CVE-2022-37705 - https://github.com/MaherAzzouzi/CVE-2022-37705
|
|
CVE-2022-37706 - https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit
|
|
CVE-2022-37709 - https://github.com/fmsh-seclab/TesMla
|
|
CVE-2022-37709 - https://youtu.be/cPhYW5FzA9A
|
|
CVE-2022-37718 - https://www.cryptnetix.com/blog/2022/09/14/Edge-Nexus-Vulnerability-Disclosure.html
|
|
CVE-2022-37719 - https://www.cryptnetix.com/blog/2022/09/14/Edge-Nexus-Vulnerability-Disclosure.html
|
|
CVE-2022-37731 - https://github.com/whiex/webvue2/blob/gh-pages/ftcmsxss.md
|
|
CVE-2022-3774 - http://packetstormsecurity.com/files/169604/Train-Scheduler-App-1.0-Insecure-Direct-Object-Reference.html
|
|
CVE-2022-3774 - https://github.com/rohit0x5/poc/blob/main/idor
|
|
CVE-2022-3774 - https://vuldb.com/?id.212504
|
|
CVE-2022-37768 - https://github.com/thorfdbg/libjpeg/issues/77
|
|
CVE-2022-37769 - https://github.com/thorfdbg/libjpeg/issues/78
|
|
CVE-2022-37770 - https://github.com/thorfdbg/libjpeg/issues/79
|
|
CVE-2022-37771 - https://packetstormsecurity.com/files/167913/IObit-Malware-Fighter-9.2-Tampering-Privilege-Escalation.html
|
|
CVE-2022-37775 - http://genesys.com
|
|
CVE-2022-37775 - http://packetstormsecurity.com/files/168410/Genesys-PureConnect-Cross-Site-Scripting.html
|
|
CVE-2022-37781 - https://github.com/nu774/fdkaac/issues/54
|
|
CVE-2022-37794 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Library%20Management%20System%20with%20QR%20code%20Attendance%20and%20Auto%20Generate%20Library%20Card%20-%20SQL%20injections.md
|
|
CVE-2022-37797 - https://redmine.lighttpd.net/issues/3165
|
|
CVE-2022-37798 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/5
|
|
CVE-2022-37799 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/2
|
|
CVE-2022-37800 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/7
|
|
CVE-2022-37801 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/9
|
|
CVE-2022-37802 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/6
|
|
CVE-2022-37803 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/8
|
|
CVE-2022-37804 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/3
|
|
CVE-2022-37805 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/1
|
|
CVE-2022-37806 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/4
|
|
CVE-2022-37807 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/10
|
|
CVE-2022-37808 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/15
|
|
CVE-2022-37809 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/11
|
|
CVE-2022-37810 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/19
|
|
CVE-2022-37811 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/17
|
|
CVE-2022-37812 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/12
|
|
CVE-2022-37813 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/16
|
|
CVE-2022-37814 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/14
|
|
CVE-2022-37815 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/18
|
|
CVE-2022-37816 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/13
|
|
CVE-2022-37817 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/4
|
|
CVE-2022-37818 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/2
|
|
CVE-2022-37819 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/7
|
|
CVE-2022-37820 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/8
|
|
CVE-2022-37821 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/6
|
|
CVE-2022-37822 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/3
|
|
CVE-2022-37823 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/1
|
|
CVE-2022-37824 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/5
|
|
CVE-2022-37839 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/5.md
|
|
CVE-2022-3784 - https://github.com/axiomatic-systems/Bento4/issues/806
|
|
CVE-2022-3784 - https://vuldb.com/?id.212563
|
|
CVE-2022-37840 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/3.md
|
|
CVE-2022-37842 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/1.md
|
|
CVE-2022-37843 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/4.md
|
|
CVE-2022-3785 - https://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.zip
|
|
CVE-2022-3785 - https://github.com/axiomatic-systems/Bento4/issues/780
|
|
CVE-2022-37956 - http://packetstormsecurity.com/files/168723/Windows-Kernel-Registry-Subkey-Lists-Integer-Overflow.html
|
|
CVE-2022-3797 - https://vuldb.com/?id.212633
|
|
CVE-2022-3798 - https://github.com/IBAX-io/go-ibax/issues/2060
|
|
CVE-2022-37988 - http://packetstormsecurity.com/files/169731/Windows-Kernel-Registry-Use-After-Free.html
|
|
CVE-2022-3799 - https://github.com/IBAX-io/go-ibax/issues/2060
|
|
CVE-2022-37991 - http://packetstormsecurity.com/files/169807/Windows-Kernel-Long-Registry-Key-Value-Out-Of-Bounds-Read.html
|
|
CVE-2022-3800 - https://github.com/IBAX-io/go-ibax/issues/2061
|
|
CVE-2022-3801 - https://github.com/IBAX-io/go-ibax/issues/2062
|
|
CVE-2022-3802 - https://github.com/IBAX-io/go-ibax/issues/2063
|
|
CVE-2022-38037 - http://packetstormsecurity.com/files/169791/Windows-Kernel-Type-Confusion-Memory-Corruption.html
|
|
CVE-2022-38038 - http://packetstormsecurity.com/files/169805/Windows-Kernel-Long-Registry-Path-Memory-Corruption.html
|
|
CVE-2022-38060 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589
|
|
CVE-2022-38065 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1599
|
|
CVE-2022-38066 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1615
|
|
CVE-2022-3807 - https://vuldb.com/?id.212660
|
|
CVE-2022-38072 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594
|
|
CVE-2022-38088 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1609
|
|
CVE-2022-3809 - https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip
|
|
CVE-2022-3809 - https://github.com/axiomatic-systems/Bento4/issues/779
|
|
CVE-2022-38096 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2073
|
|
CVE-2022-38097 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1601
|
|
CVE-2022-3810 - https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip
|
|
CVE-2022-3810 - https://github.com/axiomatic-systems/Bento4/issues/779
|
|
CVE-2022-38105 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1590
|
|
CVE-2022-38108 - http://packetstormsecurity.com/files/171567/SolarWinds-Information-Service-SWIS-Remote-Command-Execution.html
|
|
CVE-2022-3811 - https://wpscan.com/vulnerability/262924da-e269-4008-a24f-9f26a033b23e
|
|
CVE-2022-3812 - https://github.com/axiomatic-systems/Bento4/files/9726934/POC_mp4encrypt_631000973.zip
|
|
CVE-2022-3812 - https://github.com/axiomatic-systems/Bento4/issues/792
|
|
CVE-2022-38123 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2022-38124 - https://www.secomea.com/support/cybersecurity-advisory/
|
|
CVE-2022-3813 - https://github.com/axiomatic-systems/Bento4/files/9726974/POC_mp4edit_728838793.zip
|
|
CVE-2022-3813 - https://github.com/axiomatic-systems/Bento4/issues/792
|
|
CVE-2022-3813 - https://vuldb.com/?id.212679
|
|
CVE-2022-38131 - https://support.posit.co/hc/en-us/articles/10983374992023
|
|
CVE-2022-3814 - https://github.com/axiomatic-systems/Bento4/files/9727002/POC_mp4decrypt_477546304.zip
|
|
CVE-2022-3814 - https://github.com/axiomatic-systems/Bento4/issues/792
|
|
CVE-2022-3814 - https://vuldb.com/?id.212680
|
|
CVE-2022-38143 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1630
|
|
CVE-2022-3815 - https://github.com/axiomatic-systems/Bento4/files/9727048/POC_mp4decrypt_34393864.zip
|
|
CVE-2022-3815 - https://github.com/axiomatic-systems/Bento4/issues/792
|
|
CVE-2022-38152 - http://packetstormsecurity.com/files/170604/wolfSSL-Session-Resumption-Denial-Of-Service.html
|
|
CVE-2022-38152 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
|
|
CVE-2022-38153 - http://packetstormsecurity.com/files/170605/wolfSSL-5.3.0-Denial-Of-Service.html
|
|
CVE-2022-38153 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
|
|
CVE-2022-3816 - https://github.com/axiomatic-systems/Bento4/files/9727059/POC_mp4decrypt_654515280.zip
|
|
CVE-2022-3816 - https://github.com/axiomatic-systems/Bento4/issues/792
|
|
CVE-2022-3817 - https://github.com/axiomatic-systems/Bento4/files/9727057/POC_mp4mux_1729452038.zip
|
|
CVE-2022-3817 - https://github.com/axiomatic-systems/Bento4/issues/792
|
|
CVE-2022-38171 - https://github.com/jeffssh/CVE-2021-30860
|
|
CVE-2022-38176 - https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation
|
|
CVE-2022-38181 - http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html
|
|
CVE-2022-38181 - https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/
|
|
CVE-2022-38183 - https://herolab.usd.de/security-advisories/usd-2022-0015/
|
|
CVE-2022-38201 - https://www.esri.com/arcgis-blog/products/product/uncategorized/portal-for-arcgis-quick-capture-security-patch-is-now-available
|
|
CVE-2022-3822 - https://wpscan.com/vulnerability/48ec2e4a-0190-4f36-afd1-d5799ba28c13
|
|
CVE-2022-38222 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42320
|
|
CVE-2022-38223 - https://github.com/tats/w3m/issues/242
|
|
CVE-2022-3823 - https://wpscan.com/vulnerability/a072b091-5e5f-4e88-bd3d-2f4582e6564e
|
|
CVE-2022-3824 - https://wpscan.com/vulnerability/3ca6d724-cd79-4e07-b8d0-a8c1688abf16
|
|
CVE-2022-38256 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2022-005
|
|
CVE-2022-38258 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-3828 - https://wpscan.com/vulnerability/4188ed01-b64b-4aba-a215-e8dc5b308486
|
|
CVE-2022-3829 - https://wpscan.com/vulnerability/684941ad-541f-43f9-a7ef-d26c0f4e6e21/
|
|
CVE-2022-38295 - https://github.com/CuppaCMS/CuppaCMS/issues/34
|
|
CVE-2022-38296 - https://github.com/CuppaCMS/CuppaCMS/issues/33
|
|
CVE-2022-3830 - https://wpscan.com/vulnerability/98b2321d-fb66-4e02-9906-63af7b08d647
|
|
CVE-2022-38305 - https://github.com/MegaTKC/AeroCMS/issues/3
|
|
CVE-2022-38306 - https://github.com/lief-project/LIEF/issues/763
|
|
CVE-2022-38307 - https://github.com/lief-project/LIEF/issues/764
|
|
CVE-2022-38308 - https://github.com/WhoisZkuan/TOTOlink-A700RU
|
|
CVE-2022-38309 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/4
|
|
CVE-2022-3831 - https://wpscan.com/vulnerability/fa23bd68-69f3-440e-902c-a3bb6c8a40b8
|
|
CVE-2022-38310 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/6
|
|
CVE-2022-38311 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/5
|
|
CVE-2022-38312 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/3
|
|
CVE-2022-38313 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/2
|
|
CVE-2022-38314 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/1
|
|
CVE-2022-3832 - https://wpscan.com/vulnerability/458ec2fd-4175-4cb4-b334-b63f6e643b92
|
|
CVE-2022-38325 - https://github.com/1160300418/Vuls/blob/main/Tenda/AC/Vul_expandDlnaFile.md
|
|
CVE-2022-38326 - https://github.com/1160300418/Vuls/blob/main/Tenda/AC/Vul_NatStaticSetting.md
|
|
CVE-2022-38329 - https://albert5888.github.io/posts/CVE-2022-38329/
|
|
CVE-2022-38329 - https://github.com/albert5888/CVE-Issues/blob/main/CVE-2022-38329/file.md
|
|
CVE-2022-38329 - https://github.com/zhangqiquan/shopxian_cms/issues/4
|
|
CVE-2022-3833 - https://wpscan.com/vulnerability/41096d40-83d4-40b4-9632-afef51e8b00e
|
|
CVE-2022-38334 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42122
|
|
CVE-2022-38335 - https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220328-01_Vtiger_CRM_Stored_Cross-Site_Scripting
|
|
CVE-2022-3834 - https://wpscan.com/vulnerability/1dbe0f24-b757-49fe-846f-7c259df9f361
|
|
CVE-2022-38349 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1282
|
|
CVE-2022-3835 - https://wpscan.com/vulnerability/514ffd28-f2c2-4c95-87b5-d05ce0746f89
|
|
CVE-2022-38351 - https://nobugescapes.com/blog/privilege-escalation-from-user-operator-to-system-administrator/
|
|
CVE-2022-38357 - https://www.tenable.com/security/research/tra-2022-29
|
|
CVE-2022-38358 - https://www.tenable.com/security/research/tra-2022-29
|
|
CVE-2022-38359 - https://www.tenable.com/security/research/tra-2022-29
|
|
CVE-2022-3836 - https://wpscan.com/vulnerability/64e144fb-aa9f-4cfe-9c44-a4e1fa2e8dd5/
|
|
CVE-2022-38368 - https://docs.aviatrix.com/HowTos/PSIRT_Advisories.html#aviatrix-controller-and-gateways-unauthorized-access
|
|
CVE-2022-3837 - https://wpscan.com/vulnerability/8554ca79-5a4b-49df-a75f-5faa4136bb8c
|
|
CVE-2022-3838 - https://wpscan.com/vulnerability/2dc82bd7-651f-4af0-ad2a-c20a38eea0d0
|
|
CVE-2022-3839 - https://wpscan.com/vulnerability/809cea63-9dbe-495c-8388-e294299d3e90
|
|
CVE-2022-38393 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1592
|
|
CVE-2022-3840 - https://wpscan.com/vulnerability/71414436-ef54-4ce6-94e2-62e68d1a371d
|
|
CVE-2022-38451 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1642
|
|
CVE-2022-38452 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1595
|
|
CVE-2022-38457 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2074
|
|
CVE-2022-38458 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1598
|
|
CVE-2022-38459 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1608
|
|
CVE-2022-3846 - https://wpscan.com/vulnerability/6220c7ef-69a6-49c4-9c56-156b945446af
|
|
CVE-2022-3847 - https://bulletin.iese.de/post/get-site-to-phone-by-qr-code_0-0-1/
|
|
CVE-2022-3847 - https://wpscan.com/vulnerability/a70ad549-2e09-44fb-b894-4271ad4a84f6
|
|
CVE-2022-38473 - https://bugzilla.mozilla.org/show_bug.cgi?id=1771685
|
|
CVE-2022-3848 - https://bulletin.iese.de/post/wp-user-merger_1-5-1_2/
|
|
CVE-2022-3848 - https://wpscan.com/vulnerability/da1f0313-2576-490e-a95f-bf12de340610
|
|
CVE-2022-38488 - https://github.com/secoats/cve/tree/master/CVE-2022-38488_sqli_logrocket-oauth2-example
|
|
CVE-2022-3849 - https://bulletin.iese.de/post/wp-user-merger_1-5-1_3/
|
|
CVE-2022-3849 - https://wpscan.com/vulnerability/511327d3-499b-4ad9-8fd3-99f9f7deb4f5
|
|
CVE-2022-38495 - https://github.com/lief-project/LIEF/issues/767
|
|
CVE-2022-38496 - https://github.com/lief-project/LIEF/issues/765
|
|
CVE-2022-38497 - https://github.com/lief-project/LIEF/issues/766
|
|
CVE-2022-3850 - https://wpscan.com/vulnerability/8ae42ec0-7e3a-4ea5-8e76-0aae7b92a8e9
|
|
CVE-2022-38510 - https://github.com/whiter6666/CVE/blob/main/Tenda_TX9pro/SetNetControlList.md
|
|
CVE-2022-38511 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_A810R/downloadFile.md
|
|
CVE-2022-38528 - https://github.com/assimp/assimp/issues/4662
|
|
CVE-2022-38529 - https://github.com/syoyo/tinyexr/issues/169
|
|
CVE-2022-3853 - https://wpscan.com/vulnerability/c2bc7d23-5bfd-481c-b42b-da7ee80d9514
|
|
CVE-2022-38530 - https://github.com/gpac/gpac/issues/2216
|
|
CVE-2022-38532 - https://github.com/nam3lum/msi-central_privesc
|
|
CVE-2022-38534 - https://github.com/Jfox816/TOTOLINK-720R/blob/fb6ba109ba9c5bd1b0d8e22c88ee14bdc4a75e6b/TOTOLINK%20720%20RCode%20Execution.md
|
|
CVE-2022-38535 - https://github.com/Jfox816/TOTOLINK-720R/blob/177ee39a5a8557a6bd19586731b0e624548b67ee/totolink%20720%20RCode%20Execution2.md
|
|
CVE-2022-3855 - https://wpscan.com/vulnerability/ae44f2d8-a452-4310-b616-54d9519867eb
|
|
CVE-2022-38553 - https://github.com/4websecurity/CVE-2022-38553/blob/main/README.md
|
|
CVE-2022-38555 - https://github.com/xxy1126/Vuln/tree/main/1
|
|
CVE-2022-38556 - https://github.com/xxy1126/Vuln/tree/main/2
|
|
CVE-2022-38557 - https://github.com/xxy1126/Vuln/tree/main/3
|
|
CVE-2022-38557 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-3856 - https://bulletin.iese.de/post/comicbookmanagementsystemweeklypicks_2-0-0_1/
|
|
CVE-2022-3856 - https://wpscan.com/vulnerability/c0f5cf61-b3e2-440f-a185-61df360c1192
|
|
CVE-2022-38562 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_lan
|
|
CVE-2022-38563 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_Mac
|
|
CVE-2022-38564 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetPicListItem
|
|
CVE-2022-38565 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formEmailTest-mailpwd
|
|
CVE-2022-38566 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formEmailTest-mailname
|
|
CVE-2022-38567 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetAdConfigInfo_
|
|
CVE-2022-38568 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_hostname
|
|
CVE-2022-38569 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formDelAd
|
|
CVE-2022-3857 - https://sourceforge.net/p/libpng/bugs/300/
|
|
CVE-2022-38570 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formDelPushedAd
|
|
CVE-2022-38571 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetGuideListItem
|
|
CVE-2022-38573 - https://packetstormsecurity.com
|
|
CVE-2022-38573 - https://packetstormsecurity.com/files/168133/10-Strike-Network-Inventory-Explorer-9.3-Buffer-Overflow.html
|
|
CVE-2022-38577 - http://packetstormsecurity.com/files/168427/ProcessMaker-Privilege-Escalation.html
|
|
CVE-2022-3858 - https://wpscan.com/vulnerability/d251b6c1-602b-4d72-9d6a-bf5d5ec541ec
|
|
CVE-2022-38580 - http://packetstormsecurity.com/files/171546/X-Skipper-Proxy-0.13.237-Server-Side-Request-Forgery.html
|
|
CVE-2022-38582 - https://gist.github.com/420SmokeBigWeedHackBadDrivers/53de9ff97d95fc3e79307345fddb0a30
|
|
CVE-2022-3859 - https://kcm.trellix.com/corporate/index?page=content&id=SB10391
|
|
CVE-2022-38599 - https://gist.github.com/arleyna/20d858e11c48984d00926fa8cc0c2722
|
|
CVE-2022-3860 - https://wpscan.com/vulnerability/d99ce21f-fbb6-429c-aa3b-19c4a5eb7557
|
|
CVE-2022-38604 - https://github.com/LucaBarile/CVE-2022-38604
|
|
CVE-2022-38604 - https://lucabarile.github.io/Blog/CVE-2022-38604/index.html
|
|
CVE-2022-3861 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt
|
|
CVE-2022-38611 - https://gist.github.com/dru1d-foofus/835423de77c3522d53b9e7bdf5a28dfe
|
|
CVE-2022-3862 - https://wpscan.com/vulnerability/3db9a8f5-3335-4b8d-a067-091cbfed1efc
|
|
CVE-2022-38621 - https://github.com/Doufox/Doufox/issues/7
|
|
CVE-2022-38627 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38627/CVE-2022-38627.txt
|
|
CVE-2022-38627 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38627/CVE-2022-38627.yaml
|
|
CVE-2022-38628 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38628/CVE-2022-38628.txt
|
|
CVE-2022-38637 - https://www.youtube.com/watch?v=m8nW0p69UHU
|
|
CVE-2022-3865 - https://bulletin.iese.de/post/wp-user-merger_1-5-1_1/
|
|
CVE-2022-3865 - https://wpscan.com/vulnerability/fbe4aed8-964a-4774-bbc3-d432792bfeb6
|
|
CVE-2022-38668 - https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38668.md
|
|
CVE-2022-38668 - https://gynvael.coldwind.pl/?id=752
|
|
CVE-2022-3869 - https://huntr.dev/bounties/7de20f21-4a9b-445d-ae2b-15ade648900b
|
|
CVE-2022-38715 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1610
|
|
CVE-2022-3873 - https://huntr.dev/bounties/52a4085e-b687-489b-9ed6-f0987583ed77
|
|
CVE-2022-38730 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2
|
|
CVE-2022-38745 - https://www.openoffice.org/security/cves/CVE-2022-38745.html
|
|
CVE-2022-3875 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html
|
|
CVE-2022-3875 - https://vuldb.com/?id.216244
|
|
CVE-2022-38756 - http://packetstormsecurity.com/files/170768/Micro-Focus-GroupWise-Session-ID-Disclosure.html
|
|
CVE-2022-38756 - http://seclists.org/fulldisclosure/2023/Jan/28
|
|
CVE-2022-3876 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html
|
|
CVE-2022-3876 - https://vuldb.com/?id.216245
|
|
CVE-2022-38766 - https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766
|
|
CVE-2022-3877 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html
|
|
CVE-2022-38774 - https://www.elastic.co/community/security
|
|
CVE-2022-38775 - https://www.elastic.co/community/security
|
|
CVE-2022-38777 - https://www.elastic.co/community/security
|
|
CVE-2022-38778 - https://www.elastic.co/community/security
|
|
CVE-2022-38779 - https://www.elastic.co/community/security
|
|
CVE-2022-3878 - https://vuldb.com/?id.213039
|
|
CVE-2022-38784 - https://github.com/jeffssh/CVE-2021-30860
|
|
CVE-2022-3879 - https://wpscan.com/vulnerability/0db1762e-1401-4006-88ed-d09a4bc6585b
|
|
CVE-2022-38796 - https://www.youtube.com/watch?v=k8dp0FJnSsI
|
|
CVE-2022-3880 - https://wpscan.com/vulnerability/24743c72-310f-41e9-aac9-e05b2bb1a14e
|
|
CVE-2022-38808 - https://github.com/cloudwebsoft/ywoa/issues/26
|
|
CVE-2022-3881 - https://wpscan.com/vulnerability/c2a9cf01-051a-429a-82ca-280885114b5a
|
|
CVE-2022-38813 - https://drive.google.com/file/d/1iMswKzoUvindXUGh1cuAmi-0R84tLDaH/view?usp=sharing
|
|
CVE-2022-38813 - https://github.com/RashidKhanPathan/CVE-2022-38813
|
|
CVE-2022-38813 - https://ihexcoder.wixsite.com/secresearch/post/cve-2022-38813-privilege-escalations-in-blood-donor-management-system-v1-0
|
|
CVE-2022-38814 - https://packetstormsecurity.com/files/168065/Fiberhome-AN5506-02-B-Cross-Site-Scripting.html
|
|
CVE-2022-3882 - https://wpscan.com/vulnerability/a39c643f-eaa4-4c71-b75d-2c4fe34ac875
|
|
CVE-2022-38826 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setStaticDhcpRules_1.md
|
|
CVE-2022-38827 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setWiFiWpsStart_2.md
|
|
CVE-2022-38828 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setWiFiWpsStart_1.md
|
|
CVE-2022-38829 - https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setMacFilterCfg.md
|
|
CVE-2022-3883 - https://wpscan.com/vulnerability/8695b157-abac-4aa6-a022-e3ae41c03544
|
|
CVE-2022-38830 - https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setIPv6Status.md
|
|
CVE-2022-38831 - https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/SetNetControlList.md
|
|
CVE-2022-38840 - http://packetstormsecurity.com/files/171439/MAN-EAM-0003-3.2.4-XML-Injection.html
|
|
CVE-2022-38841 - http://packetstormsecurity.com/files/171433/Linksys-AX3200-1.1.00-Command-Injection.html
|
|
CVE-2022-38843 - https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-unrestricted-file-upload-7860b15d12bc
|
|
CVE-2022-38844 - https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-csv-injection-4c07494e2a76
|
|
CVE-2022-38846 - https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-missing-secure-flag-1664bac5ffe4
|
|
CVE-2022-38867 - https://github.com/zhaojh329/rttys/issues/117
|
|
CVE-2022-38868 - https://github.com/seccome/Ehoney/issues/59
|
|
CVE-2022-38873 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-38890 - https://github.com/nginx/njs/issues/569
|
|
CVE-2022-3891 - https://wpscan.com/vulnerability/5a69965d-d243-4d51-b7a4-d6f4b199abf1
|
|
CVE-2022-3892 - https://wpscan.com/vulnerability/33dddaec-a32a-4fce-89d6-164565be13e1
|
|
CVE-2022-38922 - https://github.com/dtssec/CVE-Disclosures/blob/main/CVE-2022-38922_CVE-2022-38923_Bluepage_CMS_SQLi/CVE-2022-38922-BluePage_CMS_3.9.md
|
|
CVE-2022-38923 - https://github.com/dtssec/CVE-Disclosures/blob/main/CVE-2022-38922_CVE-2022-38923_Bluepage_CMS_SQLi/CVE-2022-38922-BluePage_CMS_3.9.md
|
|
CVE-2022-38928 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42325&sid=7b08ba9a518a99ce3c5ff40e53fc6421
|
|
CVE-2022-38931 - https://github.com/zer0yu/CVE_Request/blob/master/baijiacms/baijiacmsv4_ssrf.md
|
|
CVE-2022-38932 - https://github.com/klange/toaruos/issues/243
|
|
CVE-2022-38934 - https://github.com/klange/toaruos/issues/244
|
|
CVE-2022-38935 - https://github.com/yourkevin/NiterForum/issues/25
|
|
CVE-2022-38936 - https://github.com/cloudwu/pbc/issues/158
|
|
CVE-2022-3894 - https://wpscan.com/vulnerability/298487b2-4141-4c9f-9bb2-e1450aefc1a8
|
|
CVE-2022-38970 - https://www.realinfosec.net/cybersecurity-news/iegeek-vulnerabilities-still-prevalent-in-2022-amazon-ft-ig20/
|
|
CVE-2022-3899 - https://wpscan.com/vulnerability/e3131e16-a0eb-4d26-b6d3-048fc1f1e9fa/
|
|
CVE-2022-3900 - https://wpscan.com/vulnerability/c969c4bc-82d7-46a0-88ba-e056c0b27de7
|
|
CVE-2022-39013 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-39014 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-39015 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-39028 - https://pierrekim.github.io/blog/2022-08-24-2-byte-dos-freebsd-netbsd-telnetd-netkit-telnetd-inetutils-telnetd-kerberos-telnetd.html
|
|
CVE-2022-3904 - https://wpscan.com/vulnerability/244d9ef1-335c-4f65-94ad-27c0c633f6ad
|
|
CVE-2022-39045 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1611
|
|
CVE-2022-39046 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
|
|
CVE-2022-39046 - http://seclists.org/fulldisclosure/2024/Feb/3
|
|
CVE-2022-39046 - http://www.openwall.com/lists/oss-security/2024/01/30/6
|
|
CVE-2022-39046 - http://www.openwall.com/lists/oss-security/2024/01/30/8
|
|
CVE-2022-3906 - https://wpscan.com/vulnerability/fee8652d-cd50-4cb0-b94d-2d124f56af1a
|
|
CVE-2022-3907 - https://wpscan.com/vulnerability/7920c1c1-709d-4b1f-ac08-f0a02ddb329c
|
|
CVE-2022-3908 - https://wpscan.com/vulnerability/c44802a0-8cbe-4386-9523-3b6cb44c6505
|
|
CVE-2022-3909 - https://wpscan.com/vulnerability/8d57a534-7630-491a-a0fd-90430f85ae78
|
|
CVE-2022-3911 - https://wpscan.com/vulnerability/c47fdca8-74ac-48a4-9780-556927fb4e52
|
|
CVE-2022-3912 - https://wpscan.com/vulnerability/968c677c-1beb-459b-8fd1-7f70bcaa4f74
|
|
CVE-2022-3915 - https://wpscan.com/vulnerability/fd416d99-1970-418f-81f5-8438490d4479
|
|
CVE-2022-39164 - https://www.ibm.com/support/pages/node/6847947
|
|
CVE-2022-39165 - https://www.ibm.com/support/pages/node/6847947
|
|
CVE-2022-39170 - https://github.com/davea42/libdwarf-code/issues/132
|
|
CVE-2022-39172 - https://sec-consult.com/vulnerability-lab/advisory/stored-cross-site-scripting-in-mb-support-broker-management-solution-openviva-c2/
|
|
CVE-2022-39173 - http://packetstormsecurity.com/files/169600/wolfSSL-Buffer-Overflow.html
|
|
CVE-2022-39173 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
|
|
CVE-2022-39188 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19
|
|
CVE-2022-39189 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17
|
|
CVE-2022-3919 - https://wpscan.com/vulnerability/fe2f1d52-8421-4b46-b829-6953a0472dcb
|
|
CVE-2022-39190 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.6
|
|
CVE-2022-39195 - https://packetstormsecurity.com/2301-exploits/listserv17-xss.txt
|
|
CVE-2022-39197 - https://www.cobaltstrike.com/blog/out-of-band-update-cobalt-strike-4-7-1/
|
|
CVE-2022-39197 - https://www.cobaltstrike.com/blog/tag/release/
|
|
CVE-2022-3921 - https://wpscan.com/vulnerability/e39b59b0-f24f-4de5-a21c-c4de34c3a14f
|
|
CVE-2022-3922 - https://wpscan.com/vulnerability/78054bd7-cdc2-4b14-9b5c-30f10e802d6b
|
|
CVE-2022-3923 - https://wpscan.com/vulnerability/6536946a-7ebf-4f8f-9446-36ec2a2a3ad2
|
|
CVE-2022-3925 - https://bulletin.iese.de/post/buddybadges_1-0-0/
|
|
CVE-2022-3925 - https://wpscan.com/vulnerability/178499a3-97d1-4ab2-abbe-4a9d2ebc85da
|
|
CVE-2022-3926 - https://wpscan.com/vulnerability/e1fcde2a-91a5-40cb-876b-884f01c80336
|
|
CVE-2022-39261 - https://www.drupal.org/sa-core-2022-016
|
|
CVE-2022-39262 - https://huntr.dev/bounties/54fc907e-6983-4c24-b249-1440aac1643c/
|
|
CVE-2022-39276 - https://huntr.dev/bounties/7a88f92b-1ee2-4ca8-9cf8-05fcf6cfe73f/
|
|
CVE-2022-39277 - https://huntr.dev/bounties/8e047ae1-7a7c-48e0-bee3-d1c36e52ff42/
|
|
CVE-2022-39285 - http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html
|
|
CVE-2022-39288 - https://github.com/fastify/fastify/security/policy
|
|
CVE-2022-39290 - http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html
|
|
CVE-2022-39291 - http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html
|
|
CVE-2022-39299 - http://packetstormsecurity.com/files/169826/Node-saml-Root-Element-Signature-Bypass.html
|
|
CVE-2022-3930 - https://wpscan.com/vulnerability/8728d02a-51db-4447-a843-0264b6ceb413
|
|
CVE-2022-39305 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-wrmq-4v4c-gxp2
|
|
CVE-2022-39321 - https://github.com/actions/runner/pull/2108
|
|
CVE-2022-3933 - https://wpscan.com/vulnerability/6395f3f1-5cdf-4c55-920c-accc0201baf4
|
|
CVE-2022-3934 - https://wpscan.com/vulnerability/ab68381f-c4b8-4945-a6a5-1d4d6473b73a
|
|
CVE-2022-3935 - https://wpscan.com/vulnerability/906c5122-dd6d-494b-b66c-4162e234ea05
|
|
CVE-2022-3936 - https://wpscan.com/vulnerability/921daea1-a06d-4310-8bd9-4db32605e500
|
|
CVE-2022-3937 - https://wpscan.com/vulnerability/ac7158c5-3d11-4865-b26f-41ab5a8120af
|
|
CVE-2022-39399 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39400 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39401 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39402 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39403 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39404 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39405 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39406 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39407 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39408 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39409 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39410 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39411 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39412 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39417 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39419 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39420 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39421 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39422 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39423 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39424 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39425 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39426 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39427 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39428 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
|
CVE-2022-39429 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2022-3944 - https://github.com/jerryhanjj/ERP/issues/3
|
|
CVE-2022-3945 - https://huntr.dev/bounties/55cd91b3-1d94-4d34-8d7f-86660b41fd65
|
|
CVE-2022-3946 - https://wpscan.com/vulnerability/b48e4e1d-e682-4b16-81dc-2feee78d7ed0
|
|
CVE-2022-3955 - https://github.com/tholum/crm42/issues/1
|
|
CVE-2022-3956 - https://github.com/tsruban/HHIMS/issues/1
|
|
CVE-2022-3961 - https://wpscan.com/vulnerability/6aad6454-de1b-4304-9c14-05e28d08b253
|
|
CVE-2022-3972 - https://github.com/Pingkon/HMS-PHP/issues/1
|
|
CVE-2022-3973 - https://github.com/Pingkon/HMS-PHP/issues/1
|
|
CVE-2022-3973 - https://vuldb.com/?id.213552
|
|
CVE-2022-3974 - https://github.com/axiomatic-systems/Bento4/issues/812
|
|
CVE-2022-3977 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3a732b46736cd8a29092e4b0b1a9ba83e672bf89
|
|
CVE-2022-39799 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-39800 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-39801 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-39802 - http://packetstormsecurity.com/files/168716/SAP-Manufacturing-Execution-Core-15.3-Path-Traversal.html
|
|
CVE-2022-39802 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-39803 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-39804 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-39805 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-39806 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-39807 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-39808 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-39809 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-3981 - https://wpscan.com/vulnerability/78054d08-0227-426c-903d-d146e0919028
|
|
CVE-2022-39810 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-39811 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-39812 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-39813 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-39814 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-39815 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-39816 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-39817 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-39818 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-39819 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-3982 - https://wpscan.com/vulnerability/4d91f3e1-4de9-46c1-b5ba-cc55b7726867
|
|
CVE-2022-39820 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-39821 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-39822 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-39824 - https://github.com/FCncdn/Appsmith-Js-Injection-POC
|
|
CVE-2022-3983 - https://wpscan.com/vulnerability/0b48bbd6-7c77-44b8-a5d6-34e4a0747cf1
|
|
CVE-2022-39831 - https://savannah.gnu.org/bugs/?62977
|
|
CVE-2022-39832 - https://savannah.gnu.org/bugs/index.php?63000
|
|
CVE-2022-39833 - https://gist.github.com/DylanGrl/4b4e0d53bb7626b2ab3f834ec5a2b23c
|
|
CVE-2022-39836 - https://sec-consult.com/vulnerability-lab/advisory/multiple-memory-corruption-vulnerabilities-in-covesa-dlt-daemon/
|
|
CVE-2022-39836 - https://seclists.org/fulldisclosure/2022/Sep/24
|
|
CVE-2022-39837 - https://sec-consult.com/vulnerability-lab/advisory/multiple-memory-corruption-vulnerabilities-in-covesa-dlt-daemon/
|
|
CVE-2022-39837 - https://seclists.org/fulldisclosure/2022/Sep/24
|
|
CVE-2022-39838 - https://github.com/jet-pentest/CVE-2022-39838
|
|
CVE-2022-39839 - https://github.com/Cotonti/Cotonti/issues/1661
|
|
CVE-2022-3984 - https://wpscan.com/vulnerability/b4694e9d-3f38-4295-929d-0ad37b3cbbaa
|
|
CVE-2022-39840 - https://github.com/Cotonti/Cotonti/issues/1660
|
|
CVE-2022-39842 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19
|
|
CVE-2022-3985 - https://wpscan.com/vulnerability/58f82e13-153e-41e8-a22b-a2e96b46a6dc
|
|
CVE-2022-3986 - https://wpscan.com/vulnerability/ad8077a1-7cbe-4aa1-ad7d-acb41027ed0a
|
|
CVE-2022-3987 - https://wpscan.com/vulnerability/d9309a09-34ba-4e56-b683-e677ad277b29
|
|
CVE-2022-3989 - https://wpscan.com/vulnerability/1bd20329-f3a5-466d-81b0-e4ff0ca32091
|
|
CVE-2022-3993 - https://huntr.dev/bounties/bebd0cd6-18ec-469c-b6ca-19ffa9db0699
|
|
CVE-2022-3994 - https://wpscan.com/vulnerability/802a2139-ab48-4281-888f-225e6e3134aa
|
|
CVE-2022-39960 - https://gist.github.com/CveCt0r/ca8c6e46f536e9ae69fc6061f132463e
|
|
CVE-2022-39974 - https://github.com/wasm3/wasm3/issues/379
|
|
CVE-2022-3998 - https://github.com/MonikaBrzica/scm/issues/1
|
|
CVE-2022-39983 - https://www.swascan.com/it/vulnerability-report-instant-developer/
|
|
CVE-2022-39986 - http://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html
|
|
CVE-2022-39986 - https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2
|
|
CVE-2022-39987 - https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2
|
|
CVE-2022-39988 - http://packetstormsecurity.com/files/168585/Centreon-22.04.0-Cross-Site-Scripting.html
|
|
CVE-2022-3999 - https://wpscan.com/vulnerability/625ae924-68db-4579-a34f-e6f33aa33643
|
|
CVE-2022-4000 - https://wpscan.com/vulnerability/5563c030-bd62-4839-98e8-84bc8191e242
|
|
CVE-2022-40005 - https://cyberdanube.com/en/authenticated-command-injection-in-intelbras-wifiber-120ac-inmesh/
|
|
CVE-2022-40005 - https://seclists.org/fulldisclosure/2022/Dec/13
|
|
CVE-2022-40008 - https://github.com/matthiaskramm/swftools/issues/188
|
|
CVE-2022-40009 - https://github.com/matthiaskramm/swftools/issues/190
|
|
CVE-2022-40010 - http://packetstormsecurity.com/files/173029/Tenda-AC6-AC1200-15.03.06.50_multi-Cross-Site-Scripting.html
|
|
CVE-2022-40016 - https://github.com/ireader/media-server/issues/235
|
|
CVE-2022-40021 - https://www.securifera.com/advisories/CVE-2022-40021/
|
|
CVE-2022-40022 - http://packetstormsecurity.com/files/172907/Symmetricom-SyncServer-Unauthenticated-Remote-Command-Execution.html
|
|
CVE-2022-40022 - https://www.securifera.com/advisories/CVE-2022-40022/
|
|
CVE-2022-40023 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
|
|
CVE-2022-40032 - http://packetstormsecurity.com/files/171739/Simple-Task-Managing-System-1.0-SQL-Injection.html
|
|
CVE-2022-40032 - https://github.com/h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated
|
|
CVE-2022-4004 - https://wpscan.com/vulnerability/6a3bcfb3-3ede-459d-969f-b7b30dafd098
|
|
CVE-2022-40043 - https://www.hakaioffensivesecurity.com/centreon-sqli-and-xss-vulnerability/
|
|
CVE-2022-40044 - https://www.hakaioffensivesecurity.com/centreon-sqli-and-xss-vulnerability/
|
|
CVE-2022-4005 - https://wpscan.com/vulnerability/61d5c9b8-5c21-4ab5-b31c-e13ca19ea25c
|
|
CVE-2022-40055 - https://blog.alphathreat.in/index.php?post/2022/10/01/Achieving-CVE-2022-40055
|
|
CVE-2022-40067 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/9
|
|
CVE-2022-40068 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/10
|
|
CVE-2022-40069 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/6
|
|
CVE-2022-40070 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/8
|
|
CVE-2022-40071 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/2
|
|
CVE-2022-40072 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/7
|
|
CVE-2022-40073 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/5
|
|
CVE-2022-40074 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/3
|
|
CVE-2022-40075 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/1
|
|
CVE-2022-40076 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/4
|
|
CVE-2022-40087 - https://gowthamaraj-rajendran.medium.com/simple-college-website-1-0-unauthenticated-arbitrary-file-upload-rce-44341831bec8
|
|
CVE-2022-40087 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip
|
|
CVE-2022-40088 - https://gowthamaraj-rajendran.medium.com/simple-college-website-1-0-xss-1f13228233a
|
|
CVE-2022-40088 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip
|
|
CVE-2022-40089 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip
|
|
CVE-2022-40090 - https://gitlab.com/libtiff/libtiff/-/issues/455
|
|
CVE-2022-4010 - https://wpscan.com/vulnerability/bed8c81c-04c7-412d-9563-ce4eb64b7754
|
|
CVE-2022-4011 - https://vuldb.com/?id.213785
|
|
CVE-2022-40110 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A3002R/2.md
|
|
CVE-2022-40112 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A3002R/3.md
|
|
CVE-2022-40113 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection3.md
|
|
CVE-2022-40113 - https://github.com/zakee94/online-banking-system/issues/18
|
|
CVE-2022-40114 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection5.md
|
|
CVE-2022-40114 - https://github.com/zakee94/online-banking-system/issues/16
|
|
CVE-2022-40115 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection1.md
|
|
CVE-2022-40115 - https://github.com/zakee94/online-banking-system/issues/10
|
|
CVE-2022-40116 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection9.md
|
|
CVE-2022-40116 - https://github.com/zakee94/online-banking-system/issues/13
|
|
CVE-2022-40117 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection2.md
|
|
CVE-2022-40117 - https://github.com/zakee94/online-banking-system/issues/17
|
|
CVE-2022-40118 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection4.md
|
|
CVE-2022-40118 - https://github.com/zakee94/online-banking-system/issues/19
|
|
CVE-2022-40119 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection6.md
|
|
CVE-2022-40119 - https://github.com/zakee94/online-banking-system/issues/11
|
|
CVE-2022-4012 - https://github.com/golamsarwar08/hms/issues/1
|
|
CVE-2022-4012 - https://vuldb.com/?id.213786
|
|
CVE-2022-40120 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection7.md
|
|
CVE-2022-40120 - https://github.com/zakee94/online-banking-system/issues/14
|
|
CVE-2022-40121 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection8.md
|
|
CVE-2022-40121 - https://github.com/zakee94/online-banking-system/issues/12
|
|
CVE-2022-40122 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection10.md
|
|
CVE-2022-40122 - https://github.com/zakee94/online-banking-system/issues/15
|
|
CVE-2022-40123 - https://weed-1.gitbook.io/cve/mojoportal/directory-traversal-in-mojoportal-v2.7-cve-2022-40123
|
|
CVE-2022-40129 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1614
|
|
CVE-2022-4013 - https://github.com/golamsarwar08/hms/issues/2
|
|
CVE-2022-4013 - https://vuldb.com/?id.213787
|
|
CVE-2022-40133 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
|
|
CVE-2022-4014 - https://vuldb.com/?id.213788
|
|
CVE-2022-4015 - https://github.com/shreyansh225/Sports-Club-Management-System/issues/6
|
|
CVE-2022-4015 - https://vuldb.com/?id.213789
|
|
CVE-2022-4016 - https://wpscan.com/vulnerability/9b77044c-fd3f-4e6f-a759-dcc3082dcbd6
|
|
CVE-2022-4017 - https://wpscan.com/vulnerability/609072d0-9bb9-4fe0-9626-7e4a334ca3a4
|
|
CVE-2022-4018 - https://huntr.dev/bounties/5340c2f6-0252-40f6-8929-cca5d64958a5
|
|
CVE-2022-4019 - https://mattermost.com/security-updates/
|
|
CVE-2022-40220 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1612
|
|
CVE-2022-40222 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1638
|
|
CVE-2022-40224 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1618
|
|
CVE-2022-4023 - https://jetpack.com/blog/vulnerabilities-found-in-the-3dprint-premium-plugin/
|
|
CVE-2022-4023 - https://wpscan.com/vulnerability/859c6e7e-2381-4d93-a526-2000b4fb8fee
|
|
CVE-2022-40233 - https://www.ibm.com/support/pages/node/6847947
|
|
CVE-2022-4024 - https://wpscan.com/vulnerability/a087fb45-6f6c-40ac-b48b-2cbceda86cbe
|
|
CVE-2022-40250 - https://www.binarly.io/advisories/BRLY-2022-016
|
|
CVE-2022-40277 - https://github.com/laurent22/joplin
|
|
CVE-2022-40282 - http://packetstormsecurity.com/files/170063/Hirschmann-Belden-BAT-C2-8.8.1.0R8-Command-Injection.html
|
|
CVE-2022-40282 - http://seclists.org/fulldisclosure/2022/Nov/19
|
|
CVE-2022-40284 - https://github.com/tuxera/ntfs-3g/releases
|
|
CVE-2022-40297 - https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc
|
|
CVE-2022-40298 - https://www.crestron.com/Security/Security_Advisories
|
|
CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/24
|
|
CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/25
|
|
CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/24
|
|
CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/25
|
|
CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-40305 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-023.txt
|
|
CVE-2022-40306 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-042.txt
|
|
CVE-2022-40319 - https://packetstormsecurity.com/2301-exploits/listserv17-idor.txt
|
|
CVE-2022-40320 - https://github.com/libconfuse/libconfuse/issues/163
|
|
CVE-2022-40347 - http://packetstormsecurity.com/files/171740/Intern-Record-System-1.0-SQL-Injection.html
|
|
CVE-2022-40347 - https://github.com/h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated
|
|
CVE-2022-40348 - https://github.com/h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated
|
|
CVE-2022-40357 - https://github.com/zblogcn/zblogphp/issues/336
|
|
CVE-2022-40359 - https://cxsecurity.com/issue/WLB-2022090057
|
|
CVE-2022-40363 - https://github.com/flipperdevices/flipperzero-firmware/pull/1697
|
|
CVE-2022-4042 - https://wpscan.com/vulnerability/8ec76242-717d-4d2d-9c0f-3056cd7c2c90
|
|
CVE-2022-4043 - https://wpscan.com/vulnerability/ffff8c83-0a59-450a-9b40-c7f3af7205fc
|
|
CVE-2022-40434 - https://isaghojaria.medium.com/softr-v2-0-was-discovered-to-be-vulnerable-to-html-injection-via-the-name-field-of-the-account-page-c6fbd3162254
|
|
CVE-2022-40439 - https://github.com/axiomatic-systems/Bento4/issues/750
|
|
CVE-2022-4044 - https://mattermost.com/security-updates/
|
|
CVE-2022-40440 - https://github.com/SxB64/mxgraph-xss-vul/wiki
|
|
CVE-2022-40443 - https://github.com/liong007/ZZCMS/issues/1
|
|
CVE-2022-40444 - https://github.com/liong007/ZZCMS/issues/2
|
|
CVE-2022-4045 - https://mattermost.com/security-updates/
|
|
CVE-2022-40469 - https://github.com/yikesoftware/exp_and_poc_archive/tree/main/CVE/CVE-2022-40469
|
|
CVE-2022-4047 - https://wpscan.com/vulnerability/8965a87c-5fe5-4b39-88f3-e00966ca1d94
|
|
CVE-2022-40470 - https://drive.google.com/file/d/1UDuez2CTscdWXYzyXLi3x8CMs9IWLL11/view?usp=sharing
|
|
CVE-2022-40471 - https://drive.google.com/file/d/1m-wTfOL5gY3huaSEM3YPSf98qIrkl-TW/view?usp=sharing
|
|
CVE-2022-40471 - https://github.com/RashidKhanPathan/CVE-2022-40471
|
|
CVE-2022-40476 - https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.62
|
|
CVE-2022-40482 - https://ephort.dk/blog/laravel-timing-attack-vulnerability/
|
|
CVE-2022-40482 - https://github.com/ephort/laravel-user-enumeration-demo
|
|
CVE-2022-40486 - https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md
|
|
CVE-2022-40489 - https://github.com/thinkcmf/thinkcmf/issues/736
|
|
CVE-2022-4049 - https://wpscan.com/vulnerability/9b0781e2-ad62-4308-bafc-d45b9a2472be
|
|
CVE-2022-40494 - https://blog.carrot2.cn/2022/08/cve-2022-40494.html
|
|
CVE-2022-4050 - https://wpscan.com/vulnerability/5c96bb40-4c2d-4e91-8339-e0ddce25912f
|
|
CVE-2022-4051 - https://github.com/itzmehedi/Hostel-searching-project-using-PHP-Mysql/issues/1
|
|
CVE-2022-4052 - https://vuldb.com/?id.213845
|
|
CVE-2022-4053 - https://vuldb.com/?id.213846
|
|
CVE-2022-4057 - https://wpscan.com/vulnerability/95ee1b9c-1971-4c35-8527-5764e9ed64af
|
|
CVE-2022-4058 - https://wpscan.com/vulnerability/89656cb3-4611-4ae7-b7f8-1b22eb75cfc4
|
|
CVE-2022-4059 - https://wpscan.com/vulnerability/d94bb664-261a-4f3f-8cc3-a2db8230895d
|
|
CVE-2022-4060 - https://wpscan.com/vulnerability/8f982ebd-6fc5-452d-8280-42e027d01b1e
|
|
CVE-2022-4061 - https://wpscan.com/vulnerability/fec68e6e-f612-43c8-8301-80f7ae3be665
|
|
CVE-2022-40621 - https://www.malbytes.net/2022/07/wavlink-quantum-d4g-zero-day-part-01.html
|
|
CVE-2022-40622 - https://youtu.be/cSileV8YbsQ?t=655
|
|
CVE-2022-40623 - https://youtu.be/cSileV8YbsQ?t=1028
|
|
CVE-2022-40624 - https://github.com/dhammon/pfBlockerNg-CVE-2022-40624
|
|
CVE-2022-4063 - https://wpscan.com/vulnerability/6bb07ec1-f1aa-4f4b-9717-c92f651a90a7
|
|
CVE-2022-4064 - https://github.com/petergoldstein/dalli/issues/932
|
|
CVE-2022-4067 - https://huntr.dev/bounties/3ca7023e-d95c-423f-9e9a-222a67a8ee72
|
|
CVE-2022-4068 - https://huntr.dev/bounties/becfecc4-22a6-4f94-bf83-d6030b625fdc
|
|
CVE-2022-40684 - http://packetstormsecurity.com/files/169431/Fortinet-FortiOS-FortiProxy-FortiSwitchManager-Authentication-Bypass.html
|
|
CVE-2022-40684 - http://packetstormsecurity.com/files/171515/Fortinet-7.2.1-Authentication-Bypass.html
|
|
CVE-2022-4069 - https://huntr.dev/bounties/a9925d98-dac4-4c3c-835a-d93aeecfb2c5
|
|
CVE-2022-40691 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1621
|
|
CVE-2022-40693 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1616
|
|
CVE-2022-4070 - https://huntr.dev/bounties/72d426bb-b56e-4534-88ba-0d11381b0775
|
|
CVE-2022-40701 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1606
|
|
CVE-2022-40711 - https://verneet.com/cve-2022-40711/
|
|
CVE-2022-40712 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-40713 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-40714 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-40715 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-40734 - https://github.com/UniSharp/laravel-filemanager/issues/1150
|
|
CVE-2022-40734 - https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966
|
|
CVE-2022-40734 - https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417
|
|
CVE-2022-40735 - https://dheatattack.gitlab.io/
|
|
CVE-2022-40735 - https://github.com/mozilla/ssl-config-generator/issues/162
|
|
CVE-2022-40735 - https://ieeexplore.ieee.org/document/10374117
|
|
CVE-2022-40735 - https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf
|
|
CVE-2022-40735 - https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf
|
|
CVE-2022-40736 - https://github.com/axiomatic-systems/Bento4/issues/755
|
|
CVE-2022-40737 - https://github.com/axiomatic-systems/Bento4/issues/756
|
|
CVE-2022-40738 - https://github.com/axiomatic-systems/Bento4/issues/756
|
|
CVE-2022-40755 - https://github.com/jasper-software/jasper/issues/338
|
|
CVE-2022-40761 - https://github.com/Samsung/mTower/issues/83
|
|
CVE-2022-40769 - https://blog.1inch.io/a-vulnerability-disclosed-in-profanity-an-ethereum-vanity-address-tool-68ed7455fc8c
|
|
CVE-2022-40774 - https://github.com/axiomatic-systems/Bento4/issues/757
|
|
CVE-2022-40775 - https://github.com/axiomatic-systems/Bento4/issues/758
|
|
CVE-2022-40797 - http://packetstormsecurity.com/files/169964/Roxy-Fileman-1.4.6-Remote-Shell-Upload.html
|
|
CVE-2022-40798 - https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc
|
|
CVE-2022-40839 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40839/poc.txt
|
|
CVE-2022-40840 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40840/poc.txt
|
|
CVE-2022-40841 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40841/poc.txt
|
|
CVE-2022-40842 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40842/poc.txt
|
|
CVE-2022-40843 - https://boschko.ca/tenda_ac1200_router/
|
|
CVE-2022-40844 - https://boschko.ca/tenda_ac1200_router/
|
|
CVE-2022-40845 - https://boschko.ca/tenda_ac1200_router/
|
|
CVE-2022-40846 - https://boschko.ca/tenda_ac1200_router/
|
|
CVE-2022-40847 - https://boschko.ca/tenda_ac1200_router/
|
|
CVE-2022-40849 - https://github.com/thinkcmf/thinkcmf/issues/737
|
|
CVE-2022-40851 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/addressNat.md
|
|
CVE-2022-40853 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/form_fast_setting_wifi_set.md
|
|
CVE-2022-40854 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md
|
|
CVE-2022-40855 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formSetPortMapping.md
|
|
CVE-2022-40860 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/formSetQosBand.md
|
|
CVE-2022-40861 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/formSetQosBand.md
|
|
CVE-2022-40862 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/fromNatStaticSetting.md
|
|
CVE-2022-40862 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/fromNatStaticSetting.md
|
|
CVE-2022-40864 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/setSmartPowerManagement.md
|
|
CVE-2022-40864 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/setSmartPowerManagement.md
|
|
CVE-2022-40865 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/setSchedWifi.md
|
|
CVE-2022-40865 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/setSchedWifi.md
|
|
CVE-2022-40866 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/setDebugCfg.md
|
|
CVE-2022-40867 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formIPMacBindDel.md
|
|
CVE-2022-40868 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formDelDhcpRule.md
|
|
CVE-2022-40869 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/fromDhcpListClient-list.md
|
|
CVE-2022-40869 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/fromDhcpListClient-list.md
|
|
CVE-2022-40871 - https://github.com/youncyb/dolibarr-rce
|
|
CVE-2022-40874 - https://www.cnblogs.com/L0g4n-blog/p/16695155.html
|
|
CVE-2022-40875 - https://www.cnblogs.com/L0g4n-blog/p/16695155.html
|
|
CVE-2022-40876 - https://www.cnblogs.com/L0g4n-blog/p/16695155.html
|
|
CVE-2022-40876 - https://www.cnblogs.com/L0g4n-blog/p/16704071.html
|
|
CVE-2022-40877 - https://www.exploit-db.com/exploits/50725
|
|
CVE-2022-40878 - https://www.exploit-db.com/exploits/50726
|
|
CVE-2022-40879 - https://github.com/kekingcn/kkFileView/issues/389
|
|
CVE-2022-4088 - https://github.com/rickxy/Stock-Management-System/issues/2
|
|
CVE-2022-40881 - https://github.com/Timorlover/SolarView_Compact_6.0_rce_via_network_test.php
|
|
CVE-2022-40884 - https://github.com/yangfar/CVE/blob/main/CVE-2022-40884.md
|
|
CVE-2022-40887 - https://github.com/toyydsBT123/One_of_my_take_on_SourceCodester/blob/main/Best-Student-Result-Management-System_1.0.poc.md
|
|
CVE-2022-4089 - https://github.com/rickxy/Stock-Management-System/issues/3
|
|
CVE-2022-40890 - https://github.com/ToughRunner/Open5gs_bugreport
|
|
CVE-2022-40896 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2/
|
|
CVE-2022-40897 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
|
|
CVE-2022-40898 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
|
|
CVE-2022-40899 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
|
|
CVE-2022-4090 - https://github.com/rickxy/Stock-Management-System/issues/4
|
|
CVE-2022-40912 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php
|
|
CVE-2022-40918 - https://medium.com/@meekworth/exploiting-the-lw9621-drone-camera-module-773f00081368
|
|
CVE-2022-40922 - https://github.com/lief-project/LIEF/issues/781
|
|
CVE-2022-40923 - https://github.com/lief-project/LIEF/issues/784
|
|
CVE-2022-4093 - https://huntr.dev/bounties/677ca8ee-ffbc-4b39-b294-2ce81bd56788
|
|
CVE-2022-40931 - https://github.com/dutchcoders/transfer.sh/issues/500
|
|
CVE-2022-40943 - https://github.com/Qrayyy/CVE/blob/main/Dairy%20Farm%20Shop%20Management%20System/bwdate-report-ds-sql(CVE-2022-40943).md
|
|
CVE-2022-40944 - https://caicaizi.top/archives/9/
|
|
CVE-2022-40944 - https://github.com/Qrayyy/CVE/blob/main/Dairy%20Farm%20Shop%20Management%20System/sales-report-ds-sql(CVE-2022-40944).md
|
|
CVE-2022-40946 - http://packetstormsecurity.com/files/171484/D-Link-DIR-819-A1-Denial-Of-Service.html
|
|
CVE-2022-40946 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-4095 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c53b3dcb9942b8ed7f81ee3921c4085d87070c73
|
|
CVE-2022-40956 - https://bugzilla.mozilla.org/show_bug.cgi?id=1770094
|
|
CVE-2022-40959 - https://bugzilla.mozilla.org/show_bug.cgi?id=1782211
|
|
CVE-2022-4096 - https://huntr.dev/bounties/7969e834-5982-456e-9683-861a7a5e2d22
|
|
CVE-2022-40969 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1607
|
|
CVE-2022-4097 - https://wpscan.com/vulnerability/15819d33-7497-4f7d-bbb8-b3ab147806c4
|
|
CVE-2022-40982 - https://downfall.page
|
|
CVE-2022-40983 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1617
|
|
CVE-2022-40985 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-40986 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-40987 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-40988 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-40989 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-4099 - https://wpscan.com/vulnerability/a282dd39-926d-406b-b8f5-e4c6e0c2c028
|
|
CVE-2022-40990 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-40991 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-40992 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-40993 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-40994 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-40995 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-40996 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-40997 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-40998 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-40999 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41000 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41001 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41002 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41003 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41004 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41005 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41006 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41007 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41008 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41009 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-4101 - https://wpscan.com/vulnerability/2ce4c837-c62c-41ac-95ca-54bb1a6d1eeb
|
|
CVE-2022-41010 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41011 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41012 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41013 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41014 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41015 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41016 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41017 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41018 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41019 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-4102 - https://wpscan.com/vulnerability/c177f763-0bb5-4734-ba2e-7ba816578937
|
|
CVE-2022-41020 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41021 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41022 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41023 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41024 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41025 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41026 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41027 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41028 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-41029 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-4103 - https://wpscan.com/vulnerability/5e1244f7-39b5-4f37-8fef-e3f35fc388f1
|
|
CVE-2022-41030 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
|
CVE-2022-4104 - https://tenable.com/security/research/TRA-2022-35
|
|
CVE-2022-41040 - http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html
|
|
CVE-2022-41040 - https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/
|
|
CVE-2022-4105 - https://huntr.dev/bounties/386417e9-0cd5-4d80-8137-b0fd5c30b8f8
|
|
CVE-2022-41057 - http://packetstormsecurity.com/files/170128/SentinelOne-sentinelagent-22.3.2.5-Privilege-Escalation.html
|
|
CVE-2022-41057 - http://packetstormsecurity.com/files/170128/Windows-HTTP.SYS-Kerberos-PAC-Verification-Bypass-Privilege-Escalation.html
|
|
CVE-2022-4106 - https://wpscan.com/vulnerability/b60a0d3d-148f-4e9b-baee-7332890804ed
|
|
CVE-2022-4107 - https://wpscan.com/vulnerability/0b432858-722c-4bda-aa95-ad48e2097302
|
|
CVE-2022-41073 - http://packetstormsecurity.com/files/174528/Microsoft-Windows-Privilege-Escalation.html
|
|
CVE-2022-4108 - https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470
|
|
CVE-2022-41082 - http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html
|
|
CVE-2022-41082 - https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/
|
|
CVE-2022-4109 - https://wpscan.com/vulnerability/51e023de-189d-4557-9655-23f7ba58b670
|
|
CVE-2022-4110 - https://wpscan.com/vulnerability/037a81b2-8fd8-4898-bb5b-d15d9a38778c
|
|
CVE-2022-4111 - https://huntr.dev/bounties/5596d072-66d2-4361-8cac-101c9c781c3d
|
|
CVE-2022-4112 - https://wpscan.com/vulnerability/4cbce79d-9b7a-41f5-9c52-08933ea7c28e
|
|
CVE-2022-41128 - https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/
|
|
CVE-2022-41138 - https://bugs.gentoo.org/868495
|
|
CVE-2022-41139 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-7344-4pg9-qf45
|
|
CVE-2022-4114 - https://wpscan.com/vulnerability/7569f4ac-05c9-43c9-95e0-5cc360524bbd
|
|
CVE-2022-41142 - https://github.com/centreon/centreon/security/policy
|
|
CVE-2022-4115 - https://wpscan.com/vulnerability/2b5071e1-9532-4a6c-9da4-d07932474ca4
|
|
CVE-2022-41154 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1637
|
|
CVE-2022-41166 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41167 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41168 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41169 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-4117 - https://wpscan.com/vulnerability/1fac3eb4-13c0-442d-b27c-7b7736208193
|
|
CVE-2022-41170 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41171 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41172 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41173 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41174 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41175 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41176 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41177 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41178 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41179 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-4118 - https://wpscan.com/vulnerability/2839ff82-7d37-4392-8fa3-d490680d42c4
|
|
CVE-2022-41180 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41181 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41182 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41183 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41184 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41185 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41186 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41187 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41188 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41189 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-4119 - https://wpscan.com/vulnerability/11040133-c134-4f96-8421-edd04901ed0d
|
|
CVE-2022-41190 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41191 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41192 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41193 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41194 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41195 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41196 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41197 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41198 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41199 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-4120 - https://wpscan.com/vulnerability/e8bb79db-ef77-43be-b449-4c4b5310eedf
|
|
CVE-2022-41200 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41201 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41202 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41203 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41204 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41205 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41206 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41207 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41208 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41209 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-4121 - https://github.com/dinhvh/libetpan/issues/420
|
|
CVE-2022-41210 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41211 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41212 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41214 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41215 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41218 - http://www.openwall.com/lists/oss-security/2022/09/23/4
|
|
CVE-2022-41218 - http://www.openwall.com/lists/oss-security/2022/09/24/1
|
|
CVE-2022-41221 - https://labs.withsecure.com/advisories/opentext-archive-center-administration-client-xxe-vulnerability
|
|
CVE-2022-41222 - http://packetstormsecurity.com/files/168466/Linux-Stable-5.4-5.10-Use-After-Free-Race-Condition.html
|
|
CVE-2022-41222 - http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html
|
|
CVE-2022-41222 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
|
|
CVE-2022-4124 - https://wpscan.com/vulnerability/60786bf8-c0d7-4d80-b189-866aba79bce2
|
|
CVE-2022-4125 - https://wpscan.com/vulnerability/7862084a-2821-4ef1-8d01-c9c8b3f28b05
|
|
CVE-2022-41258 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41259 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41260 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41261 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41262 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41263 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41264 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41266 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41267 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41268 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41271 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41272 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41273 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41274 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41275 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2022-41311 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619
|
|
CVE-2022-41312 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619
|
|
CVE-2022-41313 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619
|
|
CVE-2022-41322 - https://bugs.gentoo.org/868543
|
|
CVE-2022-41333 - http://packetstormsecurity.com/files/171766/FortiRecorder-6.4.3-Denial-Of-Service.html
|
|
CVE-2022-41343 - https://tantosec.com/blog/cve-2022-41343/
|
|
CVE-2022-41352 - http://packetstormsecurity.com/files/169458/Zimbra-Collaboration-Suite-TAR-Path-Traversal.html
|
|
CVE-2022-41358 - http://packetstormsecurity.com/files/168718/Garage-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2022-41358 - https://cxsecurity.com/issue/WLB-2022100037
|
|
CVE-2022-41358 - https://github.com/thecasual/CVE-2022-41358
|
|
CVE-2022-41358 - https://vulmon.com/vulnerabilitydetails?qid=CVE-2022-41358
|
|
CVE-2022-4136 - https://huntr.dev/bounties/fe418ae1-7c80-4d91-8a5a-923d60ba78c3
|
|
CVE-2022-41376 - https://alicangonullu.org/konu/138
|
|
CVE-2022-4138 - https://gitlab.com/gitlab-org/gitlab/-/issues/383709
|
|
CVE-2022-41392 - https://www.edoardoottavianelli.it/CVE-2022-41392/
|
|
CVE-2022-41392 - https://www.youtube.com/watch?v=BOPLYnveBqk
|
|
CVE-2022-41395 - https://boschko.ca/tenda_ac1200_router
|
|
CVE-2022-41395 - https://boschko.ca/tenda_ac1200_router/
|
|
CVE-2022-41396 - https://boschko.ca/tenda_ac1200_router
|
|
CVE-2022-41396 - https://boschko.ca/tenda_ac1200_router/
|
|
CVE-2022-4140 - https://wpscan.com/vulnerability/0d649a7e-3334-48f7-abca-fff0856e12c7
|
|
CVE-2022-41401 - https://github.com/ixSly/CVE-2022-41401
|
|
CVE-2022-41403 - https://packetstormsecurity.com/files/168412/OpenCart-3.x-Newsletter-Custom-Popup-4.0-SQL-Injection.html
|
|
CVE-2022-41404 - https://sourceforge.net/p/ini4j/bugs/56/
|
|
CVE-2022-4141 - https://huntr.dev/bounties/20ece512-c600-45ac-8a84-d0931e05541f
|
|
CVE-2022-41412 - http://packetstormsecurity.com/files/170069/perfSONAR-4.4.4-Open-Proxy-Relay.html
|
|
CVE-2022-41412 - https://github.com/renmizo/CVE-2022-41412
|
|
CVE-2022-41413 - http://packetstormsecurity.com/files/170070/perfSONAR-4.4.5-Cross-Site-Request-Forgery.html
|
|
CVE-2022-41413 - http://packetstormsecurity.com/files/171629/perfSONAR-4.4.5-Cross-Site-Request-Forgery.html
|
|
CVE-2022-41413 - https://github.com/renmizo/CVE-2022-41413
|
|
CVE-2022-41415 - https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-41415/CVE-2022-41415.md
|
|
CVE-2022-41419 - https://github.com/axiomatic-systems/Bento4/issues/766
|
|
CVE-2022-4142 - https://wpscan.com/vulnerability/8c2adadd-0684-49a8-9185-0c7d9581aef1
|
|
CVE-2022-41423 - https://github.com/axiomatic-systems/Bento4/issues/767
|
|
CVE-2022-41424 - https://github.com/axiomatic-systems/Bento4/issues/768
|
|
CVE-2022-41425 - https://github.com/axiomatic-systems/Bento4/issues/772
|
|
CVE-2022-41426 - https://github.com/axiomatic-systems/Bento4/issues/772
|
|
CVE-2022-41427 - https://github.com/axiomatic-systems/Bento4/issues/772
|
|
CVE-2022-41428 - https://github.com/axiomatic-systems/Bento4/issues/773
|
|
CVE-2022-41429 - https://github.com/axiomatic-systems/Bento4/issues/773
|
|
CVE-2022-41430 - https://github.com/axiomatic-systems/Bento4/issues/773
|
|
CVE-2022-41441 - http://packetstormsecurity.com/files/171557/ReQlogic-11.3-Cross-Site-Scripting.html
|
|
CVE-2022-41441 - https://okankurtulus.com.tr/2023/01/17/reqlogic-v11-3-unauthenticated-reflected-cross-site-scripting-xss/
|
|
CVE-2022-41445 - https://github.com/RashidKhanPathan/CVE-2022-41445
|
|
CVE-2022-41445 - https://ihexcoder.wixsite.com/secresearch/post/cve-2022-41445-cross-site-scripting-in-teachers-record-management-system-using-codeignitor
|
|
CVE-2022-41446 - https://github.com/RashidKhanPathan/CVE-2022-41446
|
|
CVE-2022-41446 - https://ihexcoder.wixsite.com/secresearch/post/privilege-escalation-in-teachers-record-management-system-using-codeignitor
|
|
CVE-2022-41473 - https://github.com/ralap-z/rpcms/issues/1
|
|
CVE-2022-41474 - https://github.com/ralap-z/rpcms/issues/3
|
|
CVE-2022-41475 - https://github.com/ralap-z/rpcms/issues/2
|
|
CVE-2022-41477 - https://github.com/zer0yu/CVE_Request/blob/master/Webid/WeBid_Path_Traversal.md
|
|
CVE-2022-4148 - https://wpscan.com/vulnerability/be9b25c8-b0d7-4c22-81ff-e41650a4ed41
|
|
CVE-2022-41495 - https://github.com/jayus0821/insight/blob/master/ClipperCMS%20SSRF2.md
|
|
CVE-2022-41496 - https://github.com/jayus0821/insight/blob/master/iCMS%20SSRF.md
|
|
CVE-2022-41497 - https://github.com/jayus0821/insight/blob/master/ClipperCMS%20SSRF.md
|
|
CVE-2022-4150 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_13
|
|
CVE-2022-4150 - https://wpscan.com/vulnerability/d5d39138-a216-46cd-9e5f-fc706a2c93da
|
|
CVE-2022-4151 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_2
|
|
CVE-2022-4151 - https://wpscan.com/vulnerability/e1320c2a-818d-4e91-8dc9-ba95a1dc4377
|
|
CVE-2022-4152 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_4
|
|
CVE-2022-4152 - https://wpscan.com/vulnerability/4b058966-0859-42ed-a796-b6c6cb08a9fc
|
|
CVE-2022-4153 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_7
|
|
CVE-2022-4153 - https://wpscan.com/vulnerability/35b0126d-9293-4e64-a00f-0903303f960a
|
|
CVE-2022-4154 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_5
|
|
CVE-2022-4154 - https://wpscan.com/vulnerability/dac32ed4-d3df-420a-a2eb-9e7d2435826a
|
|
CVE-2022-41540 - https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Offline-decryption
|
|
CVE-2022-41541 - https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Replay
|
|
CVE-2022-41542 - https://medium.com/@sc0p3hacker/cve-2022-41542-session-mis-configuration-in-devhub-application-ca956bb9027a
|
|
CVE-2022-41544 - http://packetstormsecurity.com/files/172553/GetSimple-CMS-3.3.16-Shell-Upload.html
|
|
CVE-2022-41547 - https://github.com/MobSF/Mobile-Security-Framework-MobSF/pull/166
|
|
CVE-2022-4155 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_6
|
|
CVE-2022-4155 - https://wpscan.com/vulnerability/a55c6a62-3744-4374-b01a-cb074ac64b4d
|
|
CVE-2022-4156 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_1
|
|
CVE-2022-4156 - https://wpscan.com/vulnerability/254f6e8b-5fa9-4d6d-8e0e-1a4cae18aee0
|
|
CVE-2022-4157 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_3
|
|
CVE-2022-4157 - https://wpscan.com/vulnerability/71feec63-67a5-482e-bf77-1396c306fae6
|
|
CVE-2022-4158 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_15
|
|
CVE-2022-4158 - https://wpscan.com/vulnerability/1b3b51af-ad73-4f8e-ba97-375b8a363b64
|
|
CVE-2022-4159 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_8
|
|
CVE-2022-4159 - https://wpscan.com/vulnerability/2e993280-1007-4e9d-9ca6-2b5f774e9965
|
|
CVE-2022-4160 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_14
|
|
CVE-2022-4160 - https://wpscan.com/vulnerability/813de343-4814-42b8-b8df-1695320512cd
|
|
CVE-2022-4161 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_16
|
|
CVE-2022-4161 - https://wpscan.com/vulnerability/a66af8f7-1d5f-4fe5-a2ba-03337064583b
|
|
CVE-2022-4162 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_9
|
|
CVE-2022-4162 - https://wpscan.com/vulnerability/011500ac-17e4-4d4f-bbd9-1fec70511776
|
|
CVE-2022-4163 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_10
|
|
CVE-2022-4163 - https://wpscan.com/vulnerability/de0d7db7-f911-4f5f-97f6-885ca60822d1
|
|
CVE-2022-41639 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1633
|
|
CVE-2022-4164 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_11
|
|
CVE-2022-4164 - https://wpscan.com/vulnerability/57fff222-2c64-4b52-86cd-ab8db4541627
|
|
CVE-2022-41649 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1631
|
|
CVE-2022-4165 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_17
|
|
CVE-2022-4165 - https://wpscan.com/vulnerability/857aba7d-fccd-4672-b734-ab228440dcc0
|
|
CVE-2022-41654 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1624
|
|
CVE-2022-4166 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_12
|
|
CVE-2022-4166 - https://wpscan.com/vulnerability/6e7de2bb-5f71-4c27-ae79-4f6b2ba7f86f
|
|
CVE-2022-41666 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/
|
|
CVE-2022-41667 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/
|
|
CVE-2022-41668 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/
|
|
CVE-2022-41669 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/
|
|
CVE-2022-41670 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/
|
|
CVE-2022-41671 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/
|
|
CVE-2022-41674 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
|
|
CVE-2022-41674 - https://www.openwall.com/lists/oss-security/2022/10/13/5
|
|
CVE-2022-41684 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1632
|
|
CVE-2022-41697 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1625
|
|
CVE-2022-4173 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
|
CVE-2022-41760 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-41761 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-41762 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-41763 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-41793 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1667
|
|
CVE-2022-41793 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1667
|
|
CVE-2022-41794 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1626
|
|
CVE-2022-41837 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1636
|
|
CVE-2022-41838 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1634
|
|
CVE-2022-41841 - https://github.com/axiomatic-systems/Bento4/issues/779
|
|
CVE-2022-41842 - https://forum.xpdfreader.com/viewtopic.php?f=1&t=42340&p=43928&hilit=gfseek#p43928
|
|
CVE-2022-41843 - https://forum.xpdfreader.com/viewtopic.php?f=1&t=42344
|
|
CVE-2022-41843 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42325&sid=7b08ba9a518a99ce3c5ff40e53fc6421
|
|
CVE-2022-41844 - https://forum.xpdfreader.com/viewtopic.php?f=1&t=42340&p=43928&hilit=gfseek#p43928
|
|
CVE-2022-41844 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42308&p=43844&hilit=XRef%3A%3Afetch#p43844
|
|
CVE-2022-41845 - https://github.com/axiomatic-systems/Bento4/issues/770
|
|
CVE-2022-41846 - https://github.com/axiomatic-systems/Bento4/issues/342
|
|
CVE-2022-41846 - https://github.com/axiomatic-systems/Bento4/issues/770
|
|
CVE-2022-41847 - https://github.com/axiomatic-systems/Bento4/issues/750
|
|
CVE-2022-41847 - https://github.com/axiomatic-systems/Bento4/issues/775
|
|
CVE-2022-41884 - https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jq6x-99hj-q636
|
|
CVE-2022-41912 - http://packetstormsecurity.com/files/170356/crewjam-saml-Signature-Bypass.html
|
|
CVE-2022-41924 - https://emily.id.au/tailscale
|
|
CVE-2022-41924 - https://tailscale.com/security-bulletins/#ts-2022-004
|
|
CVE-2022-41925 - https://emily.id.au/tailscale
|
|
CVE-2022-41925 - https://tailscale.com/security-bulletins/#ts-2022-005
|
|
CVE-2022-41945 - https://github.com/4ra1n/super-xray/releases/tag/0.2-beta
|
|
CVE-2022-41950 - https://github.com/4ra1n/super-xray/releases/tag/0.3-beta
|
|
CVE-2022-41952 - https://github.com/matrix-org/synapse/pull/11936
|
|
CVE-2022-41955 - https://securitylab.github.com/advisories/GHSL-2022-100_Autolab/
|
|
CVE-2022-41956 - https://securitylab.github.com/advisories/GHSL-2022-100_Autolab/
|
|
CVE-2022-41958 - https://github.com/4ra1n/super-xray/security/advisories/GHSA-39pv-4vmj-c4fr
|
|
CVE-2022-4196 - https://wpscan.com/vulnerability/dfbc61ef-3fe4-4bab-904a-480b073d4e88
|
|
CVE-2022-4197 - https://wpscan.com/vulnerability/96818024-57ab-419d-bd46-7d2da98269e6
|
|
CVE-2022-41973 - http://packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-Bypass-Symlink-Attack.html
|
|
CVE-2022-41973 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
|
|
CVE-2022-41974 - http://packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-Bypass-Symlink-Attack.html
|
|
CVE-2022-41974 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
|
|
CVE-2022-41976 - https://m3n0sd0n4ld.blogspot.com/2022/11/scada-lts-privilege-escalation-cve-2022.html
|
|
CVE-2022-41977 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1627
|
|
CVE-2022-4198 - https://wpscan.com/vulnerability/ba372400-96f7-45a9-9e89-5984ecc4d1e2
|
|
CVE-2022-41981 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1628
|
|
CVE-2022-41985 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1680
|
|
CVE-2022-41988 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1643
|
|
CVE-2022-4199 - https://wpscan.com/vulnerability/c4688c0b-0538-4151-995c-d437d7e4829d
|
|
CVE-2022-41991 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1639
|
|
CVE-2022-41992 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1644
|
|
CVE-2022-41999 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1635
|
|
CVE-2022-4200 - https://wpscan.com/vulnerability/ac2e3fea-e1e6-4d90-9945-d8434a00a3cf
|
|
CVE-2022-4201 - https://gitlab.com/gitlab-org/gitlab/-/issues/30376
|
|
CVE-2022-4202 - https://github.com/gpac/gpac/issues/2333
|
|
CVE-2022-42045 - https://github.com/ReCryptLLC/CVE-2022-42045/tree/main
|
|
CVE-2022-42046 - https://github.com/kkent030315/CVE-2022-42046
|
|
CVE-2022-42053 - https://boschko.ca/tenda_ac1200_router/
|
|
CVE-2022-42054 - https://boschko.ca/glinet-router
|
|
CVE-2022-42055 - https://boschko.ca/glinet-router
|
|
CVE-2022-42058 - https://boschko.ca/tenda_ac1200_router
|
|
CVE-2022-42058 - https://boschko.ca/tenda_ac1200_router/
|
|
CVE-2022-4206 - https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4206.json
|
|
CVE-2022-42060 - https://boschko.ca/tenda_ac1200_router
|
|
CVE-2022-42060 - https://boschko.ca/tenda_ac1200_router/
|
|
CVE-2022-42064 - https://packetstormsecurity.com/files/168498/Online-Diagnostic-Lab-Management-System-1.0-SQL-Injection-Shell-Upload.html
|
|
CVE-2022-42066 - https://packetstormsecurity.com/files/168549/Online-Examination-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2022-42067 - https://packetstormsecurity.com/files/168524/Online-Birth-Certificate-Management-System-1.0-Insecure-Direct-Object-Reference.html
|
|
CVE-2022-42069 - https://packetstormsecurity.com/files/168529/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2022-42070 - https://packetstormsecurity.com/files/168522/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Request-Forgery.html
|
|
CVE-2022-42071 - https://packetstormsecurity.com/files/168533/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2022-42077 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-1.md
|
|
CVE-2022-42078 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-2.md
|
|
CVE-2022-42079 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-3.md
|
|
CVE-2022-4208 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
|
CVE-2022-42080 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-4.md
|
|
CVE-2022-42081 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-5.md
|
|
CVE-2022-42086 - https://github.com/tianhui999/myCVE/blob/main/AX1803/AX1803-2.md
|
|
CVE-2022-42087 - https://github.com/tianhui999/myCVE/blob/main/AX1803/AX1803-1.md
|
|
CVE-2022-4209 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
|
CVE-2022-42092 - https://grimthereaperteam.medium.com/backdrop-cms-1-22-0-unrestricted-file-upload-themes-ad42a599561c
|
|
CVE-2022-42094 - https://grimthereaperteam.medium.com/cve-2022-42094-backdrop-xss-at-cards-84266b5250f1
|
|
CVE-2022-42095 - https://grimthereaperteam.medium.com/declined-backdrop-xss-at-pages-26e5d63686bc
|
|
CVE-2022-42096 - https://grimthereaperteam.medium.com/cve-2022-42096-backdrop-xss-at-posts-437c305036e2
|
|
CVE-2022-42097 - https://grimthereaperteam.medium.com/cve-2022-42097-backdrop-xss-at-comments-2ea536ec55e1
|
|
CVE-2022-42098 - https://grimthereaperteam.medium.com/cve-2022-42098-klik-sql-injection-6a9299621789
|
|
CVE-2022-42099 - https://grimthereaperteam.medium.com/klik-socialmediawebsite-version-1-0-1-stored-xss-vulnerability-at-forum-subject-a453789736f2
|
|
CVE-2022-4210 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
|
CVE-2022-42100 - https://grimthereaperteam.medium.com/klik-socialmediawebsite-version-1-0-1-stored-xss-vulnerability-at-reply-form-b189147c1f93
|
|
CVE-2022-42109 - https://medium.com/@grimthereaperteam/online-shopping-system-advanced-sql-injection-at-product-php-c55c435c35c2
|
|
CVE-2022-4211 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
|
CVE-2022-42110 - https://issues.liferay.com/browse/LPE-17403
|
|
CVE-2022-42111 - https://issues.liferay.com/browse/LPE-17379
|
|
CVE-2022-42118 - https://issues.liferay.com/browse/LPE-17342
|
|
CVE-2022-42119 - https://issues.liferay.com/browse/LPE-17632
|
|
CVE-2022-4212 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
|
CVE-2022-42120 - https://issues.liferay.com/browse/LPE-17513
|
|
CVE-2022-42121 - https://issues.liferay.com/browse/LPE-17414
|
|
CVE-2022-42122 - https://issues.liferay.com/browse/LPE-17520
|
|
CVE-2022-42123 - https://issues.liferay.com/browse/LPE-17518
|
|
CVE-2022-42124 - https://issues.liferay.com/browse/LPE-17435
|
|
CVE-2022-42124 - https://issues.liferay.com/browse/LPE-17535
|
|
CVE-2022-42125 - https://issues.liferay.com/browse/LPE-17517
|
|
CVE-2022-42126 - https://issues.liferay.com/browse/LPE-17593
|
|
CVE-2022-42127 - https://issues.liferay.com/browse/LPE-17607
|
|
CVE-2022-42128 - https://issues.liferay.com/browse/LPE-17595
|
|
CVE-2022-42129 - https://issues.liferay.com/browse/LPE-17448
|
|
CVE-2022-42130 - https://issues.liferay.com/browse/LPE-17447
|
|
CVE-2022-42131 - https://issues.liferay.com/browse/LPE-17377
|
|
CVE-2022-42132 - https://issues.liferay.com/browse/LPE-17438
|
|
CVE-2022-42139 - https://cyberdanube.com/en/en-authenticated-command-injection-in-delta-electronics-dvw-w02w2-e2/
|
|
CVE-2022-4214 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
|
CVE-2022-4214 - https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4214
|
|
CVE-2022-42140 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/
|
|
CVE-2022-42141 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/
|
|
CVE-2022-4215 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
|
CVE-2022-42150 - https://github.com/eBPF-Research/eBPF-Attack/blob/main/PoC.md#attack-requirements
|
|
CVE-2022-42150 - https://hackmd.io/@UR9gnr32QymtmtZHnZceOw/ry428EZGo
|
|
CVE-2022-42156 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf
|
|
CVE-2022-42156 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-42159 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf
|
|
CVE-2022-42159 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-4216 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
|
CVE-2022-42160 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf
|
|
CVE-2022-42160 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-42161 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf
|
|
CVE-2022-42161 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-42163 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/fromNatStaticSetting/readme.md
|
|
CVE-2022-42164 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetClientState/readme.md
|
|
CVE-2022-42165 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetDeviceName/readme.md
|
|
CVE-2022-42166 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetSpeedWan/readme.md
|
|
CVE-2022-42167 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetFirewallCfg/readme.md
|
|
CVE-2022-42168 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/fromSetIpMacBind/readme.md
|
|
CVE-2022-42169 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/addWifiMacFilter/readme.md
|
|
CVE-2022-4217 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
|
CVE-2022-42170 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formWifiWpsStart/readme.md
|
|
CVE-2022-42171 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/saveParentControlInfo/readme.md
|
|
CVE-2022-42176 - https://github.com/soy-oreocato/CVE-2022-42176
|
|
CVE-2022-42176 - https://github.com/soy-oreocato/CVE-Advisories/tree/main/PapiQuieroPollo00
|
|
CVE-2022-4218 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
|
CVE-2022-4219 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
|
CVE-2022-42199 - https://github.com/ciph0x01/Simple-Exam-Reviewer-Management-System-CVE/blob/main/CVE-2022-42199.md
|
|
CVE-2022-42199 - https://github.com/ciph0x01/poc/blob/main/poc.html
|
|
CVE-2022-4220 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
|
CVE-2022-4222 - https://vuldb.com/?id.214523
|
|
CVE-2022-42221 - https://github.com/Cj775995/CVE_Report/tree/main/Netgear/R6220
|
|
CVE-2022-42235 - https://github.com/draco1725/Stored-XSS/blob/main/poc
|
|
CVE-2022-42236 - https://github.com/draco1725/vloggers/blob/main/poc
|
|
CVE-2022-42237 - https://github.com/draco1725/sqlinj/blob/main/poc
|
|
CVE-2022-42238 - https://github.com/draco1725/localpriv/blob/main/poc
|
|
CVE-2022-42245 - https://packetstormsecurity.com/files/171585/Dreamer-CMS-4.0.0-SQL-Injection.html
|
|
CVE-2022-42246 - https://github.com/farliy-hacker/Doufoxcms/issues/1
|
|
CVE-2022-42254 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-42255 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-42256 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-42257 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-42258 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-42259 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-4226 - https://wpscan.com/vulnerability/c5ca22e0-b7a5-468d-8366-1855ff33851b
|
|
CVE-2022-42260 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-42261 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-42262 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-42263 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-42264 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-42265 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-42266 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-42267 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
|
CVE-2022-42271 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42272 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42273 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42274 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42275 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42276 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42277 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42278 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42279 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-4228 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/passwd-hash
|
|
CVE-2022-4228 - https://vuldb.com/?id.214587
|
|
CVE-2022-42280 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42281 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42282 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42283 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42284 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42285 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42286 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42287 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42288 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-42289 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-4229 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/broken-access-control
|
|
CVE-2022-42290 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
|
CVE-2022-4230 - https://wpscan.com/vulnerability/a0e40cfd-b217-481c-8fc4-027a0a023312
|
|
CVE-2022-42300 - https://www.veritas.com/content/support/en_US/security/VTS22-013#M2
|
|
CVE-2022-4231 - https://github.com/lithonn/bug-report/tree/main/vendors/tribalsystems/zenario/session-fixation
|
|
CVE-2022-4233 - https://vuldb.com/?id.214591
|
|
CVE-2022-4235 - https://fluidattacks.com/advisories/miller/
|
|
CVE-2022-4236 - https://wpscan.com/vulnerability/436d8894-dab8-41ea-8ed0-a3338aded635
|
|
CVE-2022-4237 - https://wpscan.com/vulnerability/7a4b790c-49ae-46bc-9544-e188deae243f
|
|
CVE-2022-4239 - https://wpscan.com/vulnerability/1c163987-fb53-43f7-bbff-1c2d8c0d694c
|
|
CVE-2022-4242 - https://wpscan.com/vulnerability/d7f89335-630c-47c6-bebf-92f556caa087
|
|
CVE-2022-4243 - https://wpscan.com/vulnerability/fc1fc057-97ee-4a10-909f-2f11eafa0bd0
|
|
CVE-2022-42457 - https://github.com/hubertfarnsworth12/Generex-CS141-Authenticated-Remote-Command-Execution
|
|
CVE-2022-4246 - https://seclists.org/fulldisclosure/2022/Nov/16
|
|
CVE-2022-4247 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/1
|
|
CVE-2022-4248 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/3
|
|
CVE-2022-4248 - https://vuldb.com/?id.214625
|
|
CVE-2022-42484 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1641
|
|
CVE-2022-42490 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640
|
|
CVE-2022-42491 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640
|
|
CVE-2022-42492 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640
|
|
CVE-2022-42493 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640
|
|
CVE-2022-4250 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/2
|
|
CVE-2022-4251 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/4
|
|
CVE-2022-4256 - https://wpscan.com/vulnerability/f5b17c68-c2b0-4d0d-bb7b-19dc30511a89
|
|
CVE-2022-4257 - https://vuldb.com/?id.214631
|
|
CVE-2022-4260 - https://wpscan.com/vulnerability/d0cf24be-df87-4e1f-aae7-e9684c88e7db
|
|
CVE-2022-4265 - https://wpscan.com/vulnerability/095cba08-7edd-41fb-9776-da151c0885dd
|
|
CVE-2022-4266 - https://wpscan.com/vulnerability/1bcda9d3-c573-441e-828f-055fbec2e08d
|
|
CVE-2022-4267 - https://wpscan.com/vulnerability/e09754f2-e241-4bf8-8c95-a3fbc0ba7585
|
|
CVE-2022-4268 - https://bulletin.iese.de/post/plugin-logic_1-0-7/
|
|
CVE-2022-4268 - https://wpscan.com/vulnerability/bde93d90-1178-4d55-aea9-e02c4f8bcaa2
|
|
CVE-2022-42703 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.7
|
|
CVE-2022-42703 - https://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html
|
|
CVE-2022-4271 - https://huntr.dev/bounties/a11c922f-255a-412a-aa87-7f3bd7121599
|
|
CVE-2022-42710 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-42710/CVE-2022-42710.txt
|
|
CVE-2022-42716 - http://packetstormsecurity.com/files/170420/Arm-Mali-CSF-KBASE_REG_NO_USER_FREE-Unsafe-Use-Use-After-Free.html
|
|
CVE-2022-42719 - http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html
|
|
CVE-2022-42719 - http://www.openwall.com/lists/oss-security/2022/10/13/5
|
|
CVE-2022-4272 - https://github.com/FeMiner/wms/issues/14
|
|
CVE-2022-42720 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
|
|
CVE-2022-42720 - http://www.openwall.com/lists/oss-security/2022/10/13/5
|
|
CVE-2022-42721 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
|
|
CVE-2022-42721 - http://www.openwall.com/lists/oss-security/2022/10/13/5
|
|
CVE-2022-42722 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
|
|
CVE-2022-42722 - http://www.openwall.com/lists/oss-security/2022/10/13/5
|
|
CVE-2022-4273 - https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/bypass-fileupload-rce
|
|
CVE-2022-4273 - https://vuldb.com/?id.214769
|
|
CVE-2022-42732 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697
|
|
CVE-2022-42733 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697
|
|
CVE-2022-42734 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697
|
|
CVE-2022-4274 - https://github.com/nikeshtiwari1/House-Rental-System/issues/6
|
|
CVE-2022-4274 - https://vuldb.com/?id.214770
|
|
CVE-2022-4275 - https://github.com/nikeshtiwari1/House-Rental-System/issues/7
|
|
CVE-2022-4276 - https://github.com/nikeshtiwari1/House-Rental-System/issues/8
|
|
CVE-2022-4276 - https://vuldb.com/?id.214772
|
|
CVE-2022-4278 - https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/employeeadd-sqli
|
|
CVE-2022-4279 - https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/employee-view-xss
|
|
CVE-2022-4279 - https://vuldb.com/?id.214776
|
|
CVE-2022-4280 - https://vuldb.com/?id.214778
|
|
CVE-2022-42801 - http://packetstormsecurity.com/files/170011/XNU-vm_object-Use-After-Free.html
|
|
CVE-2022-42821 - http://seclists.org/fulldisclosure/2022/Dec/24
|
|
CVE-2022-42821 - http://seclists.org/fulldisclosure/2022/Dec/25
|
|
CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/27
|
|
CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/24
|
|
CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/25
|
|
CVE-2022-42841 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42841 - http://seclists.org/fulldisclosure/2022/Dec/24
|
|
CVE-2022-42841 - http://seclists.org/fulldisclosure/2022/Dec/25
|
|
CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/24
|
|
CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/25
|
|
CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-42843 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42843 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42843 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-42844 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/24
|
|
CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/25
|
|
CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-42846 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42846 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-42847 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42848 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42848 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-42848 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-42849 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42849 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-4285 - https://sourceware.org/bugzilla/show_bug.cgi?id=29699
|
|
CVE-2022-42850 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42851 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42851 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/27
|
|
CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/28
|
|
CVE-2022-42853 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42854 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42854 - http://seclists.org/fulldisclosure/2022/Dec/24
|
|
CVE-2022-42855 - http://packetstormsecurity.com/files/170518/libCoreEntitlements-CEContextQuery-Arbitrary-Entitlement-Returns.html
|
|
CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/24
|
|
CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/22
|
|
CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/28
|
|
CVE-2022-42859 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42859 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/24
|
|
CVE-2022-42862 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42862 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/27
|
|
CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/28
|
|
CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/24
|
|
CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/25
|
|
CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/27
|
|
CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/27
|
|
CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/27
|
|
CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/27
|
|
CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/28
|
|
CVE-2022-42885 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1668
|
|
CVE-2022-42889 - http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html
|
|
CVE-2022-42889 - http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html
|
|
CVE-2022-42891 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697
|
|
CVE-2022-42892 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697
|
|
CVE-2022-42893 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697
|
|
CVE-2022-42894 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697
|
|
CVE-2022-42905 - http://packetstormsecurity.com/files/170610/wolfSSL-WOLFSSL_CALLBACKS-Heap-Buffer-Over-Read.html
|
|
CVE-2022-42905 - http://seclists.org/fulldisclosure/2023/Jan/11
|
|
CVE-2022-42905 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
|
|
CVE-2022-4291 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
|
CVE-2022-42915 - http://seclists.org/fulldisclosure/2023/Jan/19
|
|
CVE-2022-42916 - http://seclists.org/fulldisclosure/2023/Jan/19
|
|
CVE-2022-4292 - https://huntr.dev/bounties/da3d4c47-e57a-451e-993d-9df0ed31f57b
|
|
CVE-2022-42927 - https://bugzilla.mozilla.org/show_bug.cgi?id=1789128
|
|
CVE-2022-4293 - https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143
|
|
CVE-2022-4294 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
|
CVE-2022-42948 - https://www.cobaltstrike.com/blog/
|
|
CVE-2022-4295 - https://wpscan.com/vulnerability/4ced1a4d-0c1f-42ad-8473-241c68b92b56
|
|
CVE-2022-42953 - https://seclists.org/fulldisclosure/2022/Oct/23
|
|
CVE-2022-42953 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
|
CVE-2022-42964 - https://research.jfrog.com/vulnerabilities/pymatgen-redos-xray-257184/
|
|
CVE-2022-42965 - https://research.jfrog.com/vulnerabilities/snowflake-connector-python-redos-xray-257185/
|
|
CVE-2022-42966 - https://research.jfrog.com/vulnerabilities/cleo-redos-xray-257186/
|
|
CVE-2022-42967 - https://research.jfrog.com/vulnerabilities/caret-xss-rce/
|
|
CVE-2022-42969 - https://github.com/pytest-dev/py/issues/287
|
|
CVE-2022-4297 - http://packetstormsecurity.com/files/173293/WordPress-WP-AutoComplete-Search-1.0.4-SQL-Injection.html
|
|
CVE-2022-4297 - https://wpscan.com/vulnerability/e2dcc76c-65ac-4cd6-a5c9-6d813b5ac26d
|
|
CVE-2022-42979 - https://medium.com/@jalee0606/how-i-found-my-first-one-click-account-takeover-via-deeplink-in-ryde-5406010c36d8
|
|
CVE-2022-4298 - https://wpscan.com/vulnerability/7485ad23-6ea4-4018-88b1-174312a0a478
|
|
CVE-2022-42980 - https://github.com/go-admin-team/go-admin/issues/716
|
|
CVE-2022-4299 - https://wpscan.com/vulnerability/169c5611-ed10-4cc3-bd07-09b365adf303
|
|
CVE-2022-42991 - https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Public%20Access%20Catalog/XSS
|
|
CVE-2022-42992 - https://github.com/draco1725/POC/blob/main/Exploit/Train%20Scheduler%20App/XSS
|
|
CVE-2022-42993 - https://github.com/draco1725/POC/blob/main/Exploit/Password%20Storage%20Application/XSS
|
|
CVE-2022-42998 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2IPQoSTcAdd
|
|
CVE-2022-42998 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-42999 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSysAdm
|
|
CVE-2022-42999 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-4300 - https://vuldb.com/?id.214901
|
|
CVE-2022-43000 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2WizardStep4
|
|
CVE-2022-43000 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-43001 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSecurity
|
|
CVE-2022-43001 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-43002 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2WizardStep54
|
|
CVE-2022-43002 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-43003 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setRepeaterSecurity
|
|
CVE-2022-43003 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-4301 - https://wpscan.com/vulnerability/a8dca528-fb70-44f3-8149-21385039179d
|
|
CVE-2022-43014 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_joborderID.md
|
|
CVE-2022-43015 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_entriesPerPage.md
|
|
CVE-2022-43016 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_callback.md
|
|
CVE-2022-43017 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_indexFile.md
|
|
CVE-2022-43018 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_checkEmail.md
|
|
CVE-2022-4302 - https://wpscan.com/vulnerability/b7707a15-0987-4051-a8ac-7be2424bcb01
|
|
CVE-2022-43020 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_in_Tag_Updates.md
|
|
CVE-2022-43021 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_JobOrders.md
|
|
CVE-2022-43022 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_tag_deletion.md
|
|
CVE-2022-43023 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_imports_errors.md
|
|
CVE-2022-43024 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-6.md
|
|
CVE-2022-43025 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-1.md
|
|
CVE-2022-43026 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-2.md
|
|
CVE-2022-43027 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-5.md
|
|
CVE-2022-43028 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-3.md
|
|
CVE-2022-43029 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-4.md
|
|
CVE-2022-4303 - https://wpscan.com/vulnerability/8428a5e1-dbef-4516-983f-f95605c6dd09
|
|
CVE-2022-43039 - https://github.com/gpac/gpac/issues/2281
|
|
CVE-2022-43040 - https://github.com/gpac/gpac/issues/2280
|
|
CVE-2022-43042 - https://github.com/gpac/gpac/issues/2278
|
|
CVE-2022-43043 - https://github.com/gpac/gpac/issues/2276
|
|
CVE-2022-43044 - https://github.com/gpac/gpac/issues/2282
|
|
CVE-2022-43045 - https://github.com/gpac/gpac/issues/2277
|
|
CVE-2022-43046 - https://github.com/Oudaorui/bug_report/blob/main/vendors/oretnom23/Food%20Ordering%20Management%20System/XSS-1.md
|
|
CVE-2022-4305 - https://wpscan.com/vulnerability/286d972d-7bda-455c-a226-fd9ce5f925bd
|
|
CVE-2022-4306 - https://wpscan.com/vulnerability/18d7f9af-7267-4723-9d6f-05b895c94dbe
|
|
CVE-2022-4307 - https://wpscan.com/vulnerability/4000ba69-d73f-4c5b-a299-82898304cebb
|
|
CVE-2022-43071 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42349&p=43959#p43959
|
|
CVE-2022-43076 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-1.md
|
|
CVE-2022-43078 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-2.md
|
|
CVE-2022-43079 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-3.md
|
|
CVE-2022-43081 - https://github.com/Tr0e/CVE_Hunter/blob/main/SQLi-3.md
|
|
CVE-2022-43082 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-4.md
|
|
CVE-2022-43083 - https://github.com/Tr0e/CVE_Hunter/blob/main/RCE-2.md
|
|
CVE-2022-43084 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-5.md
|
|
CVE-2022-43085 - https://github.com/Tr0e/CVE_Hunter/blob/main/RCE-3.md
|
|
CVE-2022-43086 - https://github.com/Tr0e/CVE_Hunter/blob/main/SQLi-4.md
|
|
CVE-2022-4309 - https://wpscan.com/vulnerability/1965f53d-c94e-4322-9059-49de69df1051
|
|
CVE-2022-4310 - https://wpscan.com/vulnerability/b1aef75d-0c84-4702-83fc-11f0e98a0821
|
|
CVE-2022-43101 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#formsetdevicenameset_device_namesprintfv4-s1-a1
|
|
CVE-2022-43102 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#fromsetsystimesub_496104strcpychar-v6-s
|
|
CVE-2022-43103 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#formsetqosband
|
|
CVE-2022-43104 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#fromsetwirelessrepeatsub_45cd64sub_45cad8sub_45bb10
|
|
CVE-2022-43105 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#fromsetwifigusetbasic
|
|
CVE-2022-43106 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#setschedwifi-strcpychar-ptr--2-v8
|
|
CVE-2022-43107 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#setsmartpowermanagement
|
|
CVE-2022-43108 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#formsetfirewallcfg
|
|
CVE-2022-43109 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-43117 - https://drive.google.com/file/d/1ZmAuKMVzUpL8pt5KXQJk8IyPECoVP9xw/view?usp=sharing
|
|
CVE-2022-43117 - https://github.com/RashidKhanPathan/CVE-2022-43117
|
|
CVE-2022-43119 - https://github.com/sinemsahn/POC/blob/main/Create%20Clansphere%202011.4%20%22username%22%20xss.md
|
|
CVE-2022-43138 - https://www.exploit-db.com/exploits/50248
|
|
CVE-2022-4314 - https://huntr.dev/bounties/b2dc504d-92ae-4221-a096-12ff223d95a8
|
|
CVE-2022-43140 - https://github.com/kekingcn/kkFileView/issues/392
|
|
CVE-2022-43143 - https://github.com/beekeeper-studio/beekeeper-studio/issues/1393
|
|
CVE-2022-43144 - https://github.com/mudassiruddin/CVE-2022-43144-Stored-XSS
|
|
CVE-2022-43146 - https://medium.com/@syedmudassiruddinalvi/cve-2022-43146-rce-via-arbitrary-file-upload-28dfa77c5de7
|
|
CVE-2022-43148 - https://github.com/lvu/rtf2html/issues/11
|
|
CVE-2022-43151 - https://github.com/hzeller/timg/issues/92
|
|
CVE-2022-43152 - https://github.com/justdan96/tsMuxer/issues/641
|
|
CVE-2022-43164 - https://github.com/anhdq201/rukovoditel/issues/4
|
|
CVE-2022-43165 - https://github.com/anhdq201/rukovoditel/issues/5
|
|
CVE-2022-43166 - https://github.com/anhdq201/rukovoditel/issues/2
|
|
CVE-2022-43167 - https://github.com/anhdq201/rukovoditel/issues/7
|
|
CVE-2022-43168 - https://github.com/anhdq201/rukovoditel/issues/1
|
|
CVE-2022-43169 - https://github.com/anhdq201/rukovoditel/issues/3
|
|
CVE-2022-43170 - https://github.com/anhdq201/rukovoditel/issues/6
|
|
CVE-2022-43171 - https://github.com/lief-project/LIEF/issues/782
|
|
CVE-2022-43183 - https://github.com/xuxueli/xxl-job/issues/3002
|
|
CVE-2022-43184 - https://github.com/HuangPayoung/CVE-request/tree/main/DLink/vuln2
|
|
CVE-2022-43184 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-43192 - https://github.com/linchuzhu/Dedecms-v5.7.101-RCE
|
|
CVE-2022-4320 - https://wpscan.com/vulnerability/f1244c57-d886-4a6e-8cdb-18404e8c153c
|
|
CVE-2022-4321 - https://wpscan.com/vulnerability/6ac1259c-86d9-428b-ba98-7f3d07910644
|
|
CVE-2022-43221 - https://github.com/ToughRunner/Open5gs_bugreport3
|
|
CVE-2022-43222 - https://github.com/ToughRunner/Open5gs_bugreport4
|
|
CVE-2022-43223 - https://github.com/ToughRunner/Open5gs_bugreport2
|
|
CVE-2022-43229 - http://packetstormsecurity.com/files/169605/Simple-Cold-Storage-Management-System-1.0-SQL-Injection.html
|
|
CVE-2022-4323 - https://wpscan.com/vulnerability/ce8027b8-9473-463e-ba80-49b3d6d16228
|
|
CVE-2022-43235 - https://github.com/strukturag/libde265/issues/337
|
|
CVE-2022-43236 - https://github.com/strukturag/libde265/issues/343
|
|
CVE-2022-43237 - https://github.com/strukturag/libde265/issues/344
|
|
CVE-2022-43238 - https://github.com/strukturag/libde265/issues/336
|
|
CVE-2022-43239 - https://github.com/strukturag/libde265/issues/341
|
|
CVE-2022-4324 - https://wpscan.com/vulnerability/70c39236-f7ae-49bf-a2f0-7cb9aa983e45
|
|
CVE-2022-43240 - https://github.com/strukturag/libde265/issues/335
|
|
CVE-2022-43241 - https://github.com/strukturag/libde265/issues/338
|
|
CVE-2022-43242 - https://github.com/strukturag/libde265/issues/340
|
|
CVE-2022-43243 - https://github.com/strukturag/libde265/issues/339
|
|
CVE-2022-43244 - https://github.com/strukturag/libde265/issues/342
|
|
CVE-2022-43245 - https://github.com/strukturag/libde265/issues/352
|
|
CVE-2022-43248 - https://github.com/strukturag/libde265/issues/349
|
|
CVE-2022-43249 - https://github.com/strukturag/libde265/issues/345
|
|
CVE-2022-4325 - https://wpscan.com/vulnerability/5b983c48-6b05-47cf-85cb-28bbeec17395
|
|
CVE-2022-43250 - https://github.com/strukturag/libde265/issues/346
|
|
CVE-2022-43252 - https://github.com/strukturag/libde265/issues/347
|
|
CVE-2022-43253 - https://github.com/strukturag/libde265/issues/348
|
|
CVE-2022-43254 - https://github.com/gpac/gpac/issues/2284
|
|
CVE-2022-43255 - https://github.com/gpac/gpac/issues/2285
|
|
CVE-2022-43256 - https://github.com/seacms-com/seacms/issues/23
|
|
CVE-2022-43263 - https://www.pizzapower.me/2022/10/11/guitar-pro-directory-traversal-and-filename-xss/
|
|
CVE-2022-43264 - https://www.pizzapower.me/2022/10/11/guitar-pro-directory-traversal-and-filename-xss/
|
|
CVE-2022-43265 - https://10degres.net/cves/cve-2022-43265/
|
|
CVE-2022-4328 - https://wpscan.com/vulnerability/4dc72cd2-81d7-4a66-86bd-c9cfaf690eed
|
|
CVE-2022-43280 - https://github.com/WebAssembly/wabt/issues/1982
|
|
CVE-2022-43281 - https://github.com/WebAssembly/wabt/issues/1981
|
|
CVE-2022-43282 - https://github.com/WebAssembly/wabt/issues/1983
|
|
CVE-2022-43283 - https://github.com/WebAssembly/wabt/issues/1985
|
|
CVE-2022-43284 - https://github.com/nginx/njs/issues/470
|
|
CVE-2022-43284 - https://github.com/nginx/njs/issues/529
|
|
CVE-2022-43285 - https://github.com/nginx/njs/issues/533
|
|
CVE-2022-43286 - https://github.com/nginx/njs/issues/480
|
|
CVE-2022-43288 - https://github.com/Kubozz/rukovoditel-3.2.1/issues/2
|
|
CVE-2022-43289 - https://github.com/jsummers/deark/issues/52
|
|
CVE-2022-4329 - https://wpscan.com/vulnerability/d7f2c1c1-75b7-4aec-8574-f38d506d064a
|
|
CVE-2022-43293 - https://github.com/LucaBarile/CVE-2022-43293
|
|
CVE-2022-43293 - https://lucabarile.github.io/Blog/CVE-2022-43293/index.html
|
|
CVE-2022-4330 - https://wpscan.com/vulnerability/d3c39e17-1dc3-4275-97d8-543ca7226772
|
|
CVE-2022-43308 - https://github.com/vitorespf/Advisories/blob/master/Intelbras-switch.txt
|
|
CVE-2022-4331 - https://gitlab.com/gitlab-org/gitlab/-/issues/385050
|
|
CVE-2022-43317 - https://github.com/ImaizumiYui/bug_report/blob/main/vendors/oretnom23/Human%20Resource%20Management%20System/XSS-1.md
|
|
CVE-2022-43320 - https://github.com/liufee/feehicms/issues/4
|
|
CVE-2022-43321 - https://github.com/shopwind/yii-shopwind/issues/1
|
|
CVE-2022-43325 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-43325
|
|
CVE-2022-43326 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-43326
|
|
CVE-2022-43333 - https://www.swascan.com/it/security-advisory-telenia-software-tvox/
|
|
CVE-2022-43340 - https://github.com/zyx0814/dzzoffice/issues/223
|
|
CVE-2022-43342 - https://discussions.eramba.org/t/question-stored-xss-vulnerability/2326
|
|
CVE-2022-4335 - https://gitlab.com/gitlab-org/gitlab/-/issues/353018
|
|
CVE-2022-43357 - https://github.com/sass/libsass/issues/3177
|
|
CVE-2022-43358 - https://github.com/sass/libsass/issues/3178
|
|
CVE-2022-43372 - https://github.com/emlog/emlog/issues/195
|
|
CVE-2022-43380 - https://www.ibm.com/support/pages/node/6847947
|
|
CVE-2022-4340 - https://wpscan.com/vulnerability/8a7bd9f6-2789-474b-a237-01c643fdfba7
|
|
CVE-2022-43403 - https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/
|
|
CVE-2022-43441 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1645
|
|
CVE-2022-4346 - https://wpscan.com/vulnerability/cc05f760-983d-4dc1-afbb-6b4965aa8abe
|
|
CVE-2022-43467 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1671
|
|
CVE-2022-4347 - https://vuldb.com/?id.215107
|
|
CVE-2022-43473 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685
|
|
CVE-2022-43484 - http://terasolunaorg.github.io/vulnerability/cve-2022-43484.html
|
|
CVE-2022-43484 - https://osdn.net/projects/terasoluna/wiki/cve-2022-43484
|
|
CVE-2022-4349 - https://gitee.com/CTF-hacker/pwn/issues/I5WAAB
|
|
CVE-2022-4350 - https://vuldb.com/?id.215112
|
|
CVE-2022-4351 - https://wpscan.com/vulnerability/2138f736-8a50-4390-a239-fcd1d736670a
|
|
CVE-2022-4352 - https://wpscan.com/vulnerability/325874f4-2482-4ae5-b5cf-cb9ff0843067
|
|
CVE-2022-4355 - https://wpscan.com/vulnerability/221bf87b-69e2-4c53-971e-8516b798c759
|
|
CVE-2022-4356 - https://wpscan.com/vulnerability/27a8d7cb-e179-408e-af13-8722ab41947b
|
|
CVE-2022-4357 - https://wpscan.com/vulnerability/4d1c0886-11f7-494f-b175-691253f46626
|
|
CVE-2022-4358 - https://wpscan.com/vulnerability/0076a3b8-9a25-41c9-bb07-36ffe2c8c37d
|
|
CVE-2022-43588 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1647
|
|
CVE-2022-43589 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1648
|
|
CVE-2022-4359 - https://wpscan.com/vulnerability/8472dd40-27e3-4084-907a-e251a2a0f339
|
|
CVE-2022-43590 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1649
|
|
CVE-2022-43591 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1650
|
|
CVE-2022-43592 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1651
|
|
CVE-2022-43593 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652
|
|
CVE-2022-43594 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653
|
|
CVE-2022-43595 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653
|
|
CVE-2022-43596 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1654
|
|
CVE-2022-43597 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1655
|
|
CVE-2022-43598 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1655
|
|
CVE-2022-43599 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656
|
|
CVE-2022-4360 - https://wpscan.com/vulnerability/40c420aa-5da0-42f9-a94f-f68ef57fcdae
|
|
CVE-2022-43600 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656
|
|
CVE-2022-43601 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656
|
|
CVE-2022-43602 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656
|
|
CVE-2022-43603 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1657
|
|
CVE-2022-43604 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1661
|
|
CVE-2022-43605 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1662
|
|
CVE-2022-43606 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1663
|
|
CVE-2022-43607 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1664
|
|
CVE-2022-4362 - https://wpscan.com/vulnerability/2660225a-e4c8-40f2-8c98-775ef2301212
|
|
CVE-2022-4364 - https://github.com/siriuswhiter/VulnHub/blob/main/Flir/02-FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E1.md
|
|
CVE-2022-4365 - https://hackerone.com/reports/1792626
|
|
CVE-2022-4366 - https://huntr.dev/bounties/f225d69a-d971-410d-a8f9-b0026143aed8
|
|
CVE-2022-43663 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1674
|
|
CVE-2022-43664 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1673
|
|
CVE-2022-43665 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1682
|
|
CVE-2022-43675 - https://www.gruppotim.it/redteam
|
|
CVE-2022-4368 - https://wpscan.com/vulnerability/fa7e2b64-ca48-4b76-a2c2-f5e31e42eab7
|
|
CVE-2022-43684 - http://packetstormsecurity.com/files/173354/ServiceNow-Insecure-Access-Control-Full-Admin-Compromise.html
|
|
CVE-2022-4369 - https://wpscan.com/vulnerability/460a01e5-7ce5-4d49-b068-a93ea1fba0e3
|
|
CVE-2022-4370 - https://bulletin.iese.de/post/multimedial-images_1-0b
|
|
CVE-2022-4370 - https://wpscan.com/vulnerability/cf336783-9959-413d-a5d7-73c7087426d8
|
|
CVE-2022-43701 - https://developer.arm.com/documentation/ka005596/latest
|
|
CVE-2022-43702 - https://developer.arm.com/documentation/ka005596/latest
|
|
CVE-2022-43703 - https://developer.arm.com/documentation/ka005596/latest
|
|
CVE-2022-43704 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-43704-capture-replay-vulnerability-in-sinilink-xy-wft1-thermostat/
|
|
CVE-2022-4371 - https://bulletin.iese.de/post/web-invoice_2-1-3_1
|
|
CVE-2022-4371 - https://wpscan.com/vulnerability/45f43359-98c2-4447-b51b-2d466bad8261
|
|
CVE-2022-4372 - https://bulletin.iese.de/post/web-invoice_2-1-3_2
|
|
CVE-2022-4372 - https://wpscan.com/vulnerability/218f8015-e14b-46a8-889d-08b2b822f8ae
|
|
CVE-2022-4373 - https://wpscan.com/vulnerability/aa07ddac-4f3d-4c4c-ba26-19bc05f22f02
|
|
CVE-2022-4374 - https://wpscan.com/vulnerability/bbaa808d-47b1-4c70-b157-f8297f627a07
|
|
CVE-2022-4375 - https://gitee.com/mingSoft/MCMS/issues/I61TG5
|
|
CVE-2022-43750 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.15
|
|
CVE-2022-43753 - https://bugzilla.suse.com/show_bug.cgi?id=1204716
|
|
CVE-2022-43769 - http://packetstormsecurity.com/files/172296/Pentaho-Business-Server-Authentication-Bypass-SSTI-Code-Execution.html
|
|
CVE-2022-43774 - https://www.tenable.com/security/research/tra-2022-33
|
|
CVE-2022-43775 - https://www.tenable.com/security/research/tra-2022-33
|
|
CVE-2022-43776 - https://www.tenable.com/security/research/tra-2022-34
|
|
CVE-2022-4378 - http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
|
|
CVE-2022-4378 - https://seclists.org/oss-sec/2022/q4/178
|
|
CVE-2022-4379 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0
|
|
CVE-2022-4379 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da
|
|
CVE-2022-4381 - https://wpscan.com/vulnerability/8bf8ebe8-1063-492d-a0f9-2f824408d0df
|
|
CVE-2022-4383 - https://wpscan.com/vulnerability/e0fe5a53-8ae2-4b67-ac6e-4a8860e39035
|
|
CVE-2022-4384 - https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5
|
|
CVE-2022-43848 - https://www.ibm.com/support/pages/node/6847947
|
|
CVE-2022-43849 - https://www.ibm.com/support/pages/node/6847947
|
|
CVE-2022-4385 - https://wpscan.com/vulnerability/8f900d37-6eee-4434-8b9b-d10cc4a9167c
|
|
CVE-2022-4386 - https://wpscan.com/vulnerability/734064e3-afe9-4dfd-8d76-8a757cc94815
|
|
CVE-2022-4391 - https://wpscan.com/vulnerability/c0c37787-3c4c-42d5-bb75-5d4ed3e7aa2b
|
|
CVE-2022-4392 - https://wpscan.com/vulnerability/c298e3dc-09a7-40bb-a361-f49af4bce77e
|
|
CVE-2022-4393 - https://wpscan.com/vulnerability/0bd4f370-f9f8-43ee-8f20-96e899a1efb5
|
|
CVE-2022-43939 - http://packetstormsecurity.com/files/172296/Pentaho-Business-Server-Authentication-Bypass-SSTI-Code-Execution.html
|
|
CVE-2022-4394 - https://wpscan.com/vulnerability/8edbdea1-f9bb-407a-bcd1-fff3e146984c
|
|
CVE-2022-43945 - http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
|
|
CVE-2022-43945 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8
|
|
CVE-2022-4395 - https://wpscan.com/vulnerability/80407ac4-8ce3-4df7-9c41-007b69045c40
|
|
CVE-2022-43970 - https://youtu.be/73-1lhvJPNg
|
|
CVE-2022-43970 - https://youtu.be/RfWVYCUBNZ0
|
|
CVE-2022-43970 - https://youtu.be/TeWAmZaKQ_w
|
|
CVE-2022-43971 - https://youtu.be/73-1lhvJPNg
|
|
CVE-2022-43971 - https://youtu.be/RfWVYCUBNZ0
|
|
CVE-2022-43971 - https://youtu.be/TeWAmZaKQ_w
|
|
CVE-2022-43972 - https://youtu.be/73-1lhvJPNg
|
|
CVE-2022-43972 - https://youtu.be/RfWVYCUBNZ0
|
|
CVE-2022-43972 - https://youtu.be/TeWAmZaKQ_w
|
|
CVE-2022-43973 - https://youtu.be/73-1lhvJPNg
|
|
CVE-2022-43973 - https://youtu.be/RfWVYCUBNZ0
|
|
CVE-2022-43973 - https://youtu.be/TeWAmZaKQ_w
|
|
CVE-2022-43974 - https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842
|
|
CVE-2022-4398 - https://huntr.dev/bounties/c6f8d3ef-5420-4eba-9a5f-aba5e2b5fea2
|
|
CVE-2022-43996 - https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0003.json
|
|
CVE-2022-43997 - https://winternl.com/cve-2022-43997/
|
|
CVE-2022-43999 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-034.txt
|
|
CVE-2022-43999 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
|
CVE-2022-44000 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-032.txt
|
|
CVE-2022-44000 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
|
CVE-2022-44001 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-035.txt
|
|
CVE-2022-44001 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
|
CVE-2022-44002 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
|
CVE-2022-44003 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-029.txt
|
|
CVE-2022-44003 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
|
CVE-2022-44004 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-030.txt
|
|
CVE-2022-44004 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
|
CVE-2022-44005 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-026.txt
|
|
CVE-2022-44005 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
|
CVE-2022-44006 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-031.txt
|
|
CVE-2022-44006 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
|
CVE-2022-44007 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-036.txt
|
|
CVE-2022-44007 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
|
CVE-2022-44008 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-037.txt
|
|
CVE-2022-44012 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/
|
|
CVE-2022-44013 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/
|
|
CVE-2022-44014 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/
|
|
CVE-2022-44015 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/
|
|
CVE-2022-44016 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/
|
|
CVE-2022-44017 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/
|
|
CVE-2022-44019 - https://www.edoardoottavianelli.it/CVE-2022-44019/
|
|
CVE-2022-44019 - https://www.youtube.com/watch?v=x-u3eS8-xJg
|
|
CVE-2022-4403 - https://vuldb.com/?id.215272
|
|
CVE-2022-44037 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44037
|
|
CVE-2022-44038 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44038
|
|
CVE-2022-4407 - https://huntr.dev/bounties/a1649f43-78c9-4927-b313-36911872a84b
|
|
CVE-2022-44079 - https://github.com/zrax/pycdc/issues/291
|
|
CVE-2022-4408 - https://huntr.dev/bounties/2ec4ddd4-de22-4f2d-ba92-3382b452bfea
|
|
CVE-2022-44081 - https://github.com/lvandeve/lodepng/issues/177
|
|
CVE-2022-4409 - https://huntr.dev/bounties/5915ed4c-5fe2-42e7-8fac-5dd0d032727c
|
|
CVE-2022-44096 - https://github.com/upasvi/CVE-/issues/1
|
|
CVE-2022-44097 - https://github.com/upasvi/CVE-/issues/2
|
|
CVE-2022-44108 - https://github.com/ldenoue/pdftojson/issues/3
|
|
CVE-2022-44109 - https://github.com/ldenoue/pdftojson/issues/4
|
|
CVE-2022-44118 - https://gist.github.com/yinfei6/56bb396f579cb67840ed1ecb77460a5b
|
|
CVE-2022-4413 - https://huntr.dev/bounties/70ac720d-c932-4ed3-98b1-dd2cbcb90185
|
|
CVE-2022-4414 - https://huntr.dev/bounties/131a41e5-c936-4c3f-84fc-e0e1f0e090b5
|
|
CVE-2022-44149 - http://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-42.103.1.5095-Remote-Code-Execution.html
|
|
CVE-2022-44149 - http://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-80.103.2.5045-Remote-Code-Execution.html
|
|
CVE-2022-44149 - https://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-42.103.1.5095-Remote-Code-Execution.html
|
|
CVE-2022-4415 - https://www.openwall.com/lists/oss-security/2022/12/21/3
|
|
CVE-2022-44156 - https://drive.google.com/file/d/1dbMwByl40uqMiSv_DOEW8pFjRhGX-j97/view?usp=sharing
|
|
CVE-2022-44158 - https://drive.google.com/file/d/11PSsUpLmLCl0-eO565TLbVavzfP5aWdG/view?usp=sharing
|
|
CVE-2022-44167 - https://drive.google.com/file/d/1Jq8Tm_2FDS4WDD_afdhg1LnA3VcvZdjS/view?usp=sharing
|
|
CVE-2022-4417 - https://wpscan.com/vulnerability/a8c6b077-ff93-4c7b-970f-3be4d7971aa5
|
|
CVE-2022-44201 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-44202 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-44204 - https://github.com/flamingo1616/iot_vuln/blob/main/D-Link/DIR-3060/5.md
|
|
CVE-2022-44204 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-44215 - https://github.com/JBalanza/CVE-2022-44215
|
|
CVE-2022-44235 - https://github.com/liong007/Zed-3/issues/1
|
|
CVE-2022-4426 - https://wpscan.com/vulnerability/7d3d6b9c-d1c1-4e23-b891-7c72e4e89c38
|
|
CVE-2022-44262 - https://github.com/ff4j/ff4j/issues/624
|
|
CVE-2022-44267 - https://www.metabaseq.com/imagemagick-zero-days/
|
|
CVE-2022-44268 - http://packetstormsecurity.com/files/171727/ImageMagick-7.1.0-48-Arbitrary-File-Read.html
|
|
CVE-2022-44268 - https://www.metabaseq.com/imagemagick-zero-days/
|
|
CVE-2022-44276 - https://github.com/HerrLeStrate/CVE-2022-44276-PoC
|
|
CVE-2022-44279 - https://github.com/Onetpaer/bug_report/blob/main/vendors/mayuri_k/garage-management-system/xss1.md
|
|
CVE-2022-44283 - https://packetstormsecurity.com/files/169427/AVS-Audio-Converter-10.3-Stack-Overflow.html
|
|
CVE-2022-44284 - https://packetstormsecurity.com/files/169531/Dinstar-FXO-Analog-VoIP-Gateway-DAG2000-16O-Cross-Site-Scripting.html
|
|
CVE-2022-4429 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
|
CVE-2022-44290 - https://github.com/anhdq201/webtareas/issues/2
|
|
CVE-2022-44291 - https://github.com/anhdq201/webtareas/issues/1
|
|
CVE-2022-44298 - https://github.com/siteserver/cms/issues/3492
|
|
CVE-2022-4431 - https://wpscan.com/vulnerability/860b882b-983c-44b5-8c09-b6890df8a0da
|
|
CVE-2022-4431 - https://wpscan.com/vulnerability/c7d12fd4-7346-4727-9f6c-7e7e5524a932
|
|
CVE-2022-44354 - https://github.com/strik3r0x1/Vulns/blob/main/Unrestricted%20File%20Upload_%20SolarView%20Compact%204.0%2C5.0.md
|
|
CVE-2022-44355 - https://github.com/strik3r0x1/Vulns/blob/main/SolarView%20Compact%20XSS%20up%20to%207.0.md
|
|
CVE-2022-44356 - https://github.com/strik3r0x1/Vulns/blob/main/Wavlink%20WL-WN531G3.md
|
|
CVE-2022-44362 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formAddSysLogRule/readme.md
|
|
CVE-2022-44363 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetSnmpInfo/readme.md
|
|
CVE-2022-44365 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetSysPwd/readme.md
|
|
CVE-2022-44366 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetDiagnoseInfo/readme.md
|
|
CVE-2022-44367 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetUplinkInfo/readme.md
|
|
CVE-2022-44373 - https://github.com/johnawm/vulner-box/blob/master/TRENDNet/TEW-820AP/02/README.md
|
|
CVE-2022-44380 - https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/
|
|
CVE-2022-44381 - https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/
|
|
CVE-2022-44384 - https://www.exploit-db.com/exploits/49783
|
|
CVE-2022-4442 - https://wpscan.com/vulnerability/12766537-df59-49d6-815a-4d68265a4c4a
|
|
CVE-2022-4443 - https://wpscan.com/vulnerability/1e621d62-13c7-4b2f-96ca-3617a796d037
|
|
CVE-2022-4445 - https://wpscan.com/vulnerability/9bb6fde0-1347-496b-be03-3512e6b7e8f8
|
|
CVE-2022-44451 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1669
|
|
CVE-2022-4446 - https://huntr.dev/bounties/718f1be6-3834-4ef2-8134-907a52009894
|
|
CVE-2022-4447 - https://wpscan.com/vulnerability/6939c405-ac62-4144-bd86-944d7b89d0ad
|
|
CVE-2022-4448 - https://wpscan.com/vulnerability/ce467a2e-081e-4a6c-bfa4-29e4447ebd3b
|
|
CVE-2022-4449 - https://wpscan.com/vulnerability/a4895f8d-5a4c-49cb-b144-b761ed82923d
|
|
CVE-2022-4451 - https://wpscan.com/vulnerability/a28f52a4-fd57-4f46-8983-f34c71ec88d5
|
|
CVE-2022-4453 - https://wpscan.com/vulnerability/120bdcb3-4288-4101-b738-cc84d02da171
|
|
CVE-2022-4458 - https://wpscan.com/vulnerability/c85ceab3-7e79-402d-ad48-a028f1ee070c
|
|
CVE-2022-4459 - https://wpscan.com/vulnerability/3ef4783b-4e4a-4691-b858-a7fa8dada4ec
|
|
CVE-2022-4460 - https://wpscan.com/vulnerability/034c4c75-42a4-4884-b63f-f9d4d2d6aebc
|
|
CVE-2022-44638 - http://packetstormsecurity.com/files/170121/pixman-pixman_sample_floor_y-Integer-Overflow.html
|
|
CVE-2022-44638 - https://gitlab.freedesktop.org/pixman/pixman/-/issues/63
|
|
CVE-2022-4464 - https://wpscan.com/vulnerability/1d3636c1-976f-4c84-8cca-413e38170d0c
|
|
CVE-2022-4465 - https://wpscan.com/vulnerability/28abe589-1371-4ed2-90b6-2bb96c93832c
|
|
CVE-2022-4466 - https://wpscan.com/vulnerability/497d0bf9-b750-4293-9662-1722a74442e2
|
|
CVE-2022-44666 - http://packetstormsecurity.com/files/171047/Microsoft-Windows-Contact-File-Remote-Code-Execution.html
|
|
CVE-2022-44666 - http://seclists.org/fulldisclosure/2023/Feb/14
|
|
CVE-2022-4467 - https://wpscan.com/vulnerability/54168861-c0b8-4de6-a9af-0ad5c20b4a45
|
|
CVE-2022-4468 - https://wpscan.com/vulnerability/a3bf24af-417e-4ca2-886c-bb36bb2d952b
|
|
CVE-2022-44683 - http://packetstormsecurity.com/files/170466/Windows-Kernel-NtNotifyChangeMultipleKeys-Use-After-Free.html
|
|
CVE-2022-4469 - https://wpscan.com/vulnerability/b195c373-1db9-4fd7-98d0-0860dacd189e
|
|
CVE-2022-4470 - https://wpscan.com/vulnerability/7c4e51b3-87ef-4afc-ab53-9a9bbdcfc9d7
|
|
CVE-2022-4471 - https://wpscan.com/vulnerability/c6cf792b-054c-4d77-bcae-3b700f42130b
|
|
CVE-2022-4472 - https://wpscan.com/vulnerability/2b685a12-2ca3-42dd-84fe-4a463a082c2a
|
|
CVE-2022-44724 - https://stiltsoft.atlassian.net/browse/VD-3
|
|
CVE-2022-44724 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-049.txt
|
|
CVE-2022-44725 - https://opcfoundation.org/developer-tools/samples-and-tools-unified-architecture/local-discovery-server-lds/
|
|
CVE-2022-44726 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-050.txt
|
|
CVE-2022-44727 - https://www.lineagrafica.es/modp/lgcookieslaw/en/readme_en.pdf
|
|
CVE-2022-4473 - https://wpscan.com/vulnerability/5117b2e9-75b5-459a-b22a-b0e1b0744bd3
|
|
CVE-2022-4474 - https://wpscan.com/vulnerability/3acc6940-13ec-40fb-8471-6b2f0445c543
|
|
CVE-2022-4475 - https://wpscan.com/vulnerability/3b5c377c-3148-4373-996c-89851d5e39e5
|
|
CVE-2022-4476 - https://wpscan.com/vulnerability/856cac0f-2526-4978-acad-d6d82a0bec45
|
|
CVE-2022-4477 - https://wpscan.com/vulnerability/c32a4c58-9f2b-4afa-9a21-4b4a5c4c4c41
|
|
CVE-2022-4478 - https://wpscan.com/vulnerability/4de75de5-e557-46df-9675-e3f0220f4003
|
|
CVE-2022-4479 - https://wpscan.com/vulnerability/10f63d30-1b36-459b-80eb-509caaf5d377
|
|
CVE-2022-44792 - https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428
|
|
CVE-2022-44792 - https://github.com/net-snmp/net-snmp/issues/474
|
|
CVE-2022-44793 - https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f
|
|
CVE-2022-44793 - https://github.com/net-snmp/net-snmp/issues/475
|
|
CVE-2022-4480 - https://wpscan.com/vulnerability/1666f91d-3aa2-487d-a31b-44d051ab0124
|
|
CVE-2022-44801 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-44804 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-44806 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-44807 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-44808 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1
|
|
CVE-2022-44808 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-4481 - https://wpscan.com/vulnerability/9dc9d377-635d-4d4f-9916-33bcedbba6f0
|
|
CVE-2022-4482 - https://wpscan.com/vulnerability/389b71d6-b0e6-4e36-b9ca-9d8dab75bb0a
|
|
CVE-2022-4483 - https://wpscan.com/vulnerability/a1786400-dc62-489c-b986-ba17c9833179
|
|
CVE-2022-44830 - https://github.com/RashidKhanPathan/CVE-2022-44830
|
|
CVE-2022-44832 - https://github.com/flamingo1616/iot_vuln/blob/main/D-Link/DIR-3040/6.md
|
|
CVE-2022-44832 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-4484 - https://wpscan.com/vulnerability/91252899-029d-49be-859e-7d2c4a70efea
|
|
CVE-2022-44843 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/1
|
|
CVE-2022-44844 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/2
|
|
CVE-2022-4485 - https://wpscan.com/vulnerability/685b068e-0727-45fb-bd8c-66bb1dc3a8e7
|
|
CVE-2022-4486 - https://wpscan.com/vulnerability/d0afd17c-09cd-4ab5-95a5-6ac8c3c0a50b
|
|
CVE-2022-4487 - https://wpscan.com/vulnerability/6130958f-f549-4885-adb1-093aa025920e
|
|
CVE-2022-44870 - https://github.com/Cedric1314/CVE-2022-44870/blob/main/README.md
|
|
CVE-2022-44877 - http://packetstormsecurity.com/files/170388/Control-Web-Panel-7-Remote-Code-Execution.html
|
|
CVE-2022-44877 - http://packetstormsecurity.com/files/170820/Control-Web-Panel-Unauthenticated-Remote-Command-Execution.html
|
|
CVE-2022-44877 - http://packetstormsecurity.com/files/171725/Control-Web-Panel-7-CWP7-0.9.8.1147-Remote-Code-Execution.html
|
|
CVE-2022-44877 - http://seclists.org/fulldisclosure/2023/Jan/1
|
|
CVE-2022-44877 - https://gist.github.com/numanturle/c1e82c47f4cba24cff214e904c227386
|
|
CVE-2022-44877 - https://www.youtube.com/watch?v=kiLfSvc1SYY
|
|
CVE-2022-4488 - https://wpscan.com/vulnerability/e52c18a9-550a-40b1-a413-0e06e5b4aabc
|
|
CVE-2022-4489 - https://wpscan.com/vulnerability/067573f2-b1e6-49a9-8c5b-f91e3b9d722f
|
|
CVE-2022-44897 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-44897/poc.txt
|
|
CVE-2022-44898 - http://packetstormsecurity.com/files/174447/MsIo64-LOLDriver-Memory-Corruption.html
|
|
CVE-2022-44898 - https://heegong.github.io/posts/ASUS-AuraSync-Kernel-Stack-Based-Buffer-Overflow-Local-Privilege-Escalation/
|
|
CVE-2022-44900 - http://packetstormsecurity.com/files/170127/py7zr-0.20.0-Directory-Traversal.html
|
|
CVE-2022-4491 - https://wpscan.com/vulnerability/b62d8fa6-d546-4794-8f7a-c5e4a7f607dc
|
|
CVE-2022-44910 - https://github.com/yangfar/CVE/blob/main/Reference%20of%20Binbloom.md
|
|
CVE-2022-44928 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44928
|
|
CVE-2022-44929 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44929
|
|
CVE-2022-44930 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44930
|
|
CVE-2022-44931 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/formWifiBasicSet/readme.md
|
|
CVE-2022-44932 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/TendaTelnet/readme.md
|
|
CVE-2022-44937 - https://github.com/5497lvren/Zhenhao/issues/1
|
|
CVE-2022-44938 - https://pwnit.io/2022/11/23/weak-password-reset-token-leads-to-account-takeover-in-seeddms/
|
|
CVE-2022-44939 - https://github.com/RashidKhanPathan/WindowsPrivilegeEscalation/blob/main/DLL%20Hijacking/CVE-2022-44939/Research.txt
|
|
CVE-2022-44942 - https://github.com/casdoor/casdoor/issues/1171
|
|
CVE-2022-44944 - https://github.com/anhdq201/rukovoditel/issues/14
|
|
CVE-2022-44945 - https://github.com/anhdq201/rukovoditel/issues/16
|
|
CVE-2022-44946 - https://github.com/anhdq201/rukovoditel/issues/15
|
|
CVE-2022-44947 - https://github.com/anhdq201/rukovoditel/issues/13
|
|
CVE-2022-44948 - https://github.com/anhdq201/rukovoditel/issues/8
|
|
CVE-2022-44949 - https://github.com/anhdq201/rukovoditel/issues/12
|
|
CVE-2022-44950 - https://github.com/anhdq201/rukovoditel/issues/10
|
|
CVE-2022-44951 - https://github.com/anhdq201/rukovoditel/issues/11
|
|
CVE-2022-44952 - https://github.com/anhdq201/rukovoditel/issues/9
|
|
CVE-2022-44953 - https://github.com/anhdq201/webtareas/issues/8
|
|
CVE-2022-44954 - https://github.com/anhdq201/webtareas/issues/10
|
|
CVE-2022-44955 - https://github.com/anhdq201/webtareas/issues/5
|
|
CVE-2022-44956 - https://github.com/anhdq201/webtareas/issues/3
|
|
CVE-2022-44957 - https://github.com/anhdq201/webtareas/issues/11
|
|
CVE-2022-44959 - https://github.com/anhdq201/webtareas/issues/6
|
|
CVE-2022-44960 - https://github.com/anhdq201/webtareas/issues/4
|
|
CVE-2022-44961 - https://github.com/anhdq201/webtareas/issues/7
|
|
CVE-2022-44962 - https://github.com/anhdq201/webtareas/issues/12
|
|
CVE-2022-4497 - https://wpscan.com/vulnerability/3fa6c8b3-6b81-4fe3-b997-25c9e5fdec86
|
|
CVE-2022-4502 - https://huntr.dev/bounties/5bdef791-6886-4008-b9ba-045cb4524114
|
|
CVE-2022-45025 - https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/639
|
|
CVE-2022-45026 - https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/640
|
|
CVE-2022-45027 - https://zxsecurity.co.nz/research/advisories/perfsonar-multiple/
|
|
CVE-2022-45028 - https://seanpesce.blogspot.com/2022/11/unauthenticated-stored-xss-in-arris.html
|
|
CVE-2022-4503 - https://huntr.dev/bounties/4cba644c-a2f5-4ed7-af5d-f2cab1895e13
|
|
CVE-2022-45030 - http://packetstormsecurity.com/files/171613/rconfig-3.9.7-SQL-Injection.html
|
|
CVE-2022-45030 - https://www.rconfig.com/downloads/rconfig-3.9.7.zip
|
|
CVE-2022-45033 - https://github.com/cyb3r-n3rd/cve-request/blob/main/cve-poc-payload
|
|
CVE-2022-4504 - https://huntr.dev/bounties/f50538cb-99d3-411d-bd1a-5f36d1fa9f5d
|
|
CVE-2022-45043 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/2
|
|
CVE-2022-45045 - https://vulncheck.com/blog/xiongmai-iot-exploitation
|
|
CVE-2022-4505 - https://huntr.dev/bounties/e36ca754-bb9f-4686-ad72-7fb849e97d92
|
|
CVE-2022-4506 - https://huntr.dev/bounties/f423d193-4ab0-4f03-ad90-25e4f02e7942
|
|
CVE-2022-45062 - https://gitlab.xfce.org/xfce/xfce4-settings/-/issues/390
|
|
CVE-2022-4507 - https://wpscan.com/vulnerability/93c61a70-5624-4c4d-ac3a-c598aec4f8b6
|
|
CVE-2022-4508 - https://wpscan.com/vulnerability/5101a979-7a53-40bf-8988-6347ef851eab
|
|
CVE-2022-4509 - https://wpscan.com/vulnerability/90baba2e-a64f-4725-b76c-3aed94b18910
|
|
CVE-2022-4510 - https://github.com/ReFirmLabs/binwalk/pull/617
|
|
CVE-2022-45115 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1684
|
|
CVE-2022-4512 - https://wpscan.com/vulnerability/7957f355-c767-4f59-bb28-0302d33386a6
|
|
CVE-2022-45124 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1683
|
|
CVE-2022-45129 - http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html
|
|
CVE-2022-45129 - http://seclists.org/fulldisclosure/2022/Nov/11
|
|
CVE-2022-45130 - https://fortbridge.co.uk/research/compromising-plesk-via-its-rest-api/
|
|
CVE-2022-45132 - https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/
|
|
CVE-2022-45144 - https://herolab.usd.de/security-advisories/usd-2022-0048/
|
|
CVE-2022-45163 - https://research.nccgroup.com/2022/11/17/cve-2022-45163/
|
|
CVE-2022-45163 - https://research.nccgroup.com/category/technical-advisory/
|
|
CVE-2022-45169 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-45170 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-45172 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-45173 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-45174 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-45175 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-45177 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-45178 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-45179 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-45180 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-45202 - https://github.com/gpac/gpac/issues/2296
|
|
CVE-2022-45204 - https://github.com/gpac/gpac/issues/2307
|
|
CVE-2022-45205 - https://github.com/jeecgboot/jeecg-boot/issues/4128
|
|
CVE-2022-45207 - https://github.com/jeecgboot/jeecg-boot/issues/4127
|
|
CVE-2022-45208 - https://github.com/jeecgboot/jeecg-boot/issues/4126
|
|
CVE-2022-45210 - https://github.com/jeecgboot/jeecg-boot/issues/4125
|
|
CVE-2022-45213 - https://zxsecurity.co.nz/research/advisories/perfsonar-multiple/
|
|
CVE-2022-45218 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/hrm.zip
|
|
CVE-2022-45221 - https://medium.com/@just0rg/web-based-student-clearance-system-in-php-free-source-code-v1-0-unrestricted-input-leads-to-xss-5802ead12124
|
|
CVE-2022-45223 - https://medium.com/@just0rg/web-based-student-clearance-system-in-php-free-source-code-v1-0-unrestricted-input-leads-to-xss-5802ead12124
|
|
CVE-2022-45224 - https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e
|
|
CVE-2022-45225 - https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e
|
|
CVE-2022-45283 - https://github.com/gpac/gpac/issues/2295
|
|
CVE-2022-45290 - https://github.com/HH1F/KbaseDoc-v1.0-Arbitrary-file-deletion-vulnerability/blob/main/README.md
|
|
CVE-2022-45297 - http://packetstormsecurity.com/files/171615/EQ-Enterprise-Management-System-2.2.0-SQL-Injection.html
|
|
CVE-2022-45297 - https://github.com/tlfyyds/EQ
|
|
CVE-2022-45299 - https://github.com/offalltn/CVE-2022-45299
|
|
CVE-2022-45313 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45313/README.md
|
|
CVE-2022-45315 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45315/README.md
|
|
CVE-2022-45326 - https://www.navsec.net/2022/11/12/kwoksys-xxe.html
|
|
CVE-2022-45329 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/search_sql_injection/search_sql_injection.md
|
|
CVE-2022-45330 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/category_sql_injection/category_sql_injection.md
|
|
CVE-2022-45331 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/post_sql_injection/post_sql_injection.md
|
|
CVE-2022-45332 - https://github.com/LibreDWG/libredwg/issues/524
|
|
CVE-2022-45337 - https://github.com/no1rr/Vulnerability/tree/master/Tenda/TX9Pro/1
|
|
CVE-2022-45343 - https://github.com/gpac/gpac/issues/2315
|
|
CVE-2022-45411 - https://bugzilla.mozilla.org/show_bug.cgi?id=1790311
|
|
CVE-2022-45413 - https://bugzilla.mozilla.org/show_bug.cgi?id=1791201
|
|
CVE-2022-45415 - https://bugzilla.mozilla.org/show_bug.cgi?id=1793551
|
|
CVE-2022-45418 - https://bugzilla.mozilla.org/show_bug.cgi?id=1795815
|
|
CVE-2022-4542 - https://wpscan.com/vulnerability/f0bef96f-dfe2-4988-adf8-e1bd493c5242
|
|
CVE-2022-4543 - https://www.willsroot.io/2022/12/entrybleed.html
|
|
CVE-2022-4544 - https://wpscan.com/vulnerability/96e34d3d-627f-42f2-bfdb-c9d47dbf396c
|
|
CVE-2022-4545 - https://wpscan.com/vulnerability/19f482cb-fcfd-43e6-9a04-143e06351a70
|
|
CVE-2022-4546 - https://wpscan.com/vulnerability/009578b9-016d-49c2-9577-49756c35e1e8
|
|
CVE-2022-45460 - https://github.com/tothi/pwn-hisilicon-dvr/blob/master/pwn_hisilicon_dvr.py
|
|
CVE-2022-4547 - https://wpscan.com/vulnerability/fe1514b4-74e1-4c19-8741-c0d4db9bab99
|
|
CVE-2022-45477 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
|
|
CVE-2022-45478 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
|
|
CVE-2022-45479 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
|
|
CVE-2022-4548 - https://wpscan.com/vulnerability/0ff435bc-ea20-4993-98ae-1f61b1732b59
|
|
CVE-2022-45480 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
|
|
CVE-2022-45481 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
|
|
CVE-2022-45482 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
|
|
CVE-2022-45483 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
|
|
CVE-2022-4549 - https://wpscan.com/vulnerability/06e1be38-fc1a-4799-a006-556b678ae701
|
|
CVE-2022-45497 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/exeCommand/readme.md
|
|
CVE-2022-45498 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/SysToolReboot/readme.md
|
|
CVE-2022-45499 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/WifiMacFilterGet/readme.md
|
|
CVE-2022-4550 - https://wpscan.com/vulnerability/a1179959-2044-479f-a5ca-3c9ffc46d00e
|
|
CVE-2022-45501 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/wifiSSIDset/readme.md
|
|
CVE-2022-45503 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/setAutoPing/readme.md
|
|
CVE-2022-45504 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/SysToolRestoreSet/readme.md
|
|
CVE-2022-45505 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/exeCommand/readme.md
|
|
CVE-2022-45506 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/delFileName/readme.md
|
|
CVE-2022-45507 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/editFileName/readme.md
|
|
CVE-2022-45508 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/editUserName/readme.md
|
|
CVE-2022-45509 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/addUserName/readme.md
|
|
CVE-2022-4551 - https://wpscan.com/vulnerability/91c00b17-00ba-4c3f-8587-d54449a02659
|
|
CVE-2022-45510 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/AdvSetWrlsafeset/readme.md
|
|
CVE-2022-45511 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/QuickIndex/readme.md
|
|
CVE-2022-45512 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeEmailFilter/readme.md
|
|
CVE-2022-45513 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/P2pListFilter/readme.md
|
|
CVE-2022-45514 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/webExcptypemanFilter/readme.md
|
|
CVE-2022-45515 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/addressNat/readme.md
|
|
CVE-2022-45516 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/NatStaticSetting/readme.md
|
|
CVE-2022-45517 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/VirtualSer/readme.md
|
|
CVE-2022-45518 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SetIpBind/readme.md
|
|
CVE-2022-45519 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeMacFilter/readme.md
|
|
CVE-2022-4552 - https://wpscan.com/vulnerability/307b0fe4-39de-4fbb-8bb0-f7f15ec6ef52
|
|
CVE-2022-45520 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/qossetting/readme.md
|
|
CVE-2022-45521 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeUrlFilter/readme.md
|
|
CVE-2022-45522 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeClientFilter/readme.md
|
|
CVE-2022-45523 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/L7Im/readme.md
|
|
CVE-2022-45524 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/IPSECsave/readme.md
|
|
CVE-2022-45525 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/CertListInfo/readme.md
|
|
CVE-2022-45526 - https://github.com/Future-Depth/IMS/issues/1
|
|
CVE-2022-45527 - https://github.com/Future-Depth/IMS/issues/2
|
|
CVE-2022-45529 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/edit_post_post_category_id_sql_injection/edit_post_post_category_id_sql_injection.md
|
|
CVE-2022-4553 - https://wpscan.com/vulnerability/483ed482-a1d1-44f6-8b99-56e653d3e45f
|
|
CVE-2022-45535 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/update_categories_sql_injection/update_categories_sql_injection.md
|
|
CVE-2022-45535 - https://rdyx0.github.io/2018/09/06/AeroCMS-v0.0.1-SQLi%20update_categories_sql_injection/
|
|
CVE-2022-45536 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/post_comments_sql_injection/post_comments_sql_injection.md
|
|
CVE-2022-45536 - https://rdyx0.github.io/2018/09/07/AeroCMS-v0.0.1-SQLi%20post_comments_sql_injection/
|
|
CVE-2022-45537 - https://github.com/weng-xianhu/eyoucms/issues/34
|
|
CVE-2022-45538 - https://github.com/weng-xianhu/eyoucms/issues/35
|
|
CVE-2022-45539 - https://github.com/weng-xianhu/eyoucms/issues/38
|
|
CVE-2022-45540 - https://github.com/weng-xianhu/eyoucms/issues/37
|
|
CVE-2022-45541 - https://github.com/weng-xianhu/eyoucms/issues/36
|
|
CVE-2022-45542 - https://github.com/weng-xianhu/eyoucms/issues/33
|
|
CVE-2022-45543 - https://srpopty.github.io/2023/02/15/Vulnerability-Discuz-X3.4-Reflected-XSS-(CVE-2022-45543)/
|
|
CVE-2022-45544 - https://blog.tristaomarinho.com/schlix-cms-2-2-7-2-arbitrary-file-upload/
|
|
CVE-2022-45544 - https://github.com/tristao-marinho/CVE-2022-45544/blob/main/README.md
|
|
CVE-2022-45546 - https://lgnas.gitbook.io/cve-2022-45546/
|
|
CVE-2022-45557 - https://github.com/hundredrabbits/Left/issues/167
|
|
CVE-2022-45558 - https://github.com/hundredrabbits/Left/issues/168
|
|
CVE-2022-45562 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-45562
|
|
CVE-2022-45586 - https://forum.xpdfreader.com/viewtopic.php?t=42361
|
|
CVE-2022-45587 - https://forum.xpdfreader.com/viewtopic.php?t=42361
|
|
CVE-2022-45598 - https://github.com/laurent22/joplin/commit/a2de167b95debad83a0f0c7925a88c0198db812e
|
|
CVE-2022-45598 - https://github.com/laurent22/joplin/releases/tag/v2.9.17
|
|
CVE-2022-45599 - https://github.com/ethancunt/CVE-2022-45599
|
|
CVE-2022-45600 - https://github.com/ethancunt/CVE-2022-45600
|
|
CVE-2022-45613 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/stored-xss
|
|
CVE-2022-45613 - https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e
|
|
CVE-2022-45614 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/passwd-hash
|
|
CVE-2022-4562 - https://wpscan.com/vulnerability/2013d79b-e9f6-4a5a-b421-e840a3bae063
|
|
CVE-2022-45634 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45634
|
|
CVE-2022-45635 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45635
|
|
CVE-2022-45636 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45636
|
|
CVE-2022-45636 - https://labs.withsecure.com/advisories/insecure-authorization-scheme-for-api-requests-in-dbd--mobile-co
|
|
CVE-2022-45637 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45637
|
|
CVE-2022-45639 - http://packetstormsecurity.com/files/171649/Sleuthkit-4.11.1-Command-Injection.html
|
|
CVE-2022-45639 - http://www.binaryworld.it/
|
|
CVE-2022-45639 - https://www.binaryworld.it/guidepoc.asp#CVE-2022-45639
|
|
CVE-2022-45640 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6v1.0_vuln/Tenda%20AC6V1.0%20V15.03.05.19%20Stack%20overflow%20vulnerability.md
|
|
CVE-2022-45640 - https://vulncheck.com/blog/xiongmai-iot-exploitation
|
|
CVE-2022-45641 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetMacFilterCfg/formSetMacFilterCfg.md
|
|
CVE-2022-45643 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/addWifiMacFilter_deviceId/addWifiMacFilter_deviceId.md
|
|
CVE-2022-45644 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_deviceId/formSetClientState_deviceId.md
|
|
CVE-2022-45645 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/addWifiMacFilter_deviceMac/addWifiMacFilter_derviceMac.md
|
|
CVE-2022-45646 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_limitSpeedUp/formSetClientState_limitSpeed.md
|
|
CVE-2022-45647 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_limitSpeed/formSetClientState_limitSpeed.md
|
|
CVE-2022-45648 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetDeviceName/formSetDeviceName.md
|
|
CVE-2022-45649 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetPPTPServer_endIp/formSetPPTPServer_endIp.md
|
|
CVE-2022-45650 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetFirewallCfg/formSetFirewallCfg.md
|
|
CVE-2022-45651 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetVirtualSer/formSetVirtualSer.md
|
|
CVE-2022-45652 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetPPTPServer_startIp/formSetPPTPServer_startIp.md
|
|
CVE-2022-45653 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromNatStaticSetting/fromNatStaticSetting_page.md
|
|
CVE-2022-45654 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/form_fast_setting_wifi_set_ssid/form_fast_setting_wifi_set_ssid.md
|
|
CVE-2022-45655 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/form_fast_setting_wifi_set_timeZone/form_fast_setting_wifi_set_timeZone.md
|
|
CVE-2022-45656 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetSysTime/fromSetSysTime.md
|
|
CVE-2022-45657 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetIpMacBind/fromSetIpMacBind.md
|
|
CVE-2022-45658 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSchedWifi_schedEndTime/setSchedWifi_schedEndTime.md
|
|
CVE-2022-45659 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetWirelessRepeat/fromSetWirelessRepeat.md
|
|
CVE-2022-4566 - https://gitee.com/y_project/RuoYi/issues/I65V2B
|
|
CVE-2022-4566 - https://github.com/luelueking/ruoyi-4.7.5-vuln-poc
|
|
CVE-2022-45660 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSchedWifi_schedStartTime/setSchedWifi_schedStartTime.md
|
|
CVE-2022-45661 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSmartPowerManagement/setSmartPowerManagement.md
|
|
CVE-2022-45663 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formWifiMacFilterSet/formWifiMacFilterSet.md
|
|
CVE-2022-45664 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formwrlSSIDget/formWifiMacFilterGet.md
|
|
CVE-2022-45665 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formSetCfm/formWifiMacFilterSet.md
|
|
CVE-2022-45666 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formwrlSSIDset/formwrlSSIDset.md
|
|
CVE-2022-45667 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/fromSysToolRestoreSet/fromSysToolRestoreSet.md
|
|
CVE-2022-45668 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/fromSysToolReboot/fromSysToolReboot.md
|
|
CVE-2022-45669 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/formWifiMacFilterGet/formWifiMacFilterGet.md
|
|
CVE-2022-4567 - https://huntr.dev/bounties/1ac677c4-ec0a-4788-9465-51d9b6bd8fd2
|
|
CVE-2022-45670 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/formSetAutoPing_ping1/formSetAutoPing_ping1.md
|
|
CVE-2022-45671 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formSetAppFilterRule/formSetAppFilterRule.md
|
|
CVE-2022-45672 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formWx3AuthorizeSet/formWx3AuthorizeSet.md
|
|
CVE-2022-45673 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/fromSysToolRestoreSet/fromSysToolRestoreSet.md
|
|
CVE-2022-45674 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/fromSysToolReboot/fromSysToolReboot.md
|
|
CVE-2022-45677 - https://github.com/yukar1z0e/temp/blob/main/README.md
|
|
CVE-2022-45685 - https://github.com/jettison-json/jettison/issues/54
|
|
CVE-2022-45688 - https://github.com/stleary/JSON-java/issues/708
|
|
CVE-2022-45690 - https://github.com/stleary/JSON-java/issues/654
|
|
CVE-2022-45693 - https://github.com/jettison-json/jettison/issues/52
|
|
CVE-2022-45697 - https://github.com/Wh04m1001/CVE
|
|
CVE-2022-45699 - https://www.youtube.com/watch?v=YNeeaDPJOBY
|
|
CVE-2022-4570 - https://wpscan.com/vulnerability/a2483ecf-42a6-470a-b965-4e05069d1cef
|
|
CVE-2022-45701 - https://packetstormsecurity.com/files/171001/Arris-Router-Firmware-9.1.103-Remote-Code-Execution.htmlhttps://github.com/yerodin/CVE-2022-45701
|
|
CVE-2022-45703 - https://sourceware.org/bugzilla/show_bug.cgi?id=29799
|
|
CVE-2022-45706 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/SJZx0L0Sj
|
|
CVE-2022-45707 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/HyEfIEpBj
|
|
CVE-2022-45708 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/B1rR3UArj
|
|
CVE-2022-45709 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BkFpXcsSs
|
|
CVE-2022-4571 - https://wpscan.com/vulnerability/128b150b-3950-4cc5-b46a-5707f7a0df00
|
|
CVE-2022-45710 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/B1XG-5iSo
|
|
CVE-2022-45711 - https://hackmd.io/dLM8vDnwQOup8mmDbHJRHQ?both
|
|
CVE-2022-45712 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/r1pG4cori
|
|
CVE-2022-45714 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/S1QhLw0Ss
|
|
CVE-2022-45715 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/HkJ_o8Arj
|
|
CVE-2022-45716 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/rywHivCBo
|
|
CVE-2022-45717 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/By3Y6DRrj
|
|
CVE-2022-45718 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/Hkb38vELj
|
|
CVE-2022-45719 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BJ8I_DCBi
|
|
CVE-2022-45720 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/SkCD5PEUo
|
|
CVE-2022-45721 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BJUfyuABo
|
|
CVE-2022-45748 - https://github.com/assimp/assimp/issues/4286
|
|
CVE-2022-4576 - https://wpscan.com/vulnerability/0d679e0e-891b-44f1-ac7f-a766e12956e0
|
|
CVE-2022-45768 - https://github.com/Erebua/CVE/blob/main/Edimax.md
|
|
CVE-2022-45768 - https://www.lovesandy.cc/2022/11/20/EDIMAX%E6%BC%8F%E6%B4%9E/
|
|
CVE-2022-4577 - https://wpscan.com/vulnerability/85d9fad7-ba3d-4140-ae05-46262d2643e6
|
|
CVE-2022-45770 - https://hackmag.com/security/aguard-cve/
|
|
CVE-2022-45770 - https://xakep.ru/2023/01/27/aguard-cve/
|
|
CVE-2022-45771 - https://github.com/pwndoc/pwndoc/issues/401
|
|
CVE-2022-4578 - https://wpscan.com/vulnerability/fad16c68-9f14-4866-b241-40468fb71494
|
|
CVE-2022-45781 - https://www.cnblogs.com/FALL3N/p/16813932.html
|
|
CVE-2022-4580 - https://wpscan.com/vulnerability/e54804c7-68a9-4c4c-94f9-1c3c9b97e8ca
|
|
CVE-2022-4584 - https://vuldb.com/?id.216170
|
|
CVE-2022-45868 - https://sites.google.com/sonatype.com/vulnerabilities/sonatype-2022-6243
|
|
CVE-2022-45869 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15
|
|
CVE-2022-45889 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/
|
|
CVE-2022-45890 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/
|
|
CVE-2022-45891 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/
|
|
CVE-2022-45892 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/
|
|
CVE-2022-45893 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/
|
|
CVE-2022-45894 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/
|
|
CVE-2022-45895 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/
|
|
CVE-2022-45896 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/-
|
|
CVE-2022-45914 - http://packetstormsecurity.com/files/170177/Zhuhai-Suny-Technology-ESL-Tag-Forgery-Replay-Attacks.html
|
|
CVE-2022-45914 - http://seclists.org/fulldisclosure/2022/Dec/6
|
|
CVE-2022-45915 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html
|
|
CVE-2022-45915 - http://seclists.org/fulldisclosure/2022/Dec/7
|
|
CVE-2022-45915 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/
|
|
CVE-2022-45916 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html
|
|
CVE-2022-45916 - http://seclists.org/fulldisclosure/2022/Dec/7
|
|
CVE-2022-45916 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/
|
|
CVE-2022-45917 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html
|
|
CVE-2022-45917 - http://seclists.org/fulldisclosure/2022/Dec/7
|
|
CVE-2022-45917 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/
|
|
CVE-2022-45918 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html
|
|
CVE-2022-45918 - http://seclists.org/fulldisclosure/2022/Dec/7
|
|
CVE-2022-45918 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/
|
|
CVE-2022-45922 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html
|
|
CVE-2022-45922 - http://seclists.org/fulldisclosure/2023/Jan/14
|
|
CVE-2022-45922 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/
|
|
CVE-2022-45923 - http://packetstormsecurity.com/files/170613/OpenText-Extended-ECM-22.3-cs.exe-Remote-Code-Execution.html
|
|
CVE-2022-45923 - http://seclists.org/fulldisclosure/2023/Jan/10
|
|
CVE-2022-45923 - https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-in-csexe-opentext-server-component/
|
|
CVE-2022-45924 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html
|
|
CVE-2022-45924 - http://seclists.org/fulldisclosure/2023/Jan/14
|
|
CVE-2022-45924 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/
|
|
CVE-2022-45925 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html
|
|
CVE-2022-45925 - http://seclists.org/fulldisclosure/2023/Jan/14
|
|
CVE-2022-45925 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/
|
|
CVE-2022-45926 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html
|
|
CVE-2022-45926 - http://seclists.org/fulldisclosure/2023/Jan/14
|
|
CVE-2022-45926 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/
|
|
CVE-2022-45927 - http://packetstormsecurity.com/files/170614/OpenText-Extended-ECM-22.3-Java-Frontend-Remote-Code-Execution.html
|
|
CVE-2022-45927 - http://seclists.org/fulldisclosure/2023/Jan/13
|
|
CVE-2022-45927 - https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-via-java-frontend-qds-endpoint-opentext-extended-ecm/
|
|
CVE-2022-45928 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html
|
|
CVE-2022-45928 - http://seclists.org/fulldisclosure/2023/Jan/14
|
|
CVE-2022-45928 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/
|
|
CVE-2022-45942 - https://github.com/This-is-Y/baijiacms-RCE
|
|
CVE-2022-45942 - https://this-is-y.xyz/2022/11/20/baijiacmsV4-RCE/
|
|
CVE-2022-45956 - https://packetstormsecurity.com/files/169962/Boa-Web-Server-0.94.13-0.94.14-Authentication-Bypass.html
|
|
CVE-2022-45957 - https://packetstormsecurity.com/files/169949/ZTE-ZXHN-H108NS-Stack-Buffer-Overflow-Denial-Of-Service.html
|
|
CVE-2022-45957 - https://packetstormsecurity.com/files/169958/ZTE-ZXHN-H108NS-Authentication-Bypass.html
|
|
CVE-2022-4596 - https://seclists.org/fulldisclosure/2022/Dec/11
|
|
CVE-2022-45962 - https://ccat.gitbook.io/cyber-sec/cve/cve-2022-45962-postauth-sqli
|
|
CVE-2022-4597 - https://seclists.org/fulldisclosure/2022/Dec/11
|
|
CVE-2022-45977 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/3
|
|
CVE-2022-45979 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/4
|
|
CVE-2022-4598 - https://seclists.org/fulldisclosure/2022/Dec/11
|
|
CVE-2022-45980 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/6
|
|
CVE-2022-4599 - https://seclists.org/fulldisclosure/2022/Dec/11
|
|
CVE-2022-45995 - https://github.com/bugfinder0/public_bug/tree/main/tenda/ax12/1
|
|
CVE-2022-45996 - https://github.com/bugfinder0/public_bug/tree/main/tenda/w20e/2
|
|
CVE-2022-45997 - https://github.com/bugfinder0/public_bug/tree/main/tenda/w20e/1
|
|
CVE-2022-4600 - https://seclists.org/fulldisclosure/2022/Dec/11
|
|
CVE-2022-4601 - https://seclists.org/fulldisclosure/2022/Dec/11
|
|
CVE-2022-4602 - https://seclists.org/fulldisclosure/2022/Dec/11
|
|
CVE-2022-46047 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/categories_delete_sql_injection/categories_delete_sql_injection.md
|
|
CVE-2022-4605 - https://huntr.dev/bounties/df455d44-0dec-470c-b576-8ea86ec5a367
|
|
CVE-2022-46051 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/view_all_comments_update/view_all_comments_update.MD
|
|
CVE-2022-46059 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-CSRF/add_user_csrf/add_user_csrf.md
|
|
CVE-2022-4606 - https://huntr.dev/bounties/3dab0466-c35d-4163-b3c7-a8666e2f7d95
|
|
CVE-2022-46062 - https://github.com/rdyx0/CVE/blob/master/Gym%20Management%20System/CSRF/delete_user/delete_user.md
|
|
CVE-2022-46071 - https://yuyudhn.github.io/CVE-2022-46071/
|
|
CVE-2022-46072 - https://yuyudhn.github.io/CVE-2022-46072/
|
|
CVE-2022-46073 - https://yuyudhn.github.io/CVE-2022-46073/
|
|
CVE-2022-46074 - https://www.youtube.com/watch?v=5Q3vyTo02bc&ab_channel=IkariShinji
|
|
CVE-2022-46074 - https://yuyudhn.github.io/CVE-2022-46074/
|
|
CVE-2022-46076 - https://github.com/Zarathustra-L/IoT_Vul/tree/main/D-Link/DIR-869
|
|
CVE-2022-46076 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-46087 - https://github.com/G37SYS73M/Advisory_G37SYS73M/blob/main/CVE-2022-46087/poc.md
|
|
CVE-2022-46088 - https://packetstormsecurity.com
|
|
CVE-2022-4609 - https://huntr.dev/bounties/5b3115c5-776c-43d3-a7be-c8dc13ab81ce
|
|
CVE-2022-46093 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/Hospital-Management-System/Hospital-Management-System.md
|
|
CVE-2022-46095 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/covid-19-vaccination-poc/covid-19-vaccination.md
|
|
CVE-2022-46096 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/covid-19-vaccination-poc2/covid-19-vaccination2.md
|
|
CVE-2022-4610 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html
|
|
CVE-2022-46109 - https://github.com/z1r00/IOT_Vul/tree/main/Tenda/AC10/formSetClientState
|
|
CVE-2022-4611 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html
|
|
CVE-2022-4612 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html
|
|
CVE-2022-4613 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html
|
|
CVE-2022-4613 - https://vuldb.com/?id.216275
|
|
CVE-2022-46135 - https://github.com/MegaTKC/AeroCMS/issues/5
|
|
CVE-2022-4614 - https://huntr.dev/bounties/8b429330-3096-4fe4-85e0-1a9143e4dca5
|
|
CVE-2022-4615 - https://huntr.dev/bounties/9c66ece4-bcaa-417d-8b98-e8daff8a728b
|
|
CVE-2022-46152 - https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:X/RC:X/CR:M/IR:M/AR:M/MAV:L/MAC:L/MPR:H/MUI:N/MS:C/MC:H/MI:H/MA:H&version=3.1
|
|
CVE-2022-46161 - https://securitylab.github.com/advisories/GHSL-2022-068_pdfmake/
|
|
CVE-2022-4617 - https://huntr.dev/bounties/1fb2ce08-7016-45fa-b402-ec08d700e4df
|
|
CVE-2022-46172 - https://github.com/goauthentik/authentik/security/advisories/GHSA-hv8r-6w7p-mpc5
|
|
CVE-2022-46179 - https://github.com/LiuWoodsCode/LiuOS/security/advisories/GHSA-f9x3-mj2r-cqmf
|
|
CVE-2022-4621 - https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-04
|
|
CVE-2022-4622 - https://wpscan.com/vulnerability/ea055ed4-324d-4d77-826a-b6f814413eb2
|
|
CVE-2022-4623 - https://wpscan.com/vulnerability/1b3201da-f254-406f-9b4a-cd5025b6b03d
|
|
CVE-2022-4624 - https://wpscan.com/vulnerability/e7dc0202-6be4-46fc-a451-fb3a25727b51
|
|
CVE-2022-4625 - https://wpscan.com/vulnerability/cd6657d5-810c-4d0c-8bbf-1f8d4a2d8d15
|
|
CVE-2022-4626 - https://wpscan.com/vulnerability/59c577e9-7d1c-46bc-9218-3e143068738d
|
|
CVE-2022-4627 - https://wpscan.com/vulnerability/be9e8870-0682-441d-8955-d096d1346bd1
|
|
CVE-2022-4628 - https://wpscan.com/vulnerability/6ae719da-c43c-4b3a-bb8a-efa1de20100a
|
|
CVE-2022-46280 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1670
|
|
CVE-2022-46289 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665
|
|
CVE-2022-4629 - https://wpscan.com/vulnerability/cf0a51f9-21d3-4ae8-b7d2-361921038fe8
|
|
CVE-2022-46290 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665
|
|
CVE-2022-46291 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666
|
|
CVE-2022-46292 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666
|
|
CVE-2022-46293 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666
|
|
CVE-2022-46294 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666
|
|
CVE-2022-46295 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666
|
|
CVE-2022-4630 - https://huntr.dev/bounties/401661ee-40e6-4ee3-a925-3716b96ece5c
|
|
CVE-2022-4636 - https://www.cisa.gov/uscert/ics/advisories/icsa-23-010-01
|
|
CVE-2022-46377 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681
|
|
CVE-2022-46378 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681
|
|
CVE-2022-46381 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-46381/CVE-2022-46381.txt
|
|
CVE-2022-46395 - http://packetstormsecurity.com/files/172855/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html
|
|
CVE-2022-4640 - https://gitee.com/mingSoft/MCMS/issues/I65KI5
|
|
CVE-2022-46407 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-46408 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-46428 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/S1hP34Hvj
|
|
CVE-2022-46430 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BJxlw2Pwi
|
|
CVE-2022-46432 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/B1Vgv1uwo
|
|
CVE-2022-46434 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/rJl69Icws
|
|
CVE-2022-46435 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/SyvnlO9Pi
|
|
CVE-2022-4644 - https://huntr.dev/bounties/77e5f425-c764-4cb0-936a-7a76bfcf19b0
|
|
CVE-2022-46440 - https://github.com/keepinggg/poc
|
|
CVE-2022-46440 - https://github.com/matthiaskramm/swftools/issues/194
|
|
CVE-2022-46443 - https://www.youtube.com/watch?v=Dmjk6uOU8vY
|
|
CVE-2022-46443 - https://yuyudhn.github.io/CVE-2022-46443/
|
|
CVE-2022-4645 - https://gitlab.com/libtiff/libtiff/-/issues/277
|
|
CVE-2022-4646 - https://huntr.dev/bounties/17bc1b0f-1f5c-432f-88e4-c9866ccf6e10
|
|
CVE-2022-4647 - https://huntr.dev/bounties/ccdd243d-726c-4199-b742-25c571491242
|
|
CVE-2022-46475 - https://github.com/Insight8991/iot/blob/main/DIR-645%20genacgi%20Stack%20overflow.md
|
|
CVE-2022-46476 - https://github.com/Insight8991/iot/blob/main/dir859%20Command%20Execution%20Vulnerability.md
|
|
CVE-2022-46478 - https://github.com/WeiYe-Jing/datax-web/issues/587
|
|
CVE-2022-4648 - https://wpscan.com/vulnerability/9bbfb664-5b83-452b-82bb-562a1e18eb65
|
|
CVE-2022-46485 - https://github.com/WodenSec/CVE-2022-46485
|
|
CVE-2022-46486 - https://jovanbulck.github.io/files/ccs19-tale.pdf
|
|
CVE-2022-46489 - https://github.com/gpac/gpac/issues/2328
|
|
CVE-2022-4649 - https://wpscan.com/vulnerability/0d9ba176-97be-4b6b-9cf1-6c3047321a1e
|
|
CVE-2022-46490 - https://github.com/gpac/gpac/issues/2327
|
|
CVE-2022-46491 - https://github.com/Fanli2012/nbnbk/issues/2
|
|
CVE-2022-4650 - https://wpscan.com/vulnerability/b430fdaa-191a-429e-b6d2-479b32bb1075
|
|
CVE-2022-4651 - https://wpscan.com/vulnerability/d8182075-7472-48c8-8e9d-94b12ab6fcf6
|
|
CVE-2022-4652 - https://wpscan.com/vulnerability/ebf3df99-6939-4ae9-ad55-004f33c1cfbc
|
|
CVE-2022-4653 - https://wpscan.com/vulnerability/fa44ed44-9dac-4b4f-aaa3-503b76034578
|
|
CVE-2022-46530 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/GetParentControlInfo/GetParentControlInfo.md
|
|
CVE-2022-46531 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/addWifiMacFilter_deviceId/addWifiMacFilter_deviceId.md
|
|
CVE-2022-46532 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/addWifiMacFilter_deviceMac/addWifiMacFilter_deviceMac.md
|
|
CVE-2022-46533 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_limitSpeed/formSetClientState_limitSpeed.md
|
|
CVE-2022-46534 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetSpeedWan/formSetSpeedWan.md
|
|
CVE-2022-46535 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_deviceId/formSetClientState_deviceId.md
|
|
CVE-2022-46536 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_limitSpeedUp/formSetClientState_limitSpeedUp.md
|
|
CVE-2022-46537 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWifiBasicSet_security/formWifiBasicSet_security.md
|
|
CVE-2022-46538 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWriteFacMac/formWriteFacMac.md
|
|
CVE-2022-46539 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWifiBasicSet_security%20_5g/formWifiBasicSet_security_5g.md
|
|
CVE-2022-4654 - https://wpscan.com/vulnerability/a29744cd-b760-4757-8564-883d59fa4881
|
|
CVE-2022-46540 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_entrys/fromAddressNat_entrys.md
|
|
CVE-2022-46541 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/form_fast_setting_wifi_set/form_fast_setting_wifi_set.md
|
|
CVE-2022-46542 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_page/fromAddressNat_page.md
|
|
CVE-2022-46543 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_mitInterface/fromAddressNat_mitInterface.md
|
|
CVE-2022-46544 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formexeCommand/formexeCommand.md
|
|
CVE-2022-46545 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromNatStaticSetting/fromNatStaticSetting.md
|
|
CVE-2022-46546 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromRouteStatic/fromRouteStatic.md
|
|
CVE-2022-46547 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromVirtualSer/fromVirtualSer.md
|
|
CVE-2022-46548 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromDhcpListClient/fromDhcpListClient.md
|
|
CVE-2022-46549 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_deviceId/saveParentControlInfo_deviceId.md
|
|
CVE-2022-4655 - https://wpscan.com/vulnerability/a1c70c80-e952-4cc7-aca0-c2dde3fa08a9
|
|
CVE-2022-46550 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_urls/saveParentControlInfo_urls.md
|
|
CVE-2022-46551 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_time/saveParentControlInfo_time.md
|
|
CVE-2022-46552 - http://packetstormsecurity.com/files/171710/D-Link-DIR-846-Remote-Command-Execution.html
|
|
CVE-2022-46552 - https://francoataffarel.medium.com/cve-2022-46552-d-link-dir-846-wireless-router-in-firmware-fw100a53dbr-retail-has-a-vulnerability-5b4ca1864c6e
|
|
CVE-2022-46552 - https://github.com/c2dc/cve-reported/blob/main/CVE-2022-46552/CVE-2022-46552.md
|
|
CVE-2022-46552 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-4656 - https://wpscan.com/vulnerability/05976ed8-5a26-4eae-adb2-0ea3b2722391
|
|
CVE-2022-46560 - https://hackmd.io/@0dayResearch/SetWan2Settings_l2tp
|
|
CVE-2022-46560 - https://hackmd.io/@0dayResearch/SetWan2Settings_pppoe
|
|
CVE-2022-46560 - https://hackmd.io/@0dayResearch/SetWan2Settings_pptp
|
|
CVE-2022-46560 - https://hackmd.io/@0dayResearch/rkXr4BQPi
|
|
CVE-2022-46560 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-46561 - https://hackmd.io/@0dayResearch/SetWanSettings_L2TP
|
|
CVE-2022-46561 - https://hackmd.io/@0dayResearch/SetWanSettings_PPPoE
|
|
CVE-2022-46561 - https://hackmd.io/@0dayResearch/SetWanSettings_PPTP
|
|
CVE-2022-46561 - https://hackmd.io/@0dayResearch/ry55QVQvj
|
|
CVE-2022-46561 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-46562 - https://hackmd.io/@0dayResearch/B1C9jeXDi
|
|
CVE-2022-46562 - https://hackmd.io/@0dayResearch/SetQuickVPNSettings_PSK
|
|
CVE-2022-46562 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-46563 - https://hackmd.io/@0dayResearch/HkDzZLCUo
|
|
CVE-2022-46563 - https://hackmd.io/@0dayResearch/SetDynamicDNSSettings
|
|
CVE-2022-46563 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-46566 - https://hackmd.io/@0dayResearch/SetQuickVPNSettings_Password
|
|
CVE-2022-46566 - https://hackmd.io/@0dayResearch/SyhDme7wo
|
|
CVE-2022-46566 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-46568 - https://hackmd.io/@0dayResearch/B1SZP0aIo
|
|
CVE-2022-46568 - https://hackmd.io/@0dayResearch/SetSysEmailSettings
|
|
CVE-2022-46568 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-46569 - https://hackmd.io/@0dayResearch/SetWLanRadioSecurity
|
|
CVE-2022-46569 - https://hackmd.io/@0dayResearch/r1R6sWRUs
|
|
CVE-2022-46569 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-4657 - https://wpscan.com/vulnerability/a90a413d-0e00-4da8-a339-d6cdfba70bb3
|
|
CVE-2022-46570 - https://hackmd.io/@0dayResearch/SetWan3Settings_l2tp
|
|
CVE-2022-46570 - https://hackmd.io/@0dayResearch/SetWan3Settings_pppoe
|
|
CVE-2022-46570 - https://hackmd.io/@0dayResearch/SetWan3Settings_pptp
|
|
CVE-2022-46570 - https://hackmd.io/@0dayResearch/r1zsTSmDs
|
|
CVE-2022-46570 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-4658 - https://wpscan.com/vulnerability/c7a17eb9-2811-45ba-bab3-f53b2fa7d051
|
|
CVE-2022-46581 - https://brief-nymphea-813.notion.site/Vul5-TEW755-bof-tools_nslookup-c83bac14fe0f4f729535053459479fd1
|
|
CVE-2022-46603 - https://github.com/10cks/inkdropPoc
|
|
CVE-2022-46604 - http://packetstormsecurity.com/files/171720/Responsive-FileManager-9.9.5-Remote-Shell-Upload.html
|
|
CVE-2022-46604 - https://medium.com/@_sadshade/file-extention-bypass-in-responsive-filemanager-9-5-5-leading-to-rce-authenticated-3290eddc54e7
|
|
CVE-2022-4661 - https://wpscan.com/vulnerability/b95956c9-40e5-47aa-86f6-e2da61b3c19f
|
|
CVE-2022-46631 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/6
|
|
CVE-2022-46634 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/7
|
|
CVE-2022-46637 - https://packetstormsecurity.com/files/170342/ProLink-PRS1841-Backdoor-Account.html
|
|
CVE-2022-46637 - https://prolink2u.com/product/prs1841/
|
|
CVE-2022-46639 - https://ia-informatica.com/it/CVE-2022-46639
|
|
CVE-2022-4664 - https://wpscan.com/vulnerability/d6a9cfaa-d3fa-442e-a9a1-b06588723e39
|
|
CVE-2022-46640 - https://pwning.tech/cve-2022-46640/
|
|
CVE-2022-46641 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/d-link/dir-846/D-Link%20dir-846%20SetIpMacBindSettings%20Command%20Injection%20Vulnerability.md
|
|
CVE-2022-46641 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-46642 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/d-link/dir-846/D-Link%20dir-846%20SetAutoUpgradeInfo%20command%20injection%20vulnerability.md
|
|
CVE-2022-46642 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-4665 - https://huntr.dev/bounties/5e7f3ecc-3b08-4e0e-8bf8-ae7ae229941f
|
|
CVE-2022-4666 - https://wpscan.com/vulnerability/a6d23f2f-9504-40da-9b71-189033d8bd1d
|
|
CVE-2022-4667 - https://wpscan.com/vulnerability/a388232b-a399-46a5-83e6-20c1b5df351d
|
|
CVE-2022-4668 - https://wpscan.com/vulnerability/3e43156a-b784-4066-be69-23b139aafbad
|
|
CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/24
|
|
CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/25
|
|
CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/27
|
|
CVE-2022-4669 - https://wpscan.com/vulnerability/79f011e4-3422-4307-8736-f27048796aae
|
|
CVE-2022-46690 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-46690 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-46690 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/27
|
|
CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/28
|
|
CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/28
|
|
CVE-2022-46693 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-46693 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-46693 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-46694 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-46694 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-46694 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/27
|
|
CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/28
|
|
CVE-2022-46697 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/27
|
|
CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/28
|
|
CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/27
|
|
CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/28
|
|
CVE-2022-4670 - https://wpscan.com/vulnerability/2a67c290-2a27-44fe-95ae-2d427e9d7548
|
|
CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/21
|
|
CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/27
|
|
CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/28
|
|
CVE-2022-46701 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-46701 - http://seclists.org/fulldisclosure/2022/Dec/23
|
|
CVE-2022-46701 - http://seclists.org/fulldisclosure/2022/Dec/26
|
|
CVE-2022-46702 - http://seclists.org/fulldisclosure/2022/Dec/20
|
|
CVE-2022-4671 - https://wpscan.com/vulnerability/14c83830-3207-4f92-b8f5-afd7cc93af88
|
|
CVE-2022-4672 - https://wpscan.com/vulnerability/6500271f-9d1c-40ed-be58-a6cea8d1110d
|
|
CVE-2022-4673 - https://wpscan.com/vulnerability/1c4f379d-252a-487b-81c9-bf711ab71dff
|
|
CVE-2022-4674 - https://wpscan.com/vulnerability/eda64678-81ae-4be3-941e-a1e26e54029b
|
|
CVE-2022-46741 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-001.md
|
|
CVE-2022-4675 - https://wpscan.com/vulnerability/21f4cc5d-c4b4-495f-acf3-9fdf53591052
|
|
CVE-2022-4676 - https://wpscan.com/vulnerability/1df3c17c-990d-4074-b1d5-b26da880d88e
|
|
CVE-2022-46764 - https://vuldb.com/?diff.216845
|
|
CVE-2022-4677 - https://wpscan.com/vulnerability/9c293098-de54-4a04-b13d-2a702200f02e
|
|
CVE-2022-46770 - http://packetstormsecurity.com/files/171610/Qubes-Mirage-Firewall-0.8.3-Denial-Of-Service.html
|
|
CVE-2022-46770 - https://github.com/mirage/qubes-mirage-firewall/issues/166
|
|
CVE-2022-4678 - https://wpscan.com/vulnerability/6a36d665-a0ca-4346-8e55-cf9ba45966cc
|
|
CVE-2022-46786 - https://support.squaredup.com
|
|
CVE-2022-4679 - https://wpscan.com/vulnerability/c817c4af-cff2-4720-944d-c59e27544d41
|
|
CVE-2022-4680 - https://wpscan.com/vulnerability/f4197386-975d-4e53-8fc9-9425732da9af
|
|
CVE-2022-4681 - https://wpscan.com/vulnerability/5a4096e8-abe4-41c4-b741-c44e740e8689
|
|
CVE-2022-4682 - https://wpscan.com/vulnerability/5fc92954-20cf-4563-806e-e7a8e5ccfc72
|
|
CVE-2022-4683 - https://huntr.dev/bounties/84973f6b-739a-4d7e-8757-fc58cbbaf6ef
|
|
CVE-2022-4686 - https://huntr.dev/bounties/caa0b22c-501f-44eb-af65-65c315cd1637
|
|
CVE-2022-4687 - https://huntr.dev/bounties/b908377f-a61b-432c-8e6a-c7498da69788
|
|
CVE-2022-46874 - https://bugzilla.mozilla.org/show_bug.cgi?id=1746139
|
|
CVE-2022-46875 - https://bugzilla.mozilla.org/show_bug.cgi?id=1786188
|
|
CVE-2022-46887 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities
|
|
CVE-2022-46888 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities
|
|
CVE-2022-46889 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities
|
|
CVE-2022-4689 - https://huntr.dev/bounties/a78c4326-6e7b-47fe-aa82-461e5c12a4e3
|
|
CVE-2022-46890 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities
|
|
CVE-2022-4690 - https://huntr.dev/bounties/7e1be91d-3b13-4300-8af2-9bd9665ec335
|
|
CVE-2022-4691 - https://huntr.dev/bounties/459b55c1-22f5-4556-9cda-9b86aa91582f
|
|
CVE-2022-46910 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BkwzORiDo
|
|
CVE-2022-46912 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/Sk6sfbTPi
|
|
CVE-2022-46914 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BJ4czlpwi
|
|
CVE-2022-4692 - https://huntr.dev/bounties/9d1ed6ea-f7a0-4561-9325-a2babef99c74
|
|
CVE-2022-4693 - https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea
|
|
CVE-2022-46934 - https://github.com/kekingcn/kkFileView/issues/411
|
|
CVE-2022-4694 - https://huntr.dev/bounties/a4d865c2-1a2b-4e3a-aaae-915b0dfc3f22
|
|
CVE-2022-4695 - https://huntr.dev/bounties/2559d548-b847-40fb-94d6-18c1ad58b789
|
|
CVE-2022-46957 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/tracking.zip
|
|
CVE-2022-46965 - https://github.com/202ecommerce/security-advisories/security/advisories/GHSA-hg7m-23j3-rf56
|
|
CVE-2022-46966 - https://packetstormsecurity.com/files/169916/Revenue-Collection-System-1.0-SQL-Injection-Remote-Code-Execution.html
|
|
CVE-2022-46967 - https://packetstormsecurity.com/files/169916/Revenue-Collection-System-1.0-SQL-Injection-Remote-Code-Execution.html
|
|
CVE-2022-46968 - https://packetstormsecurity.com/files/169917/Revenue-Collection-System-1.0-Cross-Site-Scripting-Authentication-Bypass.html
|
|
CVE-2022-4699 - https://wpscan.com/vulnerability/e57f38d9-889a-4f82-b20d-3676ccf9c6f9
|
|
CVE-2022-47027 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2022-47027/CVE%20detail.md
|
|
CVE-2022-47028 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2022-47028/CVE%20detailed.md
|
|
CVE-2022-47029 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2022-47029/CVE%20detailed.md
|
|
CVE-2022-47035 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-47036 - https://semaja2.net/2023/06/11/siklu-tg-auth-bypass.html
|
|
CVE-2022-47037 - https://semaja2.net/2023/06/11/siklu-tg-auth-bypass.html
|
|
CVE-2022-4706 - https://wpscan.com/vulnerability/30882a45-ca03-4ff1-a36d-758d9b9b641c
|
|
CVE-2022-47065 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/01/README.md
|
|
CVE-2022-47069 - https://sourceforge.net/p/p7zip/bugs/241/
|
|
CVE-2022-47070 - https://github.com/Sylon001/NVS-365-Camera/tree/master/NVS365%20Network%20Video%20Server%20Password%20Information%20Unauthorized%20Access%20Vulnerability
|
|
CVE-2022-47072 - https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection
|
|
CVE-2022-47073 - https://medium.com/@shiva.infocop/stored-xss-found-in-small-crm-phpgurukul-7890ea3c04df
|
|
CVE-2022-47073 - https://packetstormsecurity.com
|
|
CVE-2022-47075 - http://packetstormsecurity.com/files/173093/Smart-Office-Web-20.28-Information-Disclosure-Insecure-Direct-Object-Reference.html
|
|
CVE-2022-47075 - https://cvewalkthrough.com/smart-office-suite-cve-2022-47076-cve-2022-47075/
|
|
CVE-2022-47076 - http://packetstormsecurity.com/files/173093/Smart-Office-Web-20.28-Information-Disclosure-Insecure-Direct-Object-Reference.html
|
|
CVE-2022-47076 - https://cvewalkthrough.com/smart-office-suite-cve-2022-47076-cve-2022-47075/
|
|
CVE-2022-47083 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5720.php
|
|
CVE-2022-47085 - https://doc.rust-lang.org/std/macro.eprintln.html
|
|
CVE-2022-47086 - https://github.com/gpac/gpac/issues/2337
|
|
CVE-2022-47087 - https://github.com/gpac/gpac/issues/2339
|
|
CVE-2022-47088 - https://github.com/gpac/gpac/issues/2340
|
|
CVE-2022-47089 - https://github.com/gpac/gpac/issues/2338
|
|
CVE-2022-47091 - https://github.com/gpac/gpac/issues/2343
|
|
CVE-2022-47092 - https://github.com/gpac/gpac/issues/2347
|
|
CVE-2022-47093 - https://github.com/gpac/gpac/issues/2344
|
|
CVE-2022-47094 - https://github.com/gpac/gpac/issues/2345
|
|
CVE-2022-47095 - https://github.com/gpac/gpac/issues/2346
|
|
CVE-2022-47102 - https://github.com/sudoninja-noob/CVE-2022-47102/blob/main/CVE-2022-47102
|
|
CVE-2022-47130 - https://portswigger.net/web-security/csrf
|
|
CVE-2022-47130 - https://xpsec.co/blog/academy-lms-5-10-coupon-csrf
|
|
CVE-2022-47131 - https://portswigger.net/web-security/csrf
|
|
CVE-2022-47131 - https://portswigger.net/web-security/csrf/xss-vs-csrf
|
|
CVE-2022-47131 - https://xpsec.co/blog/academy-lms-5-10-add-page-csrf-xss
|
|
CVE-2022-47132 - https://portswigger.net/web-security/csrf
|
|
CVE-2022-47132 - https://xpsec.co/blog/academy-lms-5-10-add-admin-csrf
|
|
CVE-2022-4714 - https://wpscan.com/vulnerability/61b475f1-bbfb-4450-a3b2-b8caf5df2340
|
|
CVE-2022-4715 - https://wpscan.com/vulnerability/4394fe86-4240-4454-b724-81464b04123a
|
|
CVE-2022-4716 - https://wpscan.com/vulnerability/24176ad3-2317-4853-b4db-8394384d52cd
|
|
CVE-2022-4717 - https://wpscan.com/vulnerability/14b679f5-44a8-46d4-89dd-94eb647cb672
|
|
CVE-2022-4718 - https://wpscan.com/vulnerability/04d7cd44-9e18-42b9-9f79-cc9cd6980526
|
|
CVE-2022-4719 - https://huntr.dev/bounties/9f746881-ad42-446b-9b1d-153391eacc09
|
|
CVE-2022-47194 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686
|
|
CVE-2022-47195 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686
|
|
CVE-2022-47196 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686
|
|
CVE-2022-47197 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686
|
|
CVE-2022-4720 - https://huntr.dev/bounties/339687af-6e25-4ad8-823d-c097f607ea70
|
|
CVE-2022-4721 - https://huntr.dev/bounties/3c48ef5d-da4d-4ee4-aaca-af65e7273720
|
|
CVE-2022-4722 - https://huntr.dev/bounties/c62126dc-d9a6-4d3e-988d-967031876c58
|
|
CVE-2022-4723 - https://huntr.dev/bounties/9369681b-8bfc-4146-a54c-c5108442d92c
|
|
CVE-2022-4724 - https://huntr.dev/bounties/e6fb1931-8d9c-4895-be4a-59839b4b6445
|
|
CVE-2022-4730 - https://vuldb.com/?id.216744
|
|
CVE-2022-4732 - https://huntr.dev/bounties/d5be2e96-1f2f-4357-a385-e184cf0119aa
|
|
CVE-2022-4733 - https://huntr.dev/bounties/f353adfb-e5b8-43e7-957a-894670fd4ccd
|
|
CVE-2022-4744 - http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html
|
|
CVE-2022-4745 - https://wpscan.com/vulnerability/9703f42e-bdfe-4787-92c9-47963d9af425
|
|
CVE-2022-4746 - https://wpscan.com/vulnerability/62e3babc-00c6-4a35-972f-8f03ba70ba32
|
|
CVE-2022-4747 - https://wpscan.com/vulnerability/004f1872-1576-447f-8837-f29fa319cbdc
|
|
CVE-2022-4749 - https://wpscan.com/vulnerability/8afc3b2a-81e5-4b6f-8f4c-c48492843569
|
|
CVE-2022-4750 - https://wpscan.com/vulnerability/7bdc1324-8d08-4185-971f-8d49367702cf
|
|
CVE-2022-47502 - https://www.openoffice.org/security/cves/CVE-2022-47502.html
|
|
CVE-2022-4751 - https://wpscan.com/vulnerability/dd5cc04a-042d-402a-ab7a-96aff3d57478
|
|
CVE-2022-47514 - https://github.com/jumpycastle/xmlrpc.net-poc
|
|
CVE-2022-4752 - https://wpscan.com/vulnerability/309799dd-dea7-489d-8d18-b6014534f5af
|
|
CVE-2022-47529 - http://seclists.org/fulldisclosure/2023/Mar/26
|
|
CVE-2022-47529 - http://seclists.org/fulldisclosure/2024/Apr/17
|
|
CVE-2022-47529 - https://hyp3rlinx.altervista.org/advisories/RSA_NETWITNESS_EDR_AGENT_INCORRECT_ACCESS_CONTROL_CVE-2022-47529.txt
|
|
CVE-2022-47529 - https://packetstormsecurity.com/files/171476/RSA-NetWitness-Endpoint-EDR-Agent-12.x-Incorrect-Access-Control-Code-Execution.html
|
|
CVE-2022-4753 - https://wpscan.com/vulnerability/5d72ec1f-5379-4d8e-850c-afe8b41bb126
|
|
CVE-2022-47531 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2022-47532 - https://herolab.usd.de/security-advisories/usd-2022-0064/
|
|
CVE-2022-4754 - https://wpscan.com/vulnerability/d2cc0ab2-9bfd-4a09-ac31-bd90e6da12db
|
|
CVE-2022-47547 - https://arxiv.org/pdf/2212.05197.pdf
|
|
CVE-2022-4756 - https://wpscan.com/vulnerability/d67b0f7a-fdb1-4305-9976-c5f77b0e3b61
|
|
CVE-2022-4757 - https://wpscan.com/vulnerability/30211ffd-8751-4354-96d3-69b0106100b1
|
|
CVE-2022-47577 - https://medium.com/nestedif/vulnerability-disclosure-business-logic-unauthorized-data-exfiltration-bypassing-dlp-zoho-cc51465ba84a
|
|
CVE-2022-47578 - https://medium.com/nestedif/vulnerability-disclosure-business-logic-unauthorized-data-exfiltration-bypassing-dlp-zoho-cc51465ba84a
|
|
CVE-2022-4758 - https://wpscan.com/vulnerability/c2c89234-5e9c-47c8-9827-8ab0b10fb7d6
|
|
CVE-2022-47583 - https://dgl.cx/2023/09/ansi-terminal-security#mintty
|
|
CVE-2022-4759 - https://wpscan.com/vulnerability/63328927-5614-4fa1-8f46-46ff0c8eb959
|
|
CVE-2022-4760 - https://wpscan.com/vulnerability/ad710c22-878a-441b-9c5a-90511b913d9d
|
|
CVE-2022-4761 - https://wpscan.com/vulnerability/ad163020-8b9c-42cb-a55f-b137b224bafb
|
|
CVE-2022-4762 - https://wpscan.com/vulnerability/4500566a-e5f2-40b8-a185-2bcace221b4e
|
|
CVE-2022-4763 - https://wpscan.com/vulnerability/2f79a87f-c994-4a1e-b455-39d7d3c5c1b5
|
|
CVE-2022-47630 - https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-10.html
|
|
CVE-2022-47631 - http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html
|
|
CVE-2022-47631 - http://seclists.org/fulldisclosure/2023/Sep/6
|
|
CVE-2022-47631 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-002.txt
|
|
CVE-2022-47632 - http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html
|
|
CVE-2022-47632 - http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html
|
|
CVE-2022-47632 - http://seclists.org/fulldisclosure/2023/Sep/6
|
|
CVE-2022-47632 - https://syss.de
|
|
CVE-2022-47632 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-047.txt
|
|
CVE-2022-47635 - https://wildix.atlassian.net/wiki/spaces/DOC/pages/30279136/Changelogs
|
|
CVE-2022-47636 - http://packetstormsecurity.com/files/174127/OutSystems-Service-Studio-11.53.30-DLL-Hijacking.html
|
|
CVE-2022-47636 - https://www.exploit-db.com/exploits/51678
|
|
CVE-2022-4764 - https://wpscan.com/vulnerability/788c6aa2-14cc-411f-95e8-5994f8c82d70
|
|
CVE-2022-4765 - https://wpscan.com/vulnerability/a21dc4a3-a4f3-4619-b8a3-493a27e14ccb
|
|
CVE-2022-47653 - https://github.com/gpac/gpac/issues/2349
|
|
CVE-2022-47654 - https://github.com/gpac/gpac/issues/2350
|
|
CVE-2022-47655 - https://github.com/strukturag/libde265/issues/367
|
|
CVE-2022-47656 - https://github.com/gpac/gpac/issues/2353
|
|
CVE-2022-47657 - https://github.com/gpac/gpac/issues/2355
|
|
CVE-2022-47658 - https://github.com/gpac/gpac/issues/2356
|
|
CVE-2022-47659 - https://github.com/gpac/gpac/issues/2354
|
|
CVE-2022-47660 - https://github.com/gpac/gpac/issues/2357
|
|
CVE-2022-47661 - https://github.com/gpac/gpac/issues/2358
|
|
CVE-2022-47662 - https://github.com/gpac/gpac/issues/2359
|
|
CVE-2022-47663 - https://github.com/gpac/gpac/issues/2360
|
|
CVE-2022-47664 - https://github.com/strukturag/libde265/issues/368
|
|
CVE-2022-47665 - https://github.com/strukturag/libde265/issues/369
|
|
CVE-2022-47673 - https://sourceware.org/bugzilla/show_bug.cgi?id=29876
|
|
CVE-2022-4769 - https://support.pentaho.com/hc/en-us/articles/14452244712589--Resolved-Pentaho-BA-Server-Generation-of-Error-Message-Containing-Sensitive-Information-Versions-before-9-4-0-0-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-4769-
|
|
CVE-2022-47695 - https://sourceware.org/bugzilla/show_bug.cgi?id=29846
|
|
CVE-2022-47696 - https://sourceware.org/bugzilla/show_bug.cgi?id=29677
|
|
CVE-2022-47732 - https://www.swascan.com/security-advisory-yeastar-n412-and-n824-configuration-panel/
|
|
CVE-2022-4774 - https://wpscan.com/vulnerability/2ae5c375-a6a0-4c0b-a9ef-e4d2a28bce5e
|
|
CVE-2022-4775 - https://wpscan.com/vulnerability/5ab3fc58-7d1c-4bcd-8bbd-86c62a3f979c
|
|
CVE-2022-47758 - https://pwning.tech/cve-2022-47758
|
|
CVE-2022-47758 - https://pwning.tech/cve-2022-47758/
|
|
CVE-2022-4776 - https://wpscan.com/vulnerability/d5ea8f7f-7d5a-4b2e-a070-a9aef7cac58a
|
|
CVE-2022-47767 - https://www.swascan.com/security-advisory-solar-log/
|
|
CVE-2022-47768 - https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/
|
|
CVE-2022-47769 - https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/
|
|
CVE-2022-4777 - https://wpscan.com/vulnerability/b4c53bef-e868-46f1-965d-720b5b9a931e
|
|
CVE-2022-47770 - https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/
|
|
CVE-2022-4781 - https://wpscan.com/vulnerability/a2803027-b822-4bf9-8d1d-6f538681af9d
|
|
CVE-2022-4782 - https://wpscan.com/vulnerability/d3a0468a-8405-4b6c-800f-abd5ce5387b5
|
|
CVE-2022-4783 - https://wpscan.com/vulnerability/38e4c7fe-94d5-48b9-8659-e114cbbb4252
|
|
CVE-2022-4784 - https://wpscan.com/vulnerability/a30c6f1e-62fd-493d-ad5e-1b55ceec62a9
|
|
CVE-2022-4785 - https://wpscan.com/vulnerability/61873267-9f4f-4be5-bad6-95229ad54b99
|
|
CVE-2022-47853 - https://github.com/Am1ngl/ttt/tree/main/16
|
|
CVE-2022-47854 - https://github.com/mkucej/i-librarian/issues/155
|
|
CVE-2022-47854 - https://github.com/mkucej/i-librarian/issues/155#issue-1501906608
|
|
CVE-2022-4786 - https://wpscan.com/vulnerability/fdad356f-cae4-4390-9a62-605201cee0c0
|
|
CVE-2022-4787 - https://wpscan.com/vulnerability/2ab59972-ccfd-48f6-b879-58fb38823ca5
|
|
CVE-2022-47870 - https://packetstormsecurity.com/files/171647/SQL-Monitor-12.1.31.893-Cross-Site-Scripting.html
|
|
CVE-2022-47873 - https://fordefence.com/cve-2022-47873-keos-software-xx/
|
|
CVE-2022-47874 - http://packetstormsecurity.com/files/172156/Jedox-2020.2.5-Database-Credential-Disclosure.html
|
|
CVE-2022-47875 - http://packetstormsecurity.com/files/172152/Jedox-2022.4.2-Directory-Traversal-Remote-Code-Execution.html
|
|
CVE-2022-47876 - http://packetstormsecurity.com/files/172155/Jedox-2020.2.5-Groovy-Scripts-Remote-Code-Execution.html
|
|
CVE-2022-47877 - http://packetstormsecurity.com/files/172153/Jedox-2020.2.5-Cross-Site-Scripting.html
|
|
CVE-2022-47878 - http://packetstormsecurity.com/files/172154/Jedox-2020.2.5-Configurable-Storage-Path-Remote-Code-Execution.html
|
|
CVE-2022-4788 - https://wpscan.com/vulnerability/2a162365-5a86-423d-b7c4-55c9b4d8b024
|
|
CVE-2022-47881 - https://www.foxit.com/support/security-bulletins.html
|
|
CVE-2022-4789 - https://wpscan.com/vulnerability/5e816e9a-84e5-42d2-a7ff-e46be9072278
|
|
CVE-2022-4790 - https://wpscan.com/vulnerability/c01f9d36-955d-432c-8a09-ea9ee750f1a1
|
|
CVE-2022-4791 - https://wpscan.com/vulnerability/0a6e4c45-3f6d-4150-9546-141c2e3a1782
|
|
CVE-2022-4792 - https://wpscan.com/vulnerability/13304aca-0722-4bd9-b443-a5fed1ce22da
|
|
CVE-2022-47924 - https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.json
|
|
CVE-2022-47925 - https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.json
|
|
CVE-2022-47929 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407
|
|
CVE-2022-4793 - https://wpscan.com/vulnerability/00c34ba8-b82e-4bb9-90b1-1afefae75948
|
|
CVE-2022-47930 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b
|
|
CVE-2022-47931 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b
|
|
CVE-2022-47938 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
|
|
CVE-2022-47939 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
|
|
CVE-2022-4794 - https://wpscan.com/vulnerability/feb4580d-df15-45c8-b59e-ad406e4b064c
|
|
CVE-2022-47940 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.18
|
|
CVE-2022-47941 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
|
|
CVE-2022-47942 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
|
|
CVE-2022-47943 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
|
|
CVE-2022-47949 - https://github.com/PabloMK7/ENLBufferPwn
|
|
CVE-2022-4795 - https://wpscan.com/vulnerability/5052e60f-59ea-4758-8af3-112285a18639
|
|
CVE-2022-4796 - https://huntr.dev/bounties/efe8001b-1d6a-41af-a64c-736705cc66a6
|
|
CVE-2022-47966 - http://packetstormsecurity.com/files/170882/Zoho-ManageEngine-ServiceDesk-Plus-14003-Remote-Code-Execution.html
|
|
CVE-2022-47966 - http://packetstormsecurity.com/files/170925/ManageEngine-ADSelfService-Plus-Unauthenticated-SAML-Remote-Code-Execution.html
|
|
CVE-2022-47966 - http://packetstormsecurity.com/files/170943/Zoho-ManageEngine-Endpoint-Central-MSP-10.1.2228.10-Remote-Code-Execution.html
|
|
CVE-2022-47966 - https://attackerkb.com/topics/gvs0Gv8BID/cve-2022-47966/rapid7-analysis
|
|
CVE-2022-47966 - https://github.com/horizon3ai/CVE-2022-47966
|
|
CVE-2022-47966 - https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/
|
|
CVE-2022-4797 - https://huntr.dev/bounties/5233f76f-016b-4c65-b019-2c5d27802a1b
|
|
CVE-2022-4798 - https://huntr.dev/bounties/e12eed25-1a8e-4ee1-b846-2d4df1db2fae
|
|
CVE-2022-47986 - http://packetstormsecurity.com/files/171772/IBM-Aspera-Faspex-4.4.1-YAML-Deserialization.html
|
|
CVE-2022-4799 - https://huntr.dev/bounties/c5d70f9d-b7a7-4418-9368-4566a8143e79
|
|
CVE-2022-4800 - https://huntr.dev/bounties/aa45a6eb-cc38-45e5-a301-221ef43c0ef8
|
|
CVE-2022-48006 - https://github.com/taogogo/taocms/issues/35
|
|
CVE-2022-4801 - https://huntr.dev/bounties/b0795261-0f97-4f0b-be44-9dc079e01593
|
|
CVE-2022-48011 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-sql%20injection%20in%20viewerrors-importID.md
|
|
CVE-2022-48012 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-Reflected%20XSS%20in%20onChangeTag.md
|
|
CVE-2022-48013 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-Stored%20XSS%20in%20Calendar-Add-Event.md
|
|
CVE-2022-48019 - https://github.com/kkent030315/CVE-2022-42046
|
|
CVE-2022-4802 - https://huntr.dev/bounties/d47d4a94-92e3-4400-b012-a8577cbd7956
|
|
CVE-2022-4803 - https://huntr.dev/bounties/0fba72b9-db10-4d9f-a707-2acf2004a286
|
|
CVE-2022-4805 - https://huntr.dev/bounties/b03f6a9b-e49b-42d6-a318-1d7afd985873
|
|
CVE-2022-4806 - https://huntr.dev/bounties/2c7101bc-e6d8-4cd0-9003-bc8d86f4e4be
|
|
CVE-2022-48063 - https://sourceware.org/bugzilla/show_bug.cgi?id=29924
|
|
CVE-2022-48064 - https://sourceware.org/bugzilla/show_bug.cgi?id=29922
|
|
CVE-2022-48065 - https://sourceware.org/bugzilla/show_bug.cgi?id=29925
|
|
CVE-2022-4807 - https://huntr.dev/bounties/704c9ed7-2120-47ea-aaf0-5fdcbd492954
|
|
CVE-2022-48078 - https://github.com/zrax/pycdc/issues/295
|
|
CVE-2022-48079 - https://thanatosxingyu.github.io/
|
|
CVE-2022-4808 - https://huntr.dev/bounties/11877cbf-fcaf-42ef-813e-502c7293f2b5
|
|
CVE-2022-48085 - http://google.com
|
|
CVE-2022-4809 - https://huntr.dev/bounties/e46c5380-a590-40de-a8e5-79872ee0bb29
|
|
CVE-2022-48090 - https://github.com/tramyardg/hotel-mgmt-system/issues/21
|
|
CVE-2022-48091 - https://github.com/tramyardg/hotel-mgmt-system/issues/22
|
|
CVE-2022-4810 - https://huntr.dev/bounties/f0c8d778-db86-4ed3-85bb-5315ab56915e
|
|
CVE-2022-48107 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20inject%20in%20IPAddress
|
|
CVE-2022-48107 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-48108 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20inject%20in%20Netmask
|
|
CVE-2022-48108 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2022-4811 - https://huntr.dev/bounties/e907b754-4f33-46b6-9dd2-0d2223cb060c
|
|
CVE-2022-48110 - https://packetstormsecurity.com/files/170927/CKSource-CKEditor5-35.4.0-Cross-Site-Scripting.html
|
|
CVE-2022-48111 - https://devisions.github.io/blog/cve-2022-48111
|
|
CVE-2022-48111 - https://labs.yarix.com/2023/02/siri-wi400-xss-on-login-page-cve-2022-48111/
|
|
CVE-2022-48113 - https://wefir.blogspot.com/2022/12/totolink-n200rev5-telnet-backdoor.html
|
|
CVE-2022-48114 - https://gitee.com/y_project/RuoYi/issues/I65V2B
|
|
CVE-2022-48116 - https://github.com/loadream/AyaCMS/issues/10
|
|
CVE-2022-4812 - https://huntr.dev/bounties/33924891-5c36-4b46-b417-98eaab688c4c
|
|
CVE-2022-48121 - https://github.com/Am1ngl/ttt/tree/main/16
|
|
CVE-2022-48122 - https://github.com/Am1ngl/ttt/tree/main/17
|
|
CVE-2022-48123 - https://github.com/Am1ngl/ttt/tree/main/15
|
|
CVE-2022-48124 - https://github.com/Am1ngl/ttt/tree/main/14
|
|
CVE-2022-48125 - https://github.com/Am1ngl/ttt/tree/main/13
|
|
CVE-2022-48126 - https://github.com/Am1ngl/ttt/tree/main/12
|
|
CVE-2022-4813 - https://huntr.dev/bounties/a24b45d8-554b-4131-8ce1-f33bf8cdbacc
|
|
CVE-2022-48130 - https://github.com/Stevenbaga/fengsha/blob/main/W20E/formSetStaticRoute.md
|
|
CVE-2022-4814 - https://huntr.dev/bounties/e65b3458-c2e2-4c0b-9029-e3c9ee015ae4
|
|
CVE-2022-48150 - https://github.com/sahilop123/-CVE-2022-48150
|
|
CVE-2022-48164 - https://docs.google.com/document/d/1JgqpBYRxyU0WKDSqkvi4Yo0723k7mrIUeuH9i1eEs8U/edit?usp=sharing
|
|
CVE-2022-48164 - https://github.com/strik3r0x1/Vulns/blob/main/WAVLINK_WN533A8.md
|
|
CVE-2022-48177 - http://packetstormsecurity.com/files/171792/X2CRM-6.6-6.9-Cross-Site-Scripting.html
|
|
CVE-2022-48178 - http://packetstormsecurity.com/files/171792/X2CRM-6.6-6.9-Cross-Site-Scripting.html
|
|
CVE-2022-48194 - http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html
|
|
CVE-2022-48196 - https://www.bleepingcomputer.com/news/security/netgear-warns-users-to-patch-recently-fixed-wifi-router-bug/
|
|
CVE-2022-48197 - http://packetstormsecurity.com/files/171633/Yahoo-User-Interface-TreeView-2.8.2-Cross-Site-Scripting.html
|
|
CVE-2022-48199 - https://giuliamelottigaribaldi.com/cve-2022-48199/
|
|
CVE-2022-48216 - https://media.dedaub.com/uniswap-bug-bounty-1625d8ff04ae
|
|
CVE-2022-4824 - https://wpscan.com/vulnerability/9af8e425-c477-4e2b-9445-70ffb769f3f0
|
|
CVE-2022-4825 - https://wpscan.com/vulnerability/a2758983-d3a7-4718-b5b8-30169df6780a
|
|
CVE-2022-48251 - https://eshard.com/posts/sca-attacks-on-armv8
|
|
CVE-2022-48252 - https://github.com/jokob-sk/Pi.Alert/security/advisories/GHSA-vhg3-f6gv-j89r
|
|
CVE-2022-48253 - https://www.soteritsecurity.com/blog/2023/01/nostromo_from_directory_traversal_to_RCE.html
|
|
CVE-2022-4826 - https://wpscan.com/vulnerability/59fa32d2-aa66-4980-9ee5-0a7513f3a2b0
|
|
CVE-2022-4827 - https://wpscan.com/vulnerability/f2a922ac-6bc9-4caa-b1cc-9ca9cff4bd51
|
|
CVE-2022-4828 - https://wpscan.com/vulnerability/06e1d63e-576b-4e16-beb7-4f0bfb85e948
|
|
CVE-2022-48281 - https://gitlab.com/libtiff/libtiff/-/issues/488
|
|
CVE-2022-4829 - https://wpscan.com/vulnerability/57e528ce-ec8c-4734-8903-926be36f91e7
|
|
CVE-2022-4830 - https://wpscan.com/vulnerability/ae103336-a411-4ebf-a5f0-2f35701e364c
|
|
CVE-2022-48303 - https://savannah.gnu.org/bugs/?62387
|
|
CVE-2022-48306 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-09.md
|
|
CVE-2022-48307 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-13.md
|
|
CVE-2022-48308 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-14.md
|
|
CVE-2022-4831 - https://wpscan.com/vulnerability/872fc8e6-4035-4e5a-9f30-16c482c48c7c
|
|
CVE-2022-48311 - https://github.com/swzhouu/CVE-2022-48311
|
|
CVE-2022-4832 - https://wpscan.com/vulnerability/735a33e1-63fb-4f17-812c-3e68709b5c2c
|
|
CVE-2022-48323 - https://asec.ahnlab.com/en/47088/
|
|
CVE-2022-4833 - https://wpscan.com/vulnerability/35ba38cf-4f23-4344-8de3-cf3004ebf84c
|
|
CVE-2022-48331 - https://cyberintel.es/cve/CVE-2022-48331_Buffer_Overflow_in_Widevine_drm_save_keys_0x69b0/
|
|
CVE-2022-48332 - https://cyberintel.es/cve/CVE-2022-48332_Buffer_Overflow_in_Widevine_drm_save_keys_0x6a18/
|
|
CVE-2022-48333 - https://cyberintel.es/cve/CVE-2022-48333_Buffer_Overflow_in_Widevine_drm_verify_keys_0x730c/
|
|
CVE-2022-48334 - https://cyberintel.es/cve/CVE-2022-48334_Buffer_Overflow_in_Widevine_drm_verify_keys_0x7370/
|
|
CVE-2022-48335 - https://cyberintel.es/cve/CVE-2022-48335_Buffer_Overflow_in_Widevine_PRDiagVerifyProvisioning_0x5f90/
|
|
CVE-2022-48336 - https://cyberintel.es/cve/CVE-2022-48336_Buffer_Overflow_in_Widevine_PRDiagParseAndStoreData_0x5cc8/
|
|
CVE-2022-4834 - https://wpscan.com/vulnerability/6183318f-0230-47a1-87f2-3c5aaef678a5
|
|
CVE-2022-4835 - https://wpscan.com/vulnerability/23c22f46-19a2-4a1a-aaef-0a4007eda031
|
|
CVE-2022-4836 - https://wpscan.com/vulnerability/e9a228dc-d32e-4918-898d-4d7af4662a14
|
|
CVE-2022-4837 - https://wpscan.com/vulnerability/41abeacb-ef3e-4621-89bb-df0f2eb617da
|
|
CVE-2022-4838 - https://wpscan.com/vulnerability/9937e369-60e8-451c-8790-1a83a59115fc
|
|
CVE-2022-4839 - https://huntr.dev/bounties/ad954cab-f026-4895-8003-99f5e3b507ed
|
|
CVE-2022-4840 - https://huntr.dev/bounties/b42aa2e9-c783-464c-915c-a80cb464ee01
|
|
CVE-2022-4841 - https://huntr.dev/bounties/fa46b3ef-c621-443a-be3a-0a83fb78ba62
|
|
CVE-2022-4843 - https://huntr.dev/bounties/075b2760-66a0-4d38-b3b5-e9934956ab7f
|
|
CVE-2022-4844 - https://huntr.dev/bounties/8e8df1f4-07ab-4b75-aec8-75b1229e93a3
|
|
CVE-2022-4845 - https://huntr.dev/bounties/075dbd51-b078-436c-9e3d-7f25cd2e7e1b
|
|
CVE-2022-4846 - https://huntr.dev/bounties/38c685fc-7065-472d-a46e-e26bf0b556d3
|
|
CVE-2022-4847 - https://huntr.dev/bounties/ff6d4b5a-5e75-4a14-b5ce-f318f8613b73
|
|
CVE-2022-4848 - https://huntr.dev/bounties/25de88cc-8d0d-41a1-b069-9ef1327770bc
|
|
CVE-2022-48482 - https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88
|
|
CVE-2022-48483 - https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88
|
|
CVE-2022-4849 - https://huntr.dev/bounties/404ce7dd-f345-4d98-ad80-c53ac74f4e5c
|
|
CVE-2022-4850 - https://huntr.dev/bounties/46dc4728-eacc-43f5-9831-c203fdbcc346
|
|
CVE-2022-48502 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2
|
|
CVE-2022-48506 - https://dvsorder.org
|
|
CVE-2022-48506 - https://freedom-to-tinker.com/2023/06/14/security-analysis-of-the-dominion-imagecast-x/
|
|
CVE-2022-4851 - https://huntr.dev/bounties/e3cebc1a-1326-4a08-abad-0414a717fa0f
|
|
CVE-2022-48545 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42092
|
|
CVE-2022-48547 - https://github.com/Cacti/cacti/issues/1882
|
|
CVE-2022-4855 - https://github.com/joinia/webray.com.cn/blob/main/lead-management-system/leadmanasql.md
|
|
CVE-2022-48554 - https://bugs.astron.com/view.php?id=310
|
|
CVE-2022-4856 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Slave/Modbus%20Slave%20(version%207.5.1%20and%20earlier)%20mbs%20file%20has%20a%20buffer%20overflow%20vulnerability.md
|
|
CVE-2022-4856 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Slave/poc/poc.mbs
|
|
CVE-2022-4856 - https://vuldb.com/?id.217021
|
|
CVE-2022-48560 - https://bugs.python.org/issue39421
|
|
CVE-2022-4857 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/Modbus%20Poll%20(version%209.10.0%20and%20earlier)%20mbp%20file%20has%20a%20buffer%20overflow%20vulnerability.md
|
|
CVE-2022-4857 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/poc/poc.mbp
|
|
CVE-2022-48579 - https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee
|
|
CVE-2022-48580 - https://www.securifera.com/advisories/cve-2022-48580/
|
|
CVE-2022-48581 - https://www.securifera.com/advisories/cve-2022-48581/
|
|
CVE-2022-48582 - https://www.securifera.com/advisories/cve-2022-48582/
|
|
CVE-2022-48583 - https://www.securifera.com/advisories/cve-2022-48583/
|
|
CVE-2022-48584 - https://www.securifera.com/advisories/cve-2022-48584/
|
|
CVE-2022-48585 - https://www.securifera.com/advisories/cve-2022-48585/
|
|
CVE-2022-48586 - https://www.securifera.com/advisories/cve-2022-48586/
|
|
CVE-2022-48587 - https://www.securifera.com/advisories/cve-2022-48587/
|
|
CVE-2022-48588 - https://www.securifera.com/advisories/cve-2022-48588/
|
|
CVE-2022-48589 - https://www.securifera.com/advisories/cve-2022-48589/
|
|
CVE-2022-48590 - https://www.securifera.com/advisories/cve-2022-48590/
|
|
CVE-2022-48591 - https://www.securifera.com/advisories/cve-2022-48591/
|
|
CVE-2022-48592 - https://www.securifera.com/advisories/cve-2022-48592/
|
|
CVE-2022-48593 - https://www.securifera.com/advisories/cve-2022-48593/
|
|
CVE-2022-48594 - https://www.securifera.com/advisories/cve-2022-48594/
|
|
CVE-2022-48595 - https://www.securifera.com/advisories/cve-2022-48595/
|
|
CVE-2022-48596 - https://www.securifera.com/advisories/cve-2022-48596/
|
|
CVE-2022-48597 - https://www.securifera.com/advisories/cve-2022-48597/
|
|
CVE-2022-48598 - https://www.securifera.com/advisories/cve-2022-48598/
|
|
CVE-2022-48599 - https://www.securifera.com/advisories/cve-2022-48599/
|
|
CVE-2022-48600 - https://www.securifera.com/advisories/cve-2022-48600/
|
|
CVE-2022-48601 - https://www.securifera.com/advisories/cve-2022-48601/
|
|
CVE-2022-48602 - https://www.securifera.com/advisories/cve-2022-48602/
|
|
CVE-2022-48603 - https://www.securifera.com/advisories/cve-2022-48603/
|
|
CVE-2022-48604 - https://www.securifera.com/advisories/cve-2022-48604/
|
|
CVE-2022-48612 - https://blog.zerdle.net/classlink/
|
|
CVE-2022-48615 - https://wr3nchsr.github.io/huawei-netengine-ar617vw-auth-root-rce/
|
|
CVE-2022-48616 - https://wr3nchsr.github.io/huawei-netengine-ar617vw-auth-root-rce/
|
|
CVE-2022-48619 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10
|
|
CVE-2022-48622 - https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202
|
|
CVE-2022-4863 - https://huntr.dev/bounties/42751929-e511-49a9-888d-d5b610da2a45
|
|
CVE-2022-4864 - https://huntr.dev/bounties/b7140709-8f84-4f19-9463-78669fa2175b
|
|
CVE-2022-4865 - https://huntr.dev/bounties/cd8765a2-bf28-4019-8647-882ccf63b2be
|
|
CVE-2022-4866 - https://huntr.dev/bounties/39c04778-6228-4f07-bdd4-ab17f246dbff
|
|
CVE-2022-4867 - https://huntr.dev/bounties/c91364dd-9ead-4bf3-96e6-663a017e08fa
|
|
CVE-2022-4868 - https://huntr.dev/bounties/3a8f36ac-5eda-41e7-a9c4-e0f3d63e6e3b
|
|
CVE-2022-48682 - https://bugzilla.suse.com/show_bug.cgi?id=1200381
|
|
CVE-2022-4872 - https://wpscan.com/vulnerability/c76a1c0b-8a5b-4639-85b6-9eebc63c3aa6
|
|
CVE-2022-4882 - https://vuldb.com/?id.217664
|
|
CVE-2022-4888 - https://wpscan.com/vulnerability/2c2379d0-e373-4587-a747-429d7ee8f6cc
|
|
CVE-2022-4897 - https://wpscan.com/vulnerability/7b0eeafe-b9bc-43b2-8487-a23d3960f73f
|
|
CVE-2022-4944 - https://github.com/kalcaddle/KodExplorer/issues/512
|
|
CVE-2022-4944 - https://www.mediafire.com/file/709i2vxybergtg7/poc.zip/file
|
|
CVE-2022-4946 - https://wpscan.com/vulnerability/6e222018-a3e0-4af0-846c-6f00b67dfbc0
|
|
CVE-2022-4953 - http://packetstormsecurity.com/files/174550/WordPress-Elementor-Iframe-Injection.html
|
|
CVE-2022-4953 - https://wpscan.com/vulnerability/8273357e-f9e1-44bc-8082-8faab838eda7
|
|
CVE-2022-4956 - https://heegong.github.io/posts/Advaned-Installer-Local-Privilege-Escalation-Vulnerability/
|
|
CVE-2022-4964 - https://bugs.launchpad.net/ubuntu/+source/pipewire/+bug/1995707/
|
|
CVE-2023-0005 - https://security.paloaltonetworks.com/CVE-2023-0005
|
|
CVE-2023-0012 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-0013 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-0014 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-0015 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-0016 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-0017 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-0018 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-0019 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-0020 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-0021 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-0022 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-0023 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-0024 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-0025 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-0028 - https://huntr.dev/bounties/bfd935f4-2d1d-4d3f-8b59-522abe7dd065
|
|
CVE-2023-0029 - https://vuldb.com/?id.217169
|
|
CVE-2023-0045 - https://github.com/google/security-research/security/advisories/GHSA-9x5g-vmxf-4qj8
|
|
CVE-2023-0046 - https://huntr.dev/bounties/2214dc41-f283-4342-95b1-34a2f4fea943
|
|
CVE-2023-0048 - https://huntr.dev/bounties/57abd666-4b9c-4f59-825d-1ec832153e79
|
|
CVE-2023-0049 - https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9
|
|
CVE-2023-0051 - https://huntr.dev/bounties/1c8686db-baa6-42dc-ba45-aed322802de9
|
|
CVE-2023-0054 - https://huntr.dev/bounties/b289ee0f-fd16-4147-bd01-c6289c45e49d
|
|
CVE-2023-0055 - https://huntr.dev/bounties/ed88e240-99ff-48a1-bf32-8e1ef5f13cce
|
|
CVE-2023-0057 - https://huntr.dev/bounties/12b64f91-d048-490c-94b0-37514b6d694d
|
|
CVE-2023-0099 - http://packetstormsecurity.com/files/176983/WordPress-Simple-URLs-Cross-Site-Scripting.html
|
|
CVE-2023-0106 - https://huntr.dev/bounties/5c0809cb-f4ff-4447-bed6-b5625fb374bb
|
|
CVE-2023-0107 - https://huntr.dev/bounties/0b28fa57-acb0-47c8-ac48-962ff3898156
|
|
CVE-2023-0108 - https://huntr.dev/bounties/f66d33df-6588-4ab4-80a0-847451517944
|
|
CVE-2023-0111 - https://huntr.dev/bounties/70da256c-977a-487e-8a6a-9ae22caedbe3
|
|
CVE-2023-0112 - https://huntr.dev/bounties/ec2a29dc-79a3-44bd-a58b-15f676934af6
|
|
CVE-2023-0113 - https://vuldb.com/?id.217591
|
|
CVE-2023-0114 - https://vuldb.com/?id.217592
|
|
CVE-2023-0122 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=da0342a3aa0357795224e6283df86444e1117168
|
|
CVE-2023-0125 - https://vuldb.com/?id.217717
|
|
CVE-2023-0155 - https://gitlab.com/gitlab-org/gitlab/-/issues/387638
|
|
CVE-2023-0160 - https://lore.kernel.org/all/CABcoxUayum5oOqFMMqAeWuS8+EzojquSOSyDA3J_2omY=2EeAg@mail.gmail.com/
|
|
CVE-2023-0164 - https://fluidattacks.com/advisories/queen/
|
|
CVE-2023-0179 - http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html
|
|
CVE-2023-0179 - https://seclists.org/oss-sec/2023/q1/20
|
|
CVE-2023-0210 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit
|
|
CVE-2023-0210 - https://securityonline.info/cve-2023-0210-flaw-in-linux-kernel-allows-unauthenticated-remote-dos-attacks/
|
|
CVE-2023-0210 - https://www.openwall.com/lists/oss-security/2023/01/04/1
|
|
CVE-2023-0214 - https://kcm.trellix.com/corporate/index?page=content&id=SB10393
|
|
CVE-2023-0221 - https://kcm.trellix.com/corporate/index?page=content&id=SB10370
|
|
CVE-2023-0227 - https://huntr.dev/bounties/af3101d7-fea6-463a-b7e4-a48be219e31b
|
|
CVE-2023-0236 - https://wpscan.com/vulnerability/503835db-426d-4b49-85f7-c9a20d6ff5b8
|
|
CVE-2023-0243 - https://github.com/yeyinshi/tuzicms/issues/12
|
|
CVE-2023-0244 - https://github.com/yeyinshi/tuzicms/issues/13
|
|
CVE-2023-0244 - https://vuldb.com/?id.218152
|
|
CVE-2023-0247 - https://huntr.dev/bounties/cab50e44-0995-4ac1-a5d5-889293b9704f
|
|
CVE-2023-0285 - https://wpscan.com/vulnerability/adf09e29-baf5-4426-a281-6763c107d348
|
|
CVE-2023-0288 - https://huntr.dev/bounties/550a0852-9be0-4abe-906c-f803b34e41d3
|
|
CVE-2023-0289 - https://huntr.dev/bounties/b9584c87-60e8-4a03-9e79-5f1e2d595361
|
|
CVE-2023-0291 - https://packetstormsecurity.com/files/171011/wpqsm808-xsrf.txt
|
|
CVE-2023-0292 - https://packetstormsecurity.com/files/171011/wpqsm808-xsrf.txt
|
|
CVE-2023-0297 - http://packetstormsecurity.com/files/171096/pyLoad-js2py-Python-Execution.html
|
|
CVE-2023-0297 - http://packetstormsecurity.com/files/172914/PyLoad-0.5.0-Remote-Code-Execution.html
|
|
CVE-2023-0297 - https://huntr.dev/bounties/3fd606f7-83e1-4265-b083-2e1889a05e65
|
|
CVE-2023-0298 - https://huntr.dev/bounties/9689052c-c1d7-4aae-aa08-346c9b6e04ed
|
|
CVE-2023-0299 - https://huntr.dev/bounties/0049774b-1857-46dc-a834-f1fb15138c53
|
|
CVE-2023-0300 - https://huntr.dev/bounties/0a91fec7-a76e-4ca3-80ba-81de1f10d59d
|
|
CVE-2023-0301 - https://huntr.dev/bounties/8a91e127-2903-4c6b-9a66-e4d2e30f8dec
|
|
CVE-2023-0302 - https://huntr.dev/bounties/583133af-7ae6-4a21-beef-a4b0182cf82e
|
|
CVE-2023-0306 - https://huntr.dev/bounties/cbba22f0-89ed-4d01-81ea-744979c8cbde
|
|
CVE-2023-0307 - https://huntr.dev/bounties/fac01e9f-e3e5-4985-94ad-59a76485f215
|
|
CVE-2023-0308 - https://huntr.dev/bounties/83cfed62-af8b-4aaa-94f2-5a33dc0c2d69
|
|
CVE-2023-0309 - https://huntr.dev/bounties/c03c5925-43ff-450d-9827-2b65a3307ed6
|
|
CVE-2023-0310 - https://huntr.dev/bounties/051d5e20-7fab-4769-bd7d-d986b804bb5a
|
|
CVE-2023-0311 - https://huntr.dev/bounties/82b0b629-c56b-4651-af3f-17f749751857
|
|
CVE-2023-0312 - https://huntr.dev/bounties/f50ec8d1-cd60-4c2d-9ab8-3711870d83b9
|
|
CVE-2023-0313 - https://huntr.dev/bounties/bc27e84b-1f91-4e1b-a78c-944edeba8256
|
|
CVE-2023-0314 - https://huntr.dev/bounties/eac0a9d7-9721-4191-bef3-d43b0df59c67
|
|
CVE-2023-0315 - http://packetstormsecurity.com/files/171108/Froxlor-2.0.6-Remote-Command-Execution.html
|
|
CVE-2023-0315 - http://packetstormsecurity.com/files/171729/Froxlor-2.0.3-Stable-Remote-Code-Execution.html
|
|
CVE-2023-0315 - https://huntr.dev/bounties/ff4e177b-ba48-4913-bbfa-ab8ce0db5943
|
|
CVE-2023-0316 - https://huntr.dev/bounties/c190e42a-4806-47aa-aa1e-ff5d6407e244
|
|
CVE-2023-0321 - https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html
|
|
CVE-2023-0323 - https://huntr.dev/bounties/129d6a4b-0504-4de1-a72c-3f12c4552343
|
|
CVE-2023-0324 - https://vuldb.com/?id.218426
|
|
CVE-2023-0326 - https://gitlab.com/gitlab-org/gitlab/-/issues/388132
|
|
CVE-2023-0329 - http://packetstormsecurity.com/files/175639/Elementor-Website-Builder-SQL-Injection.html
|
|
CVE-2023-0332 - https://vuldb.com/?id.218472
|
|
CVE-2023-0341 - https://litios.github.io/2023/01/14/CVE-2023-0341.html
|
|
CVE-2023-0358 - https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355
|
|
CVE-2023-0386 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
|
|
CVE-2023-0386 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a
|
|
CVE-2023-0391 - https://www.bleepingcomputer.com/news/security/cloudpanel-installations-use-the-same-ssl-certificate-private-key/
|
|
CVE-2023-0394 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
|
|
CVE-2023-0398 - https://huntr.dev/bounties/0a852351-00ed-44d2-a650-9055b7beed58
|
|
CVE-2023-0400 - https://kcm.trellix.com/corporate/index?page=content&id=SB10394&locale=en_US
|
|
CVE-2023-0406 - https://huntr.dev/bounties/d7007f76-3dbc-48a7-a2fb-377040fe100c
|
|
CVE-2023-0410 - https://huntr.dev/bounties/2da583f0-7f66-4ba7-9bed-8e7229aa578e
|
|
CVE-2023-0419 - https://wpscan.com/vulnerability/5ccfee43-920d-4613-b976-2ea8966696ba
|
|
CVE-2023-0432 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-033-05
|
|
CVE-2023-0433 - http://seclists.org/fulldisclosure/2023/Mar/21
|
|
CVE-2023-0433 - https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e
|
|
CVE-2023-0434 - https://huntr.dev/bounties/7d9332d8-6997-483b-9fb9-bcf2ae01dad4
|
|
CVE-2023-0435 - https://huntr.dev/bounties/a3e32ad5-caee-4f43-b10a-4a876d4e3f1d
|
|
CVE-2023-0438 - https://huntr.dev/bounties/07a5b61b-306d-47c4-8ff0-06c540c7dfb3
|
|
CVE-2023-0440 - https://huntr.dev/bounties/208a096f-7986-4eed-8629-b7285348a686
|
|
CVE-2023-0448 - https://www.tenable.com/security/research/tra-2023-3
|
|
CVE-2023-0455 - http://packetstormsecurity.com/files/172674/Bumsys-Business-Management-System-1.0.3-beta-Shell-Upload.html
|
|
CVE-2023-0455 - https://huntr.dev/bounties/b5e9c578-1a33-4745-bf6b-e7cdb89793f7
|
|
CVE-2023-0461 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
|
|
CVE-2023-0470 - https://huntr.dev/bounties/baae3180-b63b-4880-b2af-1a3f30056c2b
|
|
CVE-2023-0488 - https://huntr.dev/bounties/4311d8d7-682c-4f2a-b92c-3f9f1a36255a
|
|
CVE-2023-0491 - https://wpscan.com/vulnerability/b1a7e8fc-ffcf-493b-9f2d-ffa5d2348b60
|
|
CVE-2023-0493 - http://packetstormsecurity.com/files/171732/BTCPay-Server-1.7.4-HTML-Injection.html
|
|
CVE-2023-0493 - https://huntr.dev/bounties/3a73b45c-6f3e-4536-a327-cdfdbc59896f
|
|
CVE-2023-0509 - https://huntr.dev/bounties/a370e0c2-a41c-4871-ad91-bc6f31a8e839
|
|
CVE-2023-0512 - http://seclists.org/fulldisclosure/2023/Mar/21
|
|
CVE-2023-0512 - https://huntr.dev/bounties/de83736a-1936-4872-830b-f1e9b0ad2a74
|
|
CVE-2023-0513 - https://vuldb.com/?id.219334
|
|
CVE-2023-0519 - https://huntr.dev/bounties/891ad0cb-d12f-4c5e-aac8-d7326caf2129
|
|
CVE-2023-0527 - http://packetstormsecurity.com/files/172667/Online-Security-Guards-Hiring-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2023-0527 - https://github.com/ctflearner/Vulnerability/blob/main/Online-Security-guard-POC.md
|
|
CVE-2023-0528 - https://vuldb.com/?id.219597
|
|
CVE-2023-0531 - https://vuldb.com/?id.219600
|
|
CVE-2023-0532 - https://vuldb.com/?id.219601
|
|
CVE-2023-0533 - https://vuldb.com/?id.219602
|
|
CVE-2023-0549 - https://github.com/YAFNET/YAFNET/security/advisories/GHSA-4hwx-678w-9cp5
|
|
CVE-2023-0562 - https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/Bank%20Locker%20Management%20System-SQL%20.md
|
|
CVE-2023-0563 - https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/BLMS_XSS_IN_ADMIN_BROWSER.md
|
|
CVE-2023-0567 - https://github.com/php/php-src/security/advisories/GHSA-7fj2-8x79-rjf4
|
|
CVE-2023-0569 - https://huntr.dev/bounties/81b1e1da-10dd-435e-94ae-4bdd41df6df9
|
|
CVE-2023-0571 - https://github.com/ctflearner/Vulnerability/blob/main/Canteen%20Management%20System/Canteen_Management_System_XSS_IN_Add_Customer.md
|
|
CVE-2023-0571 - https://vuldb.com/?id.219730
|
|
CVE-2023-0587 - https://www.tenable.com/security/research/tra-2023-5
|
|
CVE-2023-0591 - https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/
|
|
CVE-2023-0592 - https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/
|
|
CVE-2023-0593 - https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/
|
|
CVE-2023-0597 - http://www.openwall.com/lists/oss-security/2023/07/28/1
|
|
CVE-2023-0606 - https://huntr.dev/bounties/0bfed46d-ac96-43c4-93fb-13f68b4e711b
|
|
CVE-2023-0608 - https://huntr.dev/bounties/02a86e0d-dff7-4e27-89d5-2f7dcd4b580c
|
|
CVE-2023-0609 - https://huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0
|
|
CVE-2023-0610 - https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926
|
|
CVE-2023-0611 - https://vuldb.com/?id.219935
|
|
CVE-2023-0612 - https://vuldb.com/?id.219936
|
|
CVE-2023-0617 - https://vuldb.com/?id.219957
|
|
CVE-2023-0638 - https://vuldb.com/?id.220018
|
|
CVE-2023-0641 - https://github.com/ctflearner/Vulnerability/blob/main/Employee%20Leaves%20Management%20System/ELMS.md
|
|
CVE-2023-0642 - https://huntr.dev/bounties/3bbdafe6-e152-47bb-88a7-fd031725323d
|
|
CVE-2023-0643 - https://huntr.dev/bounties/ea90f8b9-d8fe-4432-9a52-4d663400c52f
|
|
CVE-2023-0647 - https://github.com/Ha0Liu/cveAdd/blob/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0kickPlayer%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/Dst-admin%201.5.0%20background%20kickPlayer%20interface%20remote%20command%20execution.md
|
|
CVE-2023-0650 - https://github.com/YAFNET/YAFNET/security/advisories/GHSA-mg6p-jjff-7g5m
|
|
CVE-2023-0663 - https://vuldb.com/?id.220175
|
|
CVE-2023-0666 - https://gitlab.com/wireshark/wireshark/-/issues/19085
|
|
CVE-2023-0666 - https://takeonme.org/cves/CVE-2023-0666.html
|
|
CVE-2023-0667 - https://gitlab.com/wireshark/wireshark/-/issues/19086
|
|
CVE-2023-0667 - https://takeonme.org/cves/CVE-2023-0667.html
|
|
CVE-2023-0668 - https://gitlab.com/wireshark/wireshark/-/issues/19087
|
|
CVE-2023-0668 - https://takeonme.org/cves/CVE-2023-0668.html
|
|
CVE-2023-0669 - http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html
|
|
CVE-2023-0669 - https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis
|
|
CVE-2023-0669 - https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html
|
|
CVE-2023-0671 - https://huntr.dev/bounties/c2a84917-7ac0-4169-81c1-b61e617023de
|
|
CVE-2023-0673 - https://vuldb.com/?id.220195
|
|
CVE-2023-0674 - https://github.com/boyi0508/xxl-job-explain/blob/main/README.md
|
|
CVE-2023-0675 - https://www.youtube.com/watch?v=eoPuINHWjHo
|
|
CVE-2023-0676 - https://huntr.dev/bounties/b72d4f0c-8a96-4b40-a031-7d469c6ab93b
|
|
CVE-2023-0677 - https://huntr.dev/bounties/d280ae81-a1c9-4a50-9aa4-f98f1f9fd2c0
|
|
CVE-2023-0679 - https://vuldb.com/?id.220220
|
|
CVE-2023-0698 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1693
|
|
CVE-2023-0732 - https://vuldb.com/?id.220369
|
|
CVE-2023-0734 - https://huntr.dev/bounties/a296324c-6925-4f5f-a729-39b0d73d5b8b
|
|
CVE-2023-0736 - https://huntr.dev/bounties/7e6f9614-6a96-4295-83f0-06a240be844e
|
|
CVE-2023-0738 - https://fluidattacks.com/advisories/eilish/
|
|
CVE-2023-0739 - https://huntr.dev/bounties/93d7fac9-50be-4624-9096-45b89fbfd4ae
|
|
CVE-2023-0740 - https://huntr.dev/bounties/802ee76d-fe01-482b-a9a4-34699a7c9110
|
|
CVE-2023-0741 - https://huntr.dev/bounties/78233bfa-871d-45e1-815f-dee73e397809
|
|
CVE-2023-0742 - https://huntr.dev/bounties/d73a2c03-7035-453b-9c04-c733ace65544
|
|
CVE-2023-0743 - https://huntr.dev/bounties/366cf8bb-19f6-4388-b089-d0a260efd863
|
|
CVE-2023-0744 - http://packetstormsecurity.com/files/171733/Answerdev-1.0.3-Account-Takeover.html
|
|
CVE-2023-0744 - https://huntr.dev/bounties/35a0e12f-1d54-4fc0-8779-6a4949b7c434
|
|
CVE-2023-0747 - https://huntr.dev/bounties/7830b9b4-af2e-44ef-8b00-ee2491d4e7ff
|
|
CVE-2023-0748 - https://huntr.dev/bounties/1a0403b6-9ec9-4587-b559-b1afba798c86
|
|
CVE-2023-0756 - https://gitlab.com/gitlab-org/gitlab/-/issues/390910
|
|
CVE-2023-0758 - https://vuldb.com/?id.220469
|
|
CVE-2023-0759 - https://huntr.dev/bounties/49e2cccc-bb56-4633-ba6a-b3803e251347
|
|
CVE-2023-0760 - https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21
|
|
CVE-2023-0770 - https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd
|
|
CVE-2023-0771 - https://huntr.dev/bounties/2493f350-271b-4c38-9e1d-c8fa189c5ce1
|
|
CVE-2023-0774 - https://www.youtube.com/watch?v=s3oK5jebx_I
|
|
CVE-2023-0777 - http://packetstormsecurity.com/files/171744/modoboa-2.0.4-Admin-Takeover.html
|
|
CVE-2023-0777 - https://huntr.dev/bounties/a17e7a9f-0fee-4130-a522-5a0466fc17c7
|
|
CVE-2023-0779 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-9xj8-6989-r549
|
|
CVE-2023-0780 - https://huntr.dev/bounties/801efd0b-404b-4670-961a-12a986252fa4
|
|
CVE-2023-0782 - https://github.com/jingping911/tendaAC23overflow/blob/main/README.md
|
|
CVE-2023-0783 - https://vuldb.com/?id.220641
|
|
CVE-2023-0784 - https://vuldb.com/?id.220644
|
|
CVE-2023-0787 - https://huntr.dev/bounties/87397c71-7b84-4617-a66e-fa6c73be9024
|
|
CVE-2023-0789 - https://huntr.dev/bounties/d9375178-2f23-4f5d-88bd-bba3d6ba7cc5
|
|
CVE-2023-0790 - https://huntr.dev/bounties/06af150b-b481-4248-9a48-56ded2814156
|
|
CVE-2023-0793 - https://huntr.dev/bounties/b3881a1f-2f1e-45cb-86f3-735f66e660e9
|
|
CVE-2023-0794 - https://huntr.dev/bounties/949975f1-271d-46aa-85e5-1a013cdb5efb
|
|
CVE-2023-0795 - https://gitlab.com/libtiff/libtiff/-/issues/493
|
|
CVE-2023-0796 - https://gitlab.com/libtiff/libtiff/-/issues/499
|
|
CVE-2023-0797 - https://gitlab.com/libtiff/libtiff/-/issues/495
|
|
CVE-2023-0798 - https://gitlab.com/libtiff/libtiff/-/issues/492
|
|
CVE-2023-0799 - https://gitlab.com/libtiff/libtiff/-/issues/494
|
|
CVE-2023-0800 - https://gitlab.com/libtiff/libtiff/-/issues/496
|
|
CVE-2023-0801 - https://gitlab.com/libtiff/libtiff/-/issues/498
|
|
CVE-2023-0802 - https://gitlab.com/libtiff/libtiff/-/issues/500
|
|
CVE-2023-0803 - https://gitlab.com/libtiff/libtiff/-/issues/501
|
|
CVE-2023-0804 - https://gitlab.com/libtiff/libtiff/-/issues/497
|
|
CVE-2023-0810 - https://huntr.dev/bounties/a48414ea-63d9-453c-b3f3-2c927b71ec68
|
|
CVE-2023-0817 - https://huntr.dev/bounties/cb730bc5-d79c-4de6-9e57-10e8c3ce2cf3
|
|
CVE-2023-0818 - https://huntr.dev/bounties/038e7472-f3e9-46c2-9aea-d6dafb62a18a
|
|
CVE-2023-0819 - https://huntr.dev/bounties/35793610-dccc-46c8-9f55-6a24c621e4ef
|
|
CVE-2023-0827 - https://huntr.dev/bounties/75bc7d07-46a7-4ed9-a405-af4fc47fb422
|
|
CVE-2023-0841 - https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3
|
|
CVE-2023-0848 - https://vuldb.com/?id.221147
|
|
CVE-2023-0860 - https://huntr.dev/bounties/64f3ab93-1357-4468-8ff4-52bbcec18cca
|
|
CVE-2023-0866 - https://huntr.dev/bounties/7d3c5792-d20b-4cb6-9c6d-bb14f3430d7f
|
|
CVE-2023-0877 - https://huntr.dev/bounties/b29cf038-06f1-4fb0-9437-08f2991f92a8
|
|
CVE-2023-0878 - https://huntr.dev/bounties/a892caf7-b8c2-4638-8cee-eb779d51066a
|
|
CVE-2023-0879 - https://huntr.dev/bounties/9464e3c6-961d-4e23-8b3d-07cbb31de541
|
|
CVE-2023-0880 - https://huntr.dev/bounties/14fc4841-0f5d-4e12-bf9e-1b60d2ac6a6c
|
|
CVE-2023-0887 - https://vuldb.com/?id.221351
|
|
CVE-2023-0888 - https://www.bbraun.com/productsecurity
|
|
CVE-2023-0888 - https://www.bbraunusa.com/productsecurity
|
|
CVE-2023-0897 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
|
|
CVE-2023-0901 - https://huntr.dev/bounties/0327b1b2-6e7c-4154-a307-15f236571010
|
|
CVE-2023-0902 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Simple%20Food%20Ordering%20System%20-%20Authenticated%20Reflected%20XSS.md
|
|
CVE-2023-0903 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection.md
|
|
CVE-2023-0904 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection%20-%202.md
|
|
CVE-2023-0905 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20Broken%20Authentication.md
|
|
CVE-2023-0907 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0907
|
|
CVE-2023-0908 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0908
|
|
CVE-2023-0912 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%201.md
|
|
CVE-2023-0913 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%202.md
|
|
CVE-2023-0914 - https://huntr.dev/bounties/54d5fd76-e038-4eda-9e03-d5e95e09c0ec
|
|
CVE-2023-0915 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%203.md
|
|
CVE-2023-0916 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20Broken%20Access%20Control.md
|
|
CVE-2023-0916 - https://vuldb.com/?id.221491
|
|
CVE-2023-0919 - https://huntr.dev/bounties/3c514923-473f-4c50-ae0d-d002a41fe70f
|
|
CVE-2023-0938 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%201.md
|
|
CVE-2023-0943 - https://vuldb.com/?id.221591
|
|
CVE-2023-0947 - https://huntr.dev/bounties/7379d702-72ff-4a5d-bc68-007290015496
|
|
CVE-2023-0949 - https://huntr.dev/bounties/ef87be4e-493b-4ee9-9738-44c55b8acc19
|
|
CVE-2023-0961 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%202.md
|
|
CVE-2023-0962 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%203.md
|
|
CVE-2023-0962 - https://vuldb.com/?id.221632
|
|
CVE-2023-0963 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20Broken%20Access%20Control.md
|
|
CVE-2023-0964 - https://vuldb.com/?id.221634
|
|
CVE-2023-0975 - https://kcm.trellix.com/corporate/index?page=content&id=SB10396
|
|
CVE-2023-0976 - https://kcm.trellix.com/corporate/index?page=content&id=SB10398
|
|
CVE-2023-0977 - https://kcm.trellix.com/corporate/index?page=content&id=SB10396
|
|
CVE-2023-0978 - https://kcm.trellix.com/corporate/index?page=content&id=SB10397
|
|
CVE-2023-0994 - https://huntr.dev/bounties/a281c586-9b97-4d17-88ff-ca91bb4c45ad
|
|
CVE-2023-0995 - https://huntr.dev/bounties/2847b92b-22c2-4dbc-a9d9-56a7cd12fe5f
|
|
CVE-2023-0999 - https://github.com/1MurasaKi/STMS_CSRF/blob/main/README.md
|
|
CVE-2023-0999 - https://vuldb.com/?id.221734
|
|
CVE-2023-1003 - https://github.com/typora/typora-issues/issues/5623
|
|
CVE-2023-1004 - https://github.com/marktext/marktext/issues/3575
|
|
CVE-2023-1005 - https://github.com/JP1016/Markdown-Electron/issues/3
|
|
CVE-2023-1006 - https://vuldb.com/?id.221739
|
|
CVE-2023-1007 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1007
|
|
CVE-2023-1008 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1008
|
|
CVE-2023-1009 - https://github.com/xxy1126/Vuln/blob/main/Draytek/1.md
|
|
CVE-2023-1010 - https://github.com/10cksYiqiyinHangzhouTechnology/vox2png/blob/main/README.md
|
|
CVE-2023-1021 - https://wpscan.com/vulnerability/91d04f96-11b2-46dc-860c-dc6c26360bf3
|
|
CVE-2023-1030 - https://github.com/jidle123/bug_report/blob/main/vendors/winex01/Online%20Boat%20Reservation%20System/XSS-1.md#online-boat-reservation-system-v10-by-winex01-has-cross-site-scripting-reflected
|
|
CVE-2023-1031 - https://fluidattacks.com/advisories/napoli
|
|
CVE-2023-1032 - https://ubuntu.com/security/notices/USN-6024-1
|
|
CVE-2023-1032 - https://ubuntu.com/security/notices/USN-6033-1
|
|
CVE-2023-1033 - https://huntr.dev/bounties/ba3cd929-8b60-4d8d-b77d-f28409ecf387
|
|
CVE-2023-1034 - https://huntr.dev/bounties/0c1365bc-8d9a-4ae0-8b55-615d492b3730
|
|
CVE-2023-1036 - https://github.com/nightcloudos/bug_report/blob/main/vendors/jkev/Dental%20Clinic%20Appointment%20Reservation%20System/XSS-1.md
|
|
CVE-2023-1037 - https://github.com/nightcloudos/bug_report/blob/main/vendors/jkev/Dental%20Clinic%20Appointment%20Reservation%20System/SQLi-1.md
|
|
CVE-2023-1037 - https://vuldb.com/?id.221795
|
|
CVE-2023-1044 - https://vuldb.com/?id.221803
|
|
CVE-2023-1063 - https://vuldb.com/?id.221827
|
|
CVE-2023-1067 - https://huntr.dev/bounties/31d17b34-f80d-49f2-86e7-97ae715cc045
|
|
CVE-2023-1070 - https://huntr.dev/bounties/318bfdc4-7782-4979-956f-9ba2cc44889c
|
|
CVE-2023-1090 - https://github.com/youki992/youki992.github.io/blob/master/others/apply.md
|
|
CVE-2023-1094 - https://fluidattacks.com/advisories/napoli
|
|
CVE-2023-1103 - https://huntr.dev/bounties/4c5a8af6-3078-4180-bb30-33b57a5540e6
|
|
CVE-2023-1104 - https://huntr.dev/bounties/a4909b4e-ab3c-41d6-b0d8-1c6e933bf758
|
|
CVE-2023-1105 - https://huntr.dev/bounties/4089a63f-cffd-42f3-b8d8-e80b6bd9c80f
|
|
CVE-2023-1106 - https://huntr.dev/bounties/1288ec00-f69d-4b84-abce-efc9a97941a0
|
|
CVE-2023-1107 - https://huntr.dev/bounties/4b880868-bd28-4fd0-af56-7686e55d3762
|
|
CVE-2023-1115 - https://huntr.dev/bounties/cfa80332-e4cf-4d64-b3e5-e10298628d17
|
|
CVE-2023-1116 - https://huntr.dev/bounties/3245ff99-9adf-4db9-af94-f995747e09d1
|
|
CVE-2023-1127 - https://huntr.dev/bounties/2d4d309e-4c96-415f-9070-36d0815f1beb
|
|
CVE-2023-1131 - https://vuldb.com/?id.222106
|
|
CVE-2023-1133 - http://packetstormsecurity.com/files/172799/Delta-Electronics-InfraSuite-Device-Master-Deserialization.html
|
|
CVE-2023-1146 - https://huntr.dev/bounties/d6d1e1e2-2f67-4d28-aa84-b30fb1d2e737
|
|
CVE-2023-1147 - https://huntr.dev/bounties/187f5353-f866-4d26-a5ba-fca378520020
|
|
CVE-2023-1148 - https://huntr.dev/bounties/f0cc2c4b-fdf9-483b-9a83-4e0dfeb4dac7
|
|
CVE-2023-1149 - https://huntr.dev/bounties/2e734209-d7b0-4f57-a8be-c65c82208f2f
|
|
CVE-2023-1151 - https://vuldb.com/?id.222163
|
|
CVE-2023-1157 - https://github.com/10cksYiqiyinHangzhouTechnology/elf-parser_segments_poc
|
|
CVE-2023-1160 - https://huntr.dev/bounties/3ce480dc-1b1c-4230-9287-0dc3b31c2f87
|
|
CVE-2023-1162 - https://github.com/xxy1126/Vuln/blob/main/Draytek/2.md
|
|
CVE-2023-1163 - https://github.com/xxy1126/Vuln/blob/main/Draytek/3.md
|
|
CVE-2023-1163 - https://vuldb.com/?id.222259
|
|
CVE-2023-1164 - https://github.com/i900008/vulndb/blob/main/kylin-activation_vuln.md
|
|
CVE-2023-1170 - https://huntr.dev/bounties/286e0090-e654-46d2-ac60-29f81799d0a4
|
|
CVE-2023-1175 - https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e
|
|
CVE-2023-1176 - https://huntr.dev/bounties/ae92f814-6a08-435c-8445-eec0ef4f1085
|
|
CVE-2023-1177 - https://huntr.dev/bounties/1fe8f21a-c438-4cba-9add-e8a5dab94e28
|
|
CVE-2023-1178 - https://gitlab.com/gitlab-org/gitlab/-/issues/381815
|
|
CVE-2023-1181 - https://huntr.dev/bounties/f5cb8816-fc12-4282-9571-81f25670e04a
|
|
CVE-2023-1183 - http://www.openwall.com/lists/oss-security/2023/12/28/4
|
|
CVE-2023-1183 - http://www.openwall.com/lists/oss-security/2024/01/03/4
|
|
CVE-2023-1186 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1186
|
|
CVE-2023-1187 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1187
|
|
CVE-2023-1188 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1188
|
|
CVE-2023-1189 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1189
|
|
CVE-2023-1189 - https://vuldb.com/?id.222361
|
|
CVE-2023-1190 - https://github.com/10cksYiqiyinHangzhouTechnology/imageinfo_poc
|
|
CVE-2023-1190 - https://github.com/xiaozhuai/imageinfo/issues/1
|
|
CVE-2023-1197 - https://huntr.dev/bounties/97d226ea-2cd8-4f4d-9360-aa46c37fdd26
|
|
CVE-2023-1200 - https://vuldb.com/?id.222388
|
|
CVE-2023-1211 - https://huntr.dev/bounties/ed569124-2aeb-4b0d-a312-435460892afd
|
|
CVE-2023-1212 - https://huntr.dev/bounties/3d5199d6-9bb2-4f7b-bd81-bded704da499
|
|
CVE-2023-1219 - http://packetstormsecurity.com/files/171795/Chrome-base-debug-ActivityUserData-ActivityUserData-Heap-Buffer-Overflow.html
|
|
CVE-2023-1220 - http://packetstormsecurity.com/files/171796/Chrome-base-SampleVectorBase-MoveSingleSampleToCounts-Heap-Buffer-Overflow.html
|
|
CVE-2023-1238 - https://huntr.dev/bounties/52f97267-1439-4bb6-862b-89b8fafce50d
|
|
CVE-2023-1239 - https://huntr.dev/bounties/3a22c609-d2d8-4613-815d-58f5990b8bd8
|
|
CVE-2023-1241 - https://huntr.dev/bounties/e0e9b1bb-3025-4b9f-acb4-16a5da28aa3c
|
|
CVE-2023-1242 - https://huntr.dev/bounties/71c24c5e-ceb2-45cf-bda7-fa195d37e289
|
|
CVE-2023-1243 - https://huntr.dev/bounties/1d62d35a-b096-4b76-a021-347c3f1c570c
|
|
CVE-2023-1244 - https://huntr.dev/bounties/bcab9555-8a35-42b2-a7de-0a79fd710b52
|
|
CVE-2023-1245 - https://huntr.dev/bounties/f8011bb3-8212-4937-aa58-79f4b73be004
|
|
CVE-2023-1247 - https://huntr.dev/bounties/04447124-c7d4-477f-8364-91fe5b59cda0
|
|
CVE-2023-1249 - http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html
|
|
CVE-2023-1258 - http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html
|
|
CVE-2023-1264 - https://huntr.dev/bounties/b2989095-88f3-413a-9a39-c1c58a6e6815
|
|
CVE-2023-1265 - https://gitlab.com/gitlab-org/gitlab/-/issues/394960
|
|
CVE-2023-1270 - https://huntr.dev/bounties/ad1f917f-2b25-40ef-9215-c805354c683b
|
|
CVE-2023-1277 - https://github.com/cn-lwj/vuldb/blob/master/kylin-system-updater_vuln.md
|
|
CVE-2023-1277 - https://vuldb.com/?id.222600
|
|
CVE-2023-1281 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2
|
|
CVE-2023-1282 - https://wpscan.com/vulnerability/8a9548c5-59ea-46b0-bfa5-a0f7a259351a
|
|
CVE-2023-1283 - https://huntr.dev/bounties/63f1ff91-48f3-4886-a179-103f1ddd8ff8
|
|
CVE-2023-1286 - https://huntr.dev/bounties/31d97442-3f87-439f-83f0-1c7862ef0c7c
|
|
CVE-2023-1289 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr
|
|
CVE-2023-1304 - https://docs.divvycloud.com/changelog/23321-release-notes
|
|
CVE-2023-1305 - https://docs.divvycloud.com/changelog/23321-release-notes
|
|
CVE-2023-1306 - https://docs.divvycloud.com/changelog/23321-release-notes
|
|
CVE-2023-1307 - https://huntr.dev/bounties/5fe85af4-a667-41a9-a00d-f99e07c5e2f1
|
|
CVE-2023-1311 - https://vuldb.com/?id.222699
|
|
CVE-2023-1312 - https://huntr.dev/bounties/2a64a32d-b1cc-4def-91da-18040d59f356
|
|
CVE-2023-1313 - https://huntr.dev/bounties/f73eef49-004f-4b3b-9717-90525e65ba61
|
|
CVE-2023-1315 - https://huntr.dev/bounties/70a7fd8c-7e6f-4a43-9f8c-163b8967b16e
|
|
CVE-2023-1316 - https://huntr.dev/bounties/c6353bab-c382-47f6-937b-56d253f2e8d3
|
|
CVE-2023-1317 - https://huntr.dev/bounties/c3e27af2-358b-490b-9baf-e451663e4e5f
|
|
CVE-2023-1318 - https://huntr.dev/bounties/e58b38e0-4897-4bb0-84e8-a7ad8efab338
|
|
CVE-2023-1319 - https://huntr.dev/bounties/a822067a-d90d-4c3e-b9ef-9b2a5c2bc97f
|
|
CVE-2023-1320 - https://huntr.dev/bounties/c2bb34ac-452d-4624-a1b9-c5b54f52f0cd
|
|
CVE-2023-1326 - https://github.com/canonical/apport/commit/e5f78cc89f1f5888b6a56b785dddcb0364c48ecb
|
|
CVE-2023-1349 - https://vuldb.com/?id.222842
|
|
CVE-2023-1350 - https://github.com/lwindolf/liferea/commit/8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59
|
|
CVE-2023-1353 - https://vuldb.com/?id.222852
|
|
CVE-2023-1355 - https://huntr.dev/bounties/4d0a9615-d438-4f5c-8dd6-aa22f4b716d9
|
|
CVE-2023-1361 - https://huntr.dev/bounties/1b1dbc5a-df16-421f-9a0d-de83e43146c4
|
|
CVE-2023-1362 - https://huntr.dev/bounties/e5959166-c8ef-4ada-9bb1-0ff5a9693bac
|
|
CVE-2023-1367 - https://huntr.dev/bounties/16bc74e2-1825-451f-bff7-bfdc1ea75cc2
|
|
CVE-2023-1369 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1369
|
|
CVE-2023-1370 - https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/
|
|
CVE-2023-1372 - https://danielkelley.me/wh-testimonials-reflected-xss-vulnerability-via-wh-homepage-parameter-in-version-3-0-0-and-below/
|
|
CVE-2023-1374 - https://danielkelley.me/solidres-hotel-booking-plugin-for-wordpress-post-based-xss-vulnerability-in-add-new-currency-feature/
|
|
CVE-2023-1380 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
|
|
CVE-2023-1380 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
|
|
CVE-2023-1381 - https://blog.wpscan.com/uncovering-a-phar-deserialization-vulnerability-in-wp-meta-seo-and-escalating-to-rce/
|
|
CVE-2023-1383 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/
|
|
CVE-2023-1384 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/
|
|
CVE-2023-1385 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/
|
|
CVE-2023-1387 - https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j
|
|
CVE-2023-1388 - https://kcm.trellix.com/corporate/index?page=content&id=SB10398
|
|
CVE-2023-1389 - http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html
|
|
CVE-2023-1389 - https://www.tenable.com/security/research/tra-2023-11
|
|
CVE-2023-1390 - https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5
|
|
CVE-2023-1391 - https://blog.csdn.net/Dwayne_Wade/article/details/129526901
|
|
CVE-2023-1394 - https://blog.csdn.net/Dwayne_Wade/article/details/129522869
|
|
CVE-2023-1395 - https://blog.csdn.net/Dwayne_Wade/article/details/129496689
|
|
CVE-2023-1396 - https://blog.csdn.net/Dwayne_Wade/article/details/129524104
|
|
CVE-2023-1410 - https://github.com/grafana/bugbounty/security/advisories/GHSA-qrrg-gw7w-vp76
|
|
CVE-2023-1421 - https://mattermost.com/security-updates/
|
|
CVE-2023-1429 - https://huntr.dev/bounties/e0829fea-e458-47b8-84a3-a74476d9638f
|
|
CVE-2023-1436 - https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911/
|
|
CVE-2023-1442 - https://vuldb.com/?id.223287
|
|
CVE-2023-1443 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1443
|
|
CVE-2023-1444 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1444
|
|
CVE-2023-1445 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1445
|
|
CVE-2023-1446 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1446
|
|
CVE-2023-1448 - https://github.com/gpac/gpac/issues/2388
|
|
CVE-2023-1449 - https://github.com/gpac/gpac/issues/2387
|
|
CVE-2023-1450 - https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc
|
|
CVE-2023-1450 - https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc/blob/main/id_000005%2Csig_08%2Csrc_000166%2B000357%2Ctime_3137250%2Cexecs_3545598%2Cop_splice%2Crep_16
|
|
CVE-2023-1450 - https://vuldb.com/?id.223295
|
|
CVE-2023-1451 - https://github.com/RichTrouble/mp4v2_mp4track_poc
|
|
CVE-2023-1451 - https://github.com/RichTrouble/mp4v2_mp4track_poc/blob/main/id_000000%2Csig_08%2Csrc_001076%2Ctime_147809374%2Cexecs_155756872%2Cop_havoc%2Crep_8
|
|
CVE-2023-1452 - https://github.com/gpac/gpac/issues/2386
|
|
CVE-2023-1453 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1453
|
|
CVE-2023-1459 - https://vuldb.com/?id.223304
|
|
CVE-2023-1460 - https://vuldb.com/?id.223305
|
|
CVE-2023-1463 - https://huntr.dev/bounties/f6683c3b-a0f2-4615-b639-1920c8ae12e6
|
|
CVE-2023-1486 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1486
|
|
CVE-2023-1487 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1487
|
|
CVE-2023-1487 - https://vuldb.com/?id.223373
|
|
CVE-2023-1488 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1488
|
|
CVE-2023-1489 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1489
|
|
CVE-2023-1490 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1490
|
|
CVE-2023-1491 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1491
|
|
CVE-2023-1492 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1492
|
|
CVE-2023-1493 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1493
|
|
CVE-2023-1494 - https://gitee.com/cui-yiwei/cve-number/blob/master/images/IBOS%20oa%20v4.5.5.md/1.md
|
|
CVE-2023-1496 - https://huntr.dev/bounties/de603972-935a-401a-96fb-17ddadd282b2
|
|
CVE-2023-1515 - https://huntr.dev/bounties/ae0f2ec4-a245-4d0b-9d4d-bd8310dd6282
|
|
CVE-2023-1517 - https://huntr.dev/bounties/82adf0dd-8ebd-4d15-9f91-6060c8fa5a0d
|
|
CVE-2023-1523 - https://marc.info/?l=oss-security&m=167879021709955&w=2
|
|
CVE-2023-1527 - https://huntr.dev/bounties/f0272a31-9944-4545-8428-a26154d20348
|
|
CVE-2023-1531 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1724
|
|
CVE-2023-1532 - http://packetstormsecurity.com/files/171959/Chrome-media-mojom-VideoFrame-Missing-Validation.html
|
|
CVE-2023-1534 - http://packetstormsecurity.com/files/171961/Chrome-GL_ShaderBinary-Untrusted-Process-Exposure.html
|
|
CVE-2023-1534 - http://packetstormsecurity.com/files/171965/Chrome-SpvGetMappedSamplerName-Out-Of-Bounds-String-Copy.html
|
|
CVE-2023-1535 - https://huntr.dev/bounties/4d4b0caa-6d8c-4574-ae7e-e9ef5e2e1a40
|
|
CVE-2023-1536 - https://huntr.dev/bounties/538207f4-f805-419a-a314-51716643f05e
|
|
CVE-2023-1537 - https://huntr.dev/bounties/171cde18-a447-446c-a9ab-297953ad9b86
|
|
CVE-2023-1538 - https://huntr.dev/bounties/ac0271eb-660f-4966-8b57-4bc660a9a1a0
|
|
CVE-2023-1539 - https://huntr.dev/bounties/b4df67f4-14ea-4051-97d4-26690c979a28
|
|
CVE-2023-1540 - https://huntr.dev/bounties/d8d6c259-a0f2-4209-a3b0-ecbf3eb092f4
|
|
CVE-2023-1541 - https://huntr.dev/bounties/8fd891c6-b04e-4dac-818f-9ea30861cd92
|
|
CVE-2023-1542 - https://huntr.dev/bounties/d947417c-5a12-407a-9a2f-fa696f65126f
|
|
CVE-2023-1543 - https://huntr.dev/bounties/f82388d6-dfc3-4fbc-bea6-eb40cf5b2683
|
|
CVE-2023-1545 - https://huntr.dev/bounties/942c015f-7486-49b1-94ae-b1538d812bc2
|
|
CVE-2023-1546 - https://wpscan.com/vulnerability/bb065397-370f-4ee1-a2c8-20e4dc4415a0
|
|
CVE-2023-1560 - https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF
|
|
CVE-2023-1560 - https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/id8
|
|
CVE-2023-1560 - https://vuldb.com/?id.223553
|
|
CVE-2023-1562 - https://mattermost.com/security-updates/
|
|
CVE-2023-1568 - https://vuldb.com/?id.223560
|
|
CVE-2023-1570 - https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1
|
|
CVE-2023-1570 - https://github.com/syoyo/tinydng/issues/28
|
|
CVE-2023-1570 - https://github.com/syoyo/tinydng/issues/29
|
|
CVE-2023-1571 - https://vuldb.com/?id.223563
|
|
CVE-2023-1576 - https://sourceforge.net/p/p7zip/bugs/241/
|
|
CVE-2023-1578 - https://huntr.dev/bounties/7e441a14-8e55-4ab4-932c-4dc56bb1bc2e
|
|
CVE-2023-1579 - https://sourceware.org/bugzilla/show_bug.cgi?id=29988
|
|
CVE-2023-1585 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
|
CVE-2023-1586 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
|
CVE-2023-1587 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
|
CVE-2023-1590 - https://blog.csdn.net/weixin_43864034/article/details/129730106
|
|
CVE-2023-1594 - https://github.com/OYyunshen/Poc/blob/main/Novel-PlusV3.6.2Sqli.pdf
|
|
CVE-2023-1594 - https://vuldb.com/?id.223662
|
|
CVE-2023-1595 - https://github.com/1610349395/novel-plus-v3.6.2----Background-SQL-Injection-Vulnerability-/blob/main/novel-plus%20v3.6.2%20--%20Background%20SQL%20Injection%20Vulnerability.md
|
|
CVE-2023-1605 - https://huntr.dev/bounties/9dddcf5b-7dd4-46cc-abf9-172dce20bab2
|
|
CVE-2023-1606 - https://github.com/OYyunshen/Poc/blob/main/Novel-PlusSqli1.pdf
|
|
CVE-2023-1616 - https://vuldb.com/?id.223800
|
|
CVE-2023-1621 - https://gitlab.com/gitlab-org/gitlab/-/issues/399774
|
|
CVE-2023-1629 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1629
|
|
CVE-2023-1630 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1630
|
|
CVE-2023-1631 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1631
|
|
CVE-2023-1634 - https://github.com/BigTiger2020/2023-1/blob/main/ssrf/ssrf.md
|
|
CVE-2023-1634 - https://vuldb.com/?id.224016
|
|
CVE-2023-1635 - https://github.com/BigTiger2020/2023/blob/main/XSS.md
|
|
CVE-2023-1637 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463
|
|
CVE-2023-1638 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1638
|
|
CVE-2023-1639 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1639
|
|
CVE-2023-1640 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1640
|
|
CVE-2023-1641 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641
|
|
CVE-2023-1642 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1642
|
|
CVE-2023-1643 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643
|
|
CVE-2023-1644 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1644
|
|
CVE-2023-1645 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1645
|
|
CVE-2023-1646 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1646
|
|
CVE-2023-1647 - https://huntr.dev/bounties/d6de3d6e-9551-47d1-b28c-7e965c1b82b6
|
|
CVE-2023-1648 - https://gitlab.com/gitlab-org/gitlab/-/issues/388132
|
|
CVE-2023-1654 - https://huntr.dev/bounties/33652b56-128f-41a7-afcc-10641f69ff14
|
|
CVE-2023-1655 - https://huntr.dev/bounties/05f1d1de-bbfd-43fe-bdf9-7f73419ce7c9
|
|
CVE-2023-1665 - https://huntr.dev/bounties/db8fcbab-6ef0-44ba-b5c6-3b0f17ca22a2
|
|
CVE-2023-1671 - http://packetstormsecurity.com/files/172016/Sophos-Web-Appliance-4.3.10.4-Command-Injection.html
|
|
CVE-2023-1674 - https://vuldb.com/?id.224231
|
|
CVE-2023-1676 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1676
|
|
CVE-2023-1677 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1677
|
|
CVE-2023-1678 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1678
|
|
CVE-2023-1679 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1679
|
|
CVE-2023-1685 - https://vuldb.com/?id.224242
|
|
CVE-2023-1687 - https://vuldb.com/?id.224244
|
|
CVE-2023-1701 - https://huntr.dev/bounties/64f943c4-68e5-4ef8-82f6-9c4abe928256
|
|
CVE-2023-1702 - https://huntr.dev/bounties/d8a47f29-3297-4fce-b534-e1d95a2b3e19
|
|
CVE-2023-1704 - https://huntr.dev/bounties/84419c7b-ae29-401b-bdfd-5d0c498d320f
|
|
CVE-2023-1708 - https://gitlab.com/gitlab-org/gitlab/-/issues/387185
|
|
CVE-2023-1712 - https://huntr.dev/bounties/9a6b1fb4-ec9b-4cfa-af1e-9ce304924829
|
|
CVE-2023-1713 - https://starlabs.sg/advisories/23/23-1713/
|
|
CVE-2023-1714 - https://starlabs.sg/advisories/23/23-1714/
|
|
CVE-2023-1715 - https://starlabs.sg/advisories/23/23-1715/
|
|
CVE-2023-1717 - https://starlabs.sg/advisories/23/23-1717/
|
|
CVE-2023-1718 - https://starlabs.sg/advisories/23/23-1718/
|
|
CVE-2023-1719 - https://starlabs.sg/advisories/23/23-1719/
|
|
CVE-2023-1720 - https://starlabs.sg/advisories/23/23-1720/
|
|
CVE-2023-1721 - https://fluidattacks.com/advisories/blessd/
|
|
CVE-2023-1722 - https://fluidattacks.com/advisories/wyckoff/
|
|
CVE-2023-1729 - https://github.com/LibRaw/LibRaw/issues/557
|
|
CVE-2023-1741 - https://vuldb.com/?id.224629
|
|
CVE-2023-1742 - https://gitee.com/wkstestete/cve/blob/master/sql/ibos%20sql%20injection3.md
|
|
CVE-2023-1745 - https://github.com/10cksYiqiyinHangzhouTechnology/KMPlayer_Poc
|
|
CVE-2023-1745 - https://youtu.be/7bh2BQOqxFo
|
|
CVE-2023-1754 - https://huntr.dev/bounties/529f2361-eb2e-476f-b7ef-4e561a712e28
|
|
CVE-2023-1755 - https://huntr.dev/bounties/882ffa07-5397-4dbb-886f-4626859d711a
|
|
CVE-2023-1756 - https://huntr.dev/bounties/e495b443-b328-42f5-aed5-d68b929b4cb9
|
|
CVE-2023-1757 - https://huntr.dev/bounties/584a200a-6ff8-4d53-a3c0-e7893edff60c
|
|
CVE-2023-1758 - https://huntr.dev/bounties/0854328e-eb00-41a3-9573-8da8f00e369c
|
|
CVE-2023-1759 - https://huntr.dev/bounties/e8109aed-d364-4c0c-9545-4de0347b10e1
|
|
CVE-2023-1760 - https://huntr.dev/bounties/2d0ac48a-490d-4548-8d98-7447042dd1b5
|
|
CVE-2023-1762 - https://huntr.dev/bounties/3c2374cc-7082-44b7-a6a6-ccff7a650a3a
|
|
CVE-2023-1767 - https://weizman.github.io/2023/04/10/snyk-xss/
|
|
CVE-2023-1774 - https://mattermost.com/security-updates/
|
|
CVE-2023-1775 - https://mattermost.com/security-updates/
|
|
CVE-2023-1776 - https://mattermost.com/security-updates/
|
|
CVE-2023-1777 - https://mattermost.com/security-updates/
|
|
CVE-2023-1780 - https://wpscan.com/vulnerability/8176308f-f210-4109-9c88-9372415dbed3
|
|
CVE-2023-1783 - https://fluidattacks.com/advisories/stirling/
|
|
CVE-2023-1788 - https://huntr.dev/bounties/79323c9e-e0e5-48ef-bd19-d0b09587ccb2
|
|
CVE-2023-1789 - https://huntr.dev/bounties/2c3489f7-6b84-48f8-9368-9cea67cf373d
|
|
CVE-2023-1798 - https://gitee.com/wkstestete/cve/blob/master/xss/eyoucms%20xss.md
|
|
CVE-2023-1826 - http://packetstormsecurity.com/files/171790/Online-Computer-And-Laptop-Store-1.0-Shell-Upload.html
|
|
CVE-2023-1829 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28
|
|
CVE-2023-1831 - https://mattermost.com/security-updates/
|
|
CVE-2023-1836 - https://gitlab.com/gitlab-org/gitlab/-/issues/404613
|
|
CVE-2023-1841 - https://https://www.honeywell.com/us/en/product-security
|
|
CVE-2023-1850 - https://vuldb.com/?id.224990
|
|
CVE-2023-1856 - https://vuldb.com/?id.224995
|
|
CVE-2023-1872 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
|
|
CVE-2023-1874 - http://packetstormsecurity.com/files/171825/WordPress-WP-Data-Access-5.3.7-Privilege-Escalation.html
|
|
CVE-2023-1875 - https://huntr.dev/bounties/39715aaf-e798-4c60-97c4-45f4f2cd5c61
|
|
CVE-2023-1876 - https://huntr.dev/bounties/15b06488-5849-47ce-aaf4-81d4c3c202e2
|
|
CVE-2023-1877 - https://huntr.dev/bounties/71fe4b3b-20ac-448c-8191-7b99d7ffaf55
|
|
CVE-2023-1878 - https://huntr.dev/bounties/93f981a3-231d-460d-a239-bb960e8c2fdc
|
|
CVE-2023-1879 - https://huntr.dev/bounties/1dc7f818-c8ea-4f80-b000-31b48a426334
|
|
CVE-2023-1880 - https://huntr.dev/bounties/ece5f051-674e-4919-b998-594714910f9e
|
|
CVE-2023-1881 - https://huntr.dev/bounties/d5ebc2bd-8638-41c4-bf72-7c906c601344
|
|
CVE-2023-1882 - https://huntr.dev/bounties/8ab09a1c-cfd5-4ce0-aae3-d33c93318957
|
|
CVE-2023-1883 - https://huntr.dev/bounties/2f1e417d-cf64-4cfb-954b-3a9cb2f38191
|
|
CVE-2023-1884 - https://huntr.dev/bounties/dda73cb6-9344-4822-97a1-2e31efb6a73e
|
|
CVE-2023-1887 - https://huntr.dev/bounties/e4a58835-96b5-412c-a17e-3ceed30231e1
|
|
CVE-2023-1890 - http://packetstormsecurity.com/files/173727/WordPress-Tablesome-Cross-Site-Scripting.html
|
|
CVE-2023-1891 - https://wpscan.com/vulnerability/4e5d993f-cc20-4b5f-b4c8-c13004151828
|
|
CVE-2023-1892 - https://huntr.dev/bounties/e35e5653-c429-4fb8-94a3-cbc123ae4777
|
|
CVE-2023-1893 - http://packetstormsecurity.com/files/173723/WordPress-Login-Configurator-2.1-Cross-Site-Scripting.html
|
|
CVE-2023-1893 - https://wpscan.com/vulnerability/dbe6cf09-971f-42e9-b744-9339454168c7
|
|
CVE-2023-1900 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
|
CVE-2023-1903 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-1906 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-35q2-86c7-9247
|
|
CVE-2023-1912 - http://packetstormsecurity.com/files/171824/WordPress-Limit-Login-Attempts-1.7.1-Cross-Site-Scripting.html
|
|
CVE-2023-1916 - https://gitlab.com/libtiff/libtiff/-/issues/537
|
|
CVE-2023-1934 - http://packetstormsecurity.com/files/172511/PnPSCADA-2.x-SQL-Injection.html
|
|
CVE-2023-1936 - https://gitlab.com/gitlab-org/gitlab/-/issues/405150
|
|
CVE-2023-1947 - https://gitee.com/misak7in/cve/blob/master/taocms.md
|
|
CVE-2023-1956 - https://vuldb.com/?id.225343
|
|
CVE-2023-1960 - https://vuldb.com/?id.225347
|
|
CVE-2023-1965 - https://gitlab.com/gitlab-org/gitlab/-/issues/406235
|
|
CVE-2023-1974 - https://huntr.dev/bounties/852781c6-9cc8-4d25-9336-bf3cb8ee3439
|
|
CVE-2023-1985 - https://vuldb.com/?id.225533
|
|
CVE-2023-1988 - https://vuldb.com/?id.225536
|
|
CVE-2023-1998 - https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx
|
|
CVE-2023-20009 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-privesc-9DVkFpJ8
|
|
CVE-2023-2002 - https://www.openwall.com/lists/oss-security/2023/04/16/3
|
|
CVE-2023-20024 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
|
CVE-2023-20025 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5
|
|
CVE-2023-20026 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5
|
|
CVE-2023-2003 - https://www.hackplayers.com/2023/07/vulnerabilidad-vision1210-unitronics.html
|
|
CVE-2023-20032 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy
|
|
CVE-2023-2004 - https://bugzilla.redhat.com/show_bug.cgi?id=2186428
|
|
CVE-2023-20046 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-j7p3-gjw6-pp4r
|
|
CVE-2023-20046 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h
|
|
CVE-2023-20065 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-qrpq-fp26-7v9r
|
|
CVE-2023-20065 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-priv-escalate-Xg8zkyPk
|
|
CVE-2023-20075 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-privesc-9DVkFpJ8
|
|
CVE-2023-20098 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-5j43-q336-92ch
|
|
CVE-2023-20116 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-dos-4Ag3yWbD
|
|
CVE-2023-20118 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5
|
|
CVE-2023-2014 - https://huntr.dev/bounties/a77bf7ed-6b61-452e-b5ee-e20017e28d1a
|
|
CVE-2023-20156 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
|
CVE-2023-20157 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
|
CVE-2023-20158 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
|
CVE-2023-20159 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
|
CVE-2023-20160 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
|
CVE-2023-20161 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
|
CVE-2023-20162 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
|
CVE-2023-2017 - https://starlabs.sg/advisories/23/23-2017/
|
|
CVE-2023-20178 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-csc-privesc-wx4U4Kw
|
|
CVE-2023-20189 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
|
CVE-2023-20197 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee
|
|
CVE-2023-20198 - http://packetstormsecurity.com/files/175674/Cisco-IOX-XE-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2023-20198 - https://www.darkreading.com/vulnerabilities-threats/critical-unpatched-cisco-zero-day-bug-active-exploit
|
|
CVE-2023-20209 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-injection-X475EbTQ
|
|
CVE-2023-2021 - https://huntr.dev/bounties/2e31082d-7aeb-46ff-84d6-9561758e3bf0
|
|
CVE-2023-20211 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-injection-g6MbwH2
|
|
CVE-2023-20217 - http://packetstormsecurity.com/files/174232/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Read.html
|
|
CVE-2023-20217 - http://seclists.org/fulldisclosure/2023/Aug/19
|
|
CVE-2023-2022 - https://gitlab.com/gitlab-org/gitlab/-/issues/407166
|
|
CVE-2023-20224 - http://packetstormsecurity.com/files/174233/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Privilege-Escalation.html
|
|
CVE-2023-20224 - http://seclists.org/fulldisclosure/2023/Aug/20
|
|
CVE-2023-20235 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rdocker-uATbukKn
|
|
CVE-2023-20273 - http://packetstormsecurity.com/files/175674/Cisco-IOX-XE-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2023-2029 - http://packetstormsecurity.com/files/173729/WordPress-PrePost-SEO-3.0-Cross-Site-Scripting.html
|
|
CVE-2023-2034 - https://huntr.dev/bounties/aba6beaa-570e-4523-8128-da4d8e374ef6
|
|
CVE-2023-2035 - https://vuldb.com/?id.225913
|
|
CVE-2023-2036 - https://vuldb.com/?id.225914
|
|
CVE-2023-2037 - https://vuldb.com/?id.225915
|
|
CVE-2023-2042 - https://vuldb.com/?id.225920
|
|
CVE-2023-2050 - https://github.com/E1CHO/cve_hub/blob/main/Advanced%20Online%20Voting%20System/Advanced%20Online%20Voting%20System%20-%20vuln%204.pdf
|
|
CVE-2023-2051 - https://vuldb.com/?id.225936
|
|
CVE-2023-2054 - https://vuldb.com/?id.225939
|
|
CVE-2023-2055 - https://vuldb.com/?id.225940
|
|
CVE-2023-20569 - https://comsec.ethz.ch/research/microarch/inception/
|
|
CVE-2023-2057 - https://github.com/sleepyvv/vul_report/blob/main/EYOUCMS/XSS1.md
|
|
CVE-2023-2057 - https://vuldb.com/?id.225942
|
|
CVE-2023-2058 - https://github.com/sleepyvv/vul_report/blob/main/EYOUCMS/XSS2.md
|
|
CVE-2023-2058 - https://vuldb.com/?id.225943
|
|
CVE-2023-20593 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-20593 - http://www.openwall.com/lists/oss-security/2023/07/24/3
|
|
CVE-2023-2068 - http://packetstormsecurity.com/files/173735/WordPress-File-Manager-Advanced-Shortcode-2.3.2-Remote-Code-Execution.html
|
|
CVE-2023-2069 - https://gitlab.com/gitlab-org/gitlab/-/issues/407374
|
|
CVE-2023-2074 - https://github.com/E1CHO/cve_hub/blob/main/Online%20Traffic%20Offense%20Management%20System/Online%20Traffic%20Offense%20Management%20System%20-%20vuln%202.pdf
|
|
CVE-2023-2074 - https://vuldb.com/?id.226052
|
|
CVE-2023-20854 - https://www.vmware.com/security/advisories/VMSA-2023-0003.html
|
|
CVE-2023-20857 - http://packetstormsecurity.com/files/171158/VMware-Security-Advisory-2023-0006.html
|
|
CVE-2023-20887 - http://packetstormsecurity.com/files/173761/VMWare-Aria-Operations-For-Networks-Remote-Command-Execution.html
|
|
CVE-2023-2089 - https://vuldb.com/?id.226097
|
|
CVE-2023-20891 - https://www.vmware.com/security/advisories/VMSA-2023-0016.html
|
|
CVE-2023-20894 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1658
|
|
CVE-2023-20895 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1740
|
|
CVE-2023-20902 - https://github.com/goharbor/harbor/security/advisories/GHSA-mq6f-5xh5-hgcf
|
|
CVE-2023-20928 - http://packetstormsecurity.com/files/170855/Android-Binder-VMA-Management-Security-Issues.html
|
|
CVE-2023-20937 - http://packetstormsecurity.com/files/171239/Android-GKI-Kernels-Contain-Broken-Non-Upstream-Speculative-Page-Faults-MM-Code.html
|
|
CVE-2023-2097 - https://github.com/E1CHO/cve_hub/blob/main/Vehicle%20Service%20Management%20System/Vehicle%20Service%20Management%20System%20-%20vuln%206.pdf
|
|
CVE-2023-2102 - https://huntr.dev/bounties/dd7c04a7-a984-4387-9ac4-24596e7ece44
|
|
CVE-2023-2103 - https://huntr.dev/bounties/1df09505-9923-43b9-82ef-15d94bc3f9dc
|
|
CVE-2023-2105 - https://huntr.dev/bounties/de213e0b-a227-4fc3-bbe7-0b33fbf308e1
|
|
CVE-2023-2107 - https://vuldb.com/?id.226110
|
|
CVE-2023-2109 - https://huntr.dev/bounties/fd5999fd-b1fd-44b4-ae2e-8f95b5c3d1b6
|
|
CVE-2023-2110 - https://starlabs.sg/advisories/23/23-2110/
|
|
CVE-2023-2123 - https://github.com/daniloalbuqrque/poc-cve-xss-encoded-wp-inventory-manager-plugin
|
|
CVE-2023-21238 - https://android.googlesource.com/platform/frameworks/base/+/91bfcbbd87886049778142618a655352b16cd911
|
|
CVE-2023-21244 - https://android.googlesource.com/platform/frameworks/base/+/3a448067ac9ebdf669951e90678c2daa592a81d3
|
|
CVE-2023-21244 - https://android.googlesource.com/platform/frameworks/base/+/5a3d0c131175d923cf35c7beb3ee77a9e6485dad
|
|
CVE-2023-21255 - https://android.googlesource.com/kernel/common/+/1ca1130ec62d
|
|
CVE-2023-21274 - https://android.googlesource.com/platform/packages/modules/NeuralNetworks/+/2bffd7f5e66dd0cf7e5668fb65c4f2b2e9f87cf7
|
|
CVE-2023-21282 - https://android.googlesource.com/platform/external/aac/+/4242f97d149b0bf0cd96f00cd1e9d30d5922cd46
|
|
CVE-2023-21285 - https://android.googlesource.com/platform/frameworks/base/+/0c3b7ec3377e7fb645ec366be3be96bb1a252ca1
|
|
CVE-2023-21292 - https://android.googlesource.com/platform/frameworks/base/+/d10b27e539f7bc91c2360d429b9d05f05274670d
|
|
CVE-2023-2138 - https://huntr.dev/bounties/65096ef9-eafc-49da-b49a-5b88c0203ca6
|
|
CVE-2023-21400 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
|
CVE-2023-2150 - https://youtu.be/o46oHLvY2-E
|
|
CVE-2023-2152 - https://vuldb.com/?id.226273
|
|
CVE-2023-21521 - https://support.blackberry.com/kb/articleDetail?articleNumber=000112406
|
|
CVE-2023-21522 - https://support.blackberry.com/kb/articleDetail?articleNumber=000112406
|
|
CVE-2023-2154 - https://youtu.be/teK82KkWtdA
|
|
CVE-2023-2156 - http://www.openwall.com/lists/oss-security/2023/05/19/1
|
|
CVE-2023-2160 - https://huntr.dev/bounties/54fb6d6a-6b39-45b6-b62a-930260ba484b
|
|
CVE-2023-2164 - https://gitlab.com/gitlab-org/gitlab/-/issues/407783
|
|
CVE-2023-21665 - http://packetstormsecurity.com/files/172663/Qualcomm-Adreno-KGSL-Unchecked-Cast-Type-Confusion.html
|
|
CVE-2023-21666 - http://packetstormsecurity.com/files/172664/Qualcomm-Adreno-KGSL-Data-Leakage.html
|
|
CVE-2023-21670 - http://packetstormsecurity.com/files/173296/Qualcomm-Adreno-KGSL-Insecure-Execution.html
|
|
CVE-2023-21675 - http://packetstormsecurity.com/files/170852/Windows-Kernel-Registry-Virtualization-Memory-Corruption.html
|
|
CVE-2023-21747 - http://packetstormsecurity.com/files/170933/Windows-Kernel-Dangling-Registry-Link-Node-Use-After-Free.html
|
|
CVE-2023-21748 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html
|
|
CVE-2023-21748 - http://packetstormsecurity.com/files/170949/Windows-Kernel-Registry-Virtualization-Incompatibility.html
|
|
CVE-2023-21749 - http://packetstormsecurity.com/files/170947/Windows-Kernsl-SID-Table-Poisoning.html
|
|
CVE-2023-21750 - http://packetstormsecurity.com/files/170948/Windows-Kernel-Virtualizable-Hive-Key-Deletion.html
|
|
CVE-2023-21768 - http://packetstormsecurity.com/files/171606/Ancillary-Function-Driver-AFD-For-Winsock-Privilege-Escalation.html
|
|
CVE-2023-21772 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html
|
|
CVE-2023-21773 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html
|
|
CVE-2023-21774 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html
|
|
CVE-2023-21776 - http://packetstormsecurity.com/files/170947/Windows-Kernsl-SID-Table-Poisoning.html
|
|
CVE-2023-21776 - http://packetstormsecurity.com/files/172300/Windows-Kernel-CmpDoReDoCreateKey-CmpDoReOpenTransKey-Out-Of-Bounds-Read.html
|
|
CVE-2023-21824 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21825 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21826 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21827 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21828 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21829 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-2183 - https://github.com/grafana/bugbounty/security/advisories/GHSA-cvm3-pp2j-chr3
|
|
CVE-2023-21830 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21830 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-21831 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21832 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21834 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21835 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21836 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21837 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21838 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21839 - http://packetstormsecurity.com/files/172882/Oracle-Weblogic-PreAuth-Remote-Command-Execution.html
|
|
CVE-2023-21839 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21840 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21841 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21842 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21843 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21844 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21845 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21846 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21847 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21848 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21849 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21850 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21851 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21852 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21853 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21854 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21855 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21856 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21857 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21858 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21859 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-2186 - https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html
|
|
CVE-2023-21860 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21861 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21862 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21863 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21864 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21865 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21866 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21867 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21868 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21869 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-2187 - https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html
|
|
CVE-2023-21870 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21871 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21872 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21873 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21874 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21875 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21876 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21877 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21878 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21879 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21880 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21881 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21882 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21883 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21884 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21885 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21886 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21887 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21888 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21889 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21890 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21891 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21892 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21893 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21894 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21896 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21898 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21899 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21900 - https://www.oracle.com/security-alerts/cpujan2023.html
|
|
CVE-2023-21902 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21903 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21904 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21905 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21906 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21907 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21908 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21909 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-2191 - https://huntr.dev/bounties/0814f5f9-8b58-40e5-b08c-7c488947cf31
|
|
CVE-2023-21910 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21911 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21912 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21913 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21915 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21916 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21917 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21918 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21919 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21920 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21921 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21922 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21923 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21924 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21925 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21926 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21927 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21928 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21929 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-2193 - https://mattermost.com/security-updates/
|
|
CVE-2023-21930 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21931 - http://packetstormsecurity.com/files/172882/Oracle-Weblogic-PreAuth-Remote-Command-Execution.html
|
|
CVE-2023-21931 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21932 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21933 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21934 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21935 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21936 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21937 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21938 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21939 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21940 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21941 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21942 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21943 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21944 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21945 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21946 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21947 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21948 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21949 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-21950 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-21952 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21953 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21954 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21955 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21956 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21959 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21960 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21961 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-21962 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21963 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21964 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21965 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21966 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21967 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21968 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21969 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21970 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21971 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21971 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-21972 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21973 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21974 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-21975 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-21976 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21977 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21978 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21979 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21980 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21981 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21982 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21983 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-21984 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21985 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21986 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21987 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21988 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21989 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21990 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21991 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21992 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21993 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21994 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-21996 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21997 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21998 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-21999 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-22000 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-22001 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-22002 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-22003 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
|
CVE-2023-22004 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22005 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22006 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22007 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22008 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22009 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22010 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22011 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22012 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22013 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22014 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22016 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22017 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22018 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22020 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22021 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22022 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22023 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22027 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22031 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22033 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22034 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22035 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22036 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22037 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22038 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22039 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22040 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22041 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22042 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22043 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22044 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22045 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22046 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22047 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22048 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22049 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22050 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22051 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22052 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22053 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22054 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22055 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22056 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22057 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22058 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22060 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22061 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22062 - https://www.oracle.com/security-alerts/cpujul2023.html
|
|
CVE-2023-22074 - http://packetstormsecurity.com/files/175352/Oracle-19c-21c-Sharding-Component-Password-Hash-Exposure.html
|
|
CVE-2023-2212 - https://vuldb.com/?id.226977
|
|
CVE-2023-2216 - https://vuldb.com/?id.226981
|
|
CVE-2023-2223 - http://packetstormsecurity.com/files/173726/WordPress-Login-Rebuilder-Cross-Site-Scripting.html
|
|
CVE-2023-22232 - http://packetstormsecurity.com/files/171390/Adobe-Connect-11.4.5-12.1.5-Local-File-Disclosure.html
|
|
CVE-2023-2224 - http://packetstormsecurity.com/files/173725/WordPress-Seo-By-10Web-Cross-Site-Scripting.html
|
|
CVE-2023-2227 - https://huntr.dev/bounties/351f9055-2008-4af0-b820-01ff66678bf3
|
|
CVE-2023-2228 - https://huntr.dev/bounties/619fb490-69ad-4a2a-b686-4c42a62404a9
|
|
CVE-2023-22291 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1687
|
|
CVE-2023-22299 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1712
|
|
CVE-2023-22306 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1698
|
|
CVE-2023-22308 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1737
|
|
CVE-2023-2231 - https://vuldb.com/?id.227001
|
|
CVE-2023-22319 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1701
|
|
CVE-2023-22325 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1736
|
|
CVE-2023-2233 - https://gitlab.com/gitlab-org/gitlab/-/issues/408359
|
|
CVE-2023-2235 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2
|
|
CVE-2023-2236 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d94c04c0db024922e886c9fd429659f22f48ea4
|
|
CVE-2023-22365 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1711
|
|
CVE-2023-22371 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1703
|
|
CVE-2023-2239 - https://huntr.dev/bounties/edeff16b-fc71-4e26-8d2d-dfe7bb5e7868
|
|
CVE-2023-2240 - https://huntr.dev/bounties/8f595559-7b4b-4b00-954c-7a627766e203
|
|
CVE-2023-2241 - https://github.com/podofo/podofo/files/11260976/poc-file.zip
|
|
CVE-2023-2241 - https://github.com/podofo/podofo/issues/69
|
|
CVE-2023-2241 - https://vuldb.com/?id.227226
|
|
CVE-2023-2242 - https://docs.google.com/document/d/1GZt9MKB2K-nDrg0cnrnU6_z9wDd9xPE-YJbPV2Qgqg4/edit
|
|
CVE-2023-2245 - https://github.com/MorStardust/hansuncmswebshell/blob/main/README.md
|
|
CVE-2023-2245 - https://vuldb.com/?id.227230
|
|
CVE-2023-22451 - https://huntr.dev/bounties/32a873c8-f605-4aae-9272-d80985ef2b73
|
|
CVE-2023-2246 - http://packetstormsecurity.com/files/172182/Online-Pizza-Ordering-System-1.0-Shell-Upload.html
|
|
CVE-2023-2248 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d
|
|
CVE-2023-22481 - https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-8vvv-jxg6-8578
|
|
CVE-2023-22483 - https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c
|
|
CVE-2023-22484 - https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r
|
|
CVE-2023-22485 - https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr
|
|
CVE-2023-22486 - https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p
|
|
CVE-2023-2251 - https://huntr.dev/bounties/4b494e99-5a3e-40d9-8678-277f3060e96c
|
|
CVE-2023-22515 - http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2023-22518 - http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html
|
|
CVE-2023-22527 - http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html
|
|
CVE-2023-2258 - https://huntr.dev/bounties/31eaf0fe-4d91-4022-aa9b-802bc6eafb8f
|
|
CVE-2023-2259 - https://huntr.dev/bounties/e753bce0-ce82-463b-b344-2f67b39b60ff
|
|
CVE-2023-22612 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/
|
|
CVE-2023-22613 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/
|
|
CVE-2023-22614 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/
|
|
CVE-2023-22616 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/
|
|
CVE-2023-22620 - http://packetstormsecurity.com/files/171924/SecurePoint-UTM-12.x-Session-ID-Leak.html
|
|
CVE-2023-22620 - http://seclists.org/fulldisclosure/2023/Apr/7
|
|
CVE-2023-22620 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22620.txt
|
|
CVE-2023-22621 - https://github.com/strapi/strapi/releases
|
|
CVE-2023-22621 - https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve
|
|
CVE-2023-22621 - https://www.ghostccamm.com/blog/multi_strapi_vulns/
|
|
CVE-2023-22622 - https://www.tenable.com/plugins/was/113449
|
|
CVE-2023-22629 - http://packetstormsecurity.com/files/171737/Titan-FTP-Path-Traversal.html
|
|
CVE-2023-22629 - https://f20.be/cves/titan-ftp-vulnerabilities
|
|
CVE-2023-22629 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf
|
|
CVE-2023-22630 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-j94f-5cg6-6j9j
|
|
CVE-2023-22653 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1714
|
|
CVE-2023-22659 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1699
|
|
CVE-2023-22660 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1722
|
|
CVE-2023-22671 - https://github.com/NationalSecurityAgency/ghidra/issues/4869
|
|
CVE-2023-22710 - https://patchstack.com/database/vulnerability/wc-return-warrranty/wordpress-return-and-warranty-management-system-for-woocommerce-plugin-1-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve
|
|
CVE-2023-22726 - https://github.com/nektos/act/security/advisories/GHSA-pc99-qmg4-rcff
|
|
CVE-2023-22726 - https://securitylab.github.com/advisories/GHSL-2023-004_act/
|
|
CVE-2023-22741 - https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-8599-x7rq-fr54
|
|
CVE-2023-22745 - https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx67
|
|
CVE-2023-22809 - http://packetstormsecurity.com/files/171644/sudo-1.9.12p1-Privilege-Escalation.html
|
|
CVE-2023-22809 - http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html
|
|
CVE-2023-22809 - http://packetstormsecurity.com/files/174234/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html
|
|
CVE-2023-22809 - http://seclists.org/fulldisclosure/2023/Aug/21
|
|
CVE-2023-22809 - http://www.openwall.com/lists/oss-security/2023/01/19/1
|
|
CVE-2023-2281 - https://mattermost.com/security-updates/
|
|
CVE-2023-22812 - https://www.westerndigital.com/support/product-security/wdc-23005-sandisk-privateaccess-software-update
|
|
CVE-2023-22813 - https://www.westerndigital.com/support/product-security/wdc-23004-western-digital-my-cloud-os-5-my-cloud-home-sandisk-ibi-and-wd-cloud-mobile-and-web-app-update
|
|
CVE-2023-2283 - http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html
|
|
CVE-2023-22833 - https://palantir.safebase.us/?tcuUid=7f1fd834-805d-4679-85d0-9d779fa064ae
|
|
CVE-2023-22834 - https://palantir.safebase.us/?tcuUid=14874400-e9c9-4ac4-a8a6-9f4c48a56ff8
|
|
CVE-2023-22835 - https://palantir.safebase.us/?tcuUid=0e2e79bd-cc03-42a8-92c2-c0e68a1ea53d
|
|
CVE-2023-22844 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1700
|
|
CVE-2023-22845 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1708
|
|
CVE-2023-22855 - http://packetstormsecurity.com/files/171046/Kardex-Mlog-MCC-5.7.12-0-a203c2a213-master-File-Inclusion-Remote-Code-Execution.html
|
|
CVE-2023-22855 - http://packetstormsecurity.com/files/171689/Kardex-Mlog-MCC-5.7.12-Remote-Code-Execution.html
|
|
CVE-2023-22855 - http://seclists.org/fulldisclosure/2023/Feb/10
|
|
CVE-2023-22855 - https://github.com/patrickhener/CVE-2023-22855/blob/main/advisory/advisory.md
|
|
CVE-2023-22855 - https://www.exploit-db.com/exploits/51239
|
|
CVE-2023-22893 - https://github.com/strapi/strapi/releases
|
|
CVE-2023-22893 - https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve
|
|
CVE-2023-22893 - https://www.ghostccamm.com/blog/multi_strapi_vulns/
|
|
CVE-2023-22894 - https://github.com/strapi/strapi/releases
|
|
CVE-2023-22894 - https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve
|
|
CVE-2023-22894 - https://www.ghostccamm.com/blog/multi_strapi_vulns/
|
|
CVE-2023-22897 - http://packetstormsecurity.com/files/171928/SecurePoint-UTM-12.x-Memory-Leak.html
|
|
CVE-2023-22897 - http://seclists.org/fulldisclosure/2023/Apr/8
|
|
CVE-2023-22897 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22897.txt
|
|
CVE-2023-22899 - https://breakingthe3ma.app
|
|
CVE-2023-22899 - https://breakingthe3ma.app/files/Threema-PST22.pdf
|
|
CVE-2023-22906 - https://github.com/nonamecoder/CVE-2023-22906
|
|
CVE-2023-2291 - https://tenable.com/security/research/tra-2023-16
|
|
CVE-2023-22947 - https://shibboleth.atlassian.net/browse/SSPCPP-961
|
|
CVE-2023-22947 - https://shibboleth.atlassian.net/wiki/spaces/SP3/pages/2065335545/Install+on+Windows#Restricting-ACLs
|
|
CVE-2023-22952 - http://packetstormsecurity.com/files/171320/SugarCRM-12.x-Remote-Code-Execution-Shell-Upload.html
|
|
CVE-2023-22955 - http://packetstormsecurity.com/files/174214/AudioCodes-VoIP-Phones-Insufficient-Firmware-Validation.html
|
|
CVE-2023-22955 - http://seclists.org/fulldisclosure/2023/Aug/17
|
|
CVE-2023-22955 - https://syss.de
|
|
CVE-2023-22955 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-055.txt
|
|
CVE-2023-22956 - http://packetstormsecurity.com/files/174216/AudioCodes-VoIP-Phones-Hardcoded-Key.html
|
|
CVE-2023-22956 - http://seclists.org/fulldisclosure/2023/Aug/16
|
|
CVE-2023-22956 - https://syss.de
|
|
CVE-2023-22956 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-054.txt
|
|
CVE-2023-22957 - http://packetstormsecurity.com/files/174215/AudioCodes-VoIP-Phones-Hardcoded-Key.html
|
|
CVE-2023-22957 - http://seclists.org/fulldisclosure/2023/Aug/15
|
|
CVE-2023-22957 - https://syss.de
|
|
CVE-2023-22957 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-052.txt
|
|
CVE-2023-22958 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Syracom/SecureLogin2FA-OpenRedirect.md
|
|
CVE-2023-22959 - https://github.com/chenan224/webchess_sqli_poc
|
|
CVE-2023-2297 - https://www.wordfence.com/blog/2023/03/vulnerability-patched-in-cozmolabs-profile-builder-plugin-information-disclosure-leads-to-account-takeover/
|
|
CVE-2023-22971 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5743.php
|
|
CVE-2023-2298 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
|
CVE-2023-22984 - https://d0ub1e-d.github.io/2022/12/30/exploit-db-1/
|
|
CVE-2023-2299 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
|
CVE-2023-22995 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17
|
|
CVE-2023-22996 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
|
|
CVE-2023-22997 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.2
|
|
CVE-2023-22999 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
|
|
CVE-2023-2300 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
|
CVE-2023-23000 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17
|
|
CVE-2023-23001 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
|
|
CVE-2023-23002 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
|
|
CVE-2023-23003 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16
|
|
CVE-2023-23004 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19
|
|
CVE-2023-23005 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2
|
|
CVE-2023-23006 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.13
|
|
CVE-2023-2301 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
|
CVE-2023-2302 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
|
CVE-2023-2303 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
|
CVE-2023-23040 - https://midist0xf.medium.com/tl-wr940n-uses-weak-md5-hashing-algorithm-ae7b589860d2
|
|
CVE-2023-23059 - https://packetstormsecurity.com/files/172141/GV-Edge-Recording-Manager-2.2.3.0-Privilege-Escalation.html
|
|
CVE-2023-23063 - https://github.com/ahmedalroky/CVEs/tree/cellinx
|
|
CVE-2023-23064 - https://github.com/shellpei/TOTOLINK-Unauthorized/blob/main/CVE-2023-23064
|
|
CVE-2023-2307 - https://huntr.dev/bounties/204ea12e-9e5c-4166-bf0e-fd49c8836917
|
|
CVE-2023-23073 - https://bugbounty.zohocorp.com/bb/#/bug/101000006459171?tab=originator
|
|
CVE-2023-23074 - https://bugbounty.zohocorp.com/bb/#/bug/101000006459195?tab=originator
|
|
CVE-2023-23075 - https://bugbounty.zohocorp.com/bb/#/bug/101000006463045?tab=originator
|
|
CVE-2023-23076 - https://bugbounty.zohocorp.com/bb/#/bug/101000006459751?tab=originator
|
|
CVE-2023-23077 - https://bugbounty.zohocorp.com/bb/#/bug/101000006387693?tab=originator
|
|
CVE-2023-23078 - https://bugbounty.zohocorp.com/bb/#/bug/101000006458675?tab=originator
|
|
CVE-2023-23080 - https://github.com/fxc233/iot-vul/tree/main/Tenda/IPC
|
|
CVE-2023-2315 - https://starlabs.sg/advisories/23/23-2315/
|
|
CVE-2023-2316 - https://starlabs.sg/advisories/23/23-2316/
|
|
CVE-2023-23161 - http://packetstormsecurity.com/files/171642/Art-Gallery-Management-System-Project-1.0-Cross-Site-Scripting.html
|
|
CVE-2023-23162 - http://packetstormsecurity.com/files/171643/Art-Gallery-Management-System-Project-1.0-SQL-Injection.html
|
|
CVE-2023-23163 - http://packetstormsecurity.com/files/171643/Art-Gallery-Management-System-Project-1.0-SQL-Injection.html
|
|
CVE-2023-23169 - https://github.com/S4nshine/CVE-2023-23169
|
|
CVE-2023-2317 - https://starlabs.sg/advisories/23/23-2317/
|
|
CVE-2023-2318 - https://github.com/marktext/marktext/issues/3618
|
|
CVE-2023-2318 - https://starlabs.sg/advisories/23/23-2318/
|
|
CVE-2023-2322 - https://huntr.dev/bounties/f7228f3f-3bef-46fe-b0e3-56c432048a67
|
|
CVE-2023-2323 - https://huntr.dev/bounties/41edf190-f6bf-4a29-a237-7ff1b2d048d3
|
|
CVE-2023-2327 - https://huntr.dev/bounties/7336b71f-a36f-4ce7-a26d-c8335ac713d6
|
|
CVE-2023-23277 - https://github.com/pawelmalak/snippet-box/issues/57
|
|
CVE-2023-23279 - https://hackmd.io/mG658E9iSW6TkbS8xAuUNg
|
|
CVE-2023-2328 - https://huntr.dev/bounties/01a44584-e36b-46f4-ad94-53af488397f6
|
|
CVE-2023-23286 - http://packetstormsecurity.com/files/171734/Provide-Server-14.4-XSS-Cross-Site-Request-Forgery-Code-Execution.html
|
|
CVE-2023-23286 - https://f20.be/cves/provide-server-v-14-4
|
|
CVE-2023-23294 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetwave-series/
|
|
CVE-2023-23295 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetwave-series/
|
|
CVE-2023-23296 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetwave-series/
|
|
CVE-2023-23298 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23298.md
|
|
CVE-2023-23299 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23299.md
|
|
CVE-2023-23300 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23300.md
|
|
CVE-2023-23301 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23301.md
|
|
CVE-2023-23302 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23302.md
|
|
CVE-2023-23303 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23303.md
|
|
CVE-2023-23304 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23304.md
|
|
CVE-2023-23305 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23305.md
|
|
CVE-2023-23306 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23306.md
|
|
CVE-2023-23315 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/01/stripejs.html
|
|
CVE-2023-23326 - https://github.com/superkojiman/vulnerabilities/blob/master/AvantFAX-3.3.7/README.md
|
|
CVE-2023-23327 - https://github.com/superkojiman/vulnerabilities/blob/master/AvantFAX-3.3.7/README.md
|
|
CVE-2023-23328 - https://github.com/superkojiman/vulnerabilities/blob/master/AvantFAX-3.3.7/README.md
|
|
CVE-2023-23330 - https://medium.com/@saleh.py/amano-xparc-local-file-inclusion-cve-2023-23330-672ae8fbfd1e
|
|
CVE-2023-23331 - https://0xhunter20.medium.com/how-i-found-my-first-blind-sql-injection-cve-2023-23331-aef103a7f73c
|
|
CVE-2023-23333 - http://packetstormsecurity.com/files/174537/SolarView-Compact-6.00-Remote-Command-Execution.html
|
|
CVE-2023-23333 - https://github.com/Timorlover/CVE-2023-23333
|
|
CVE-2023-2336 - https://huntr.dev/bounties/af764624-7746-4f53-8480-85348dbb4f14
|
|
CVE-2023-2338 - https://huntr.dev/bounties/bbf59fa7-cf5b-4945-81b0-328adc710462
|
|
CVE-2023-2339 - https://huntr.dev/bounties/bb1537a5-fe7b-4c77-a582-10a82435fbc2
|
|
CVE-2023-23399 - http://packetstormsecurity.com/files/171767/Microsoft-Excel-365-MSO-2302-Build-16.0.16130.20186-Remote-Code-Execution.html
|
|
CVE-2023-2340 - https://huntr.dev/bounties/964762b0-b4fe-441c-81e1-0ebdbbf80f3b
|
|
CVE-2023-23408 - http://packetstormsecurity.com/files/173134/Azure-Apache-Ambari-2302250400-Spoofing.html
|
|
CVE-2023-2341 - https://huntr.dev/bounties/cf3901ac-a649-478f-ab08-094ef759c11d
|
|
CVE-2023-2342 - https://huntr.dev/bounties/01cd3ed5-dce8-4021-9de0-81cb14bf1829
|
|
CVE-2023-23420 - http://packetstormsecurity.com/files/171794/Windows-Kernel-Registry-Key-Issue.html
|
|
CVE-2023-23420 - http://packetstormsecurity.com/files/171867/Microsoft-Windows-Kernel-New-Registry-Key-name-Insufficient-Validation.html
|
|
CVE-2023-23421 - http://packetstormsecurity.com/files/171866/Microsoft-Windows-Kernel-Transactional-Registry-Key-Rename-Issues.html
|
|
CVE-2023-23422 - http://packetstormsecurity.com/files/171866/Microsoft-Windows-Kernel-Transactional-Registry-Key-Rename-Issues.html
|
|
CVE-2023-23423 - http://packetstormsecurity.com/files/171866/Microsoft-Windows-Kernel-Transactional-Registry-Key-Rename-Issues.html
|
|
CVE-2023-2343 - https://huntr.dev/bounties/2fa17227-a717-4b66-ab5a-16bffbb4edb2
|
|
CVE-2023-23454 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12
|
|
CVE-2023-23455 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b
|
|
CVE-2023-23456 - https://github.com/upx/upx/issues/632
|
|
CVE-2023-23457 - https://github.com/upx/upx/issues/631
|
|
CVE-2023-23488 - http://packetstormsecurity.com/files/171661/WordPress-Paid-Memberships-Pro-2.9.8-SQL-Injection.html
|
|
CVE-2023-23488 - https://www.tenable.com/security/research/tra-2023-2
|
|
CVE-2023-23489 - https://www.tenable.com/security/research/tra-2023-2
|
|
CVE-2023-23490 - https://www.tenable.com/security/research/tra-2023-2
|
|
CVE-2023-23491 - https://www.tenable.com/security/research/tra-2023-3
|
|
CVE-2023-23492 - https://www.tenable.com/security/research/tra-2023-3
|
|
CVE-2023-23514 - http://packetstormsecurity.com/files/171359/XNU-NFSSVC-Root-Check-Bypass-Use-After-Free.html
|
|
CVE-2023-23514 - http://seclists.org/fulldisclosure/2023/Mar/21
|
|
CVE-2023-23529 - http://seclists.org/fulldisclosure/2023/Mar/20
|
|
CVE-2023-23546 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1705
|
|
CVE-2023-23547 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1695
|
|
CVE-2023-23550 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1694
|
|
CVE-2023-2356 - https://huntr.dev/bounties/7b5d130d-38eb-4133-8c7d-0dfc9a9d9896
|
|
CVE-2023-23563 - https://github.com/Orange-Cyberdefense/CVE-repository
|
|
CVE-2023-23563 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md
|
|
CVE-2023-23564 - https://github.com/Orange-Cyberdefense/CVE-repository
|
|
CVE-2023-23564 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md
|
|
CVE-2023-23565 - https://github.com/Orange-Cyberdefense/CVE-repository
|
|
CVE-2023-23565 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md
|
|
CVE-2023-23567 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1729
|
|
CVE-2023-23571 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1696
|
|
CVE-2023-23581 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1741
|
|
CVE-2023-23599 - https://bugzilla.mozilla.org/show_bug.cgi?id=1777800
|
|
CVE-2023-23607 - https://github.com/erohtar/Dasherr/security/advisories/GHSA-6rgc-2x44-7phq
|
|
CVE-2023-23608 - https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-q764-g6fm-555v
|
|
CVE-2023-2361 - https://huntr.dev/bounties/24d91b83-c3df-48f5-a713-9def733f2de7
|
|
CVE-2023-23614 - https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-33w4-xf7m-f82m
|
|
CVE-2023-2363 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Resort_Reservation_System-SQL-Injection-1.md
|
|
CVE-2023-23634 - https://herolab.usd.de/en/security-advisories/usd-2022-0066/
|
|
CVE-2023-23635 - https://herolab.usd.de/security-advisories/usd-2022-0031/
|
|
CVE-2023-23636 - https://herolab.usd.de/security-advisories/usd-2022-0030/
|
|
CVE-2023-2364 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Resort_Reservation_System-Stored-Cross-Site-Scripting-1.md
|
|
CVE-2023-2366 - https://vuldb.com/?id.227642
|
|
CVE-2023-2374 - https://github.com/leetsun/IoT/tree/main/EdgeRouterX/CI/6
|
|
CVE-2023-2374 - https://vuldb.com/?id.227650
|
|
CVE-2023-23770 - https://tetraburst.com/
|
|
CVE-2023-23771 - https://tetraburst.com/
|
|
CVE-2023-23772 - https://tetraburst.com/
|
|
CVE-2023-23773 - https://tetraburst.com/
|
|
CVE-2023-23774 - https://tetraburst.com/
|
|
CVE-2023-2378 - https://github.com/leetsun/IoT/tree/main/EdgeRouterX/CI/4
|
|
CVE-2023-2380 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/17
|
|
CVE-2023-2382 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/1
|
|
CVE-2023-2382 - https://vuldb.com/?id.227660
|
|
CVE-2023-2383 - https://vuldb.com/?id.227661
|
|
CVE-2023-2384 - https://vuldb.com/?id.227662
|
|
CVE-2023-2385 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/5
|
|
CVE-2023-23851 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-23852 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-23853 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-23854 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-23855 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-23856 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-23857 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-23858 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-23859 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-23860 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-2389 - https://vuldb.com/?id.227667
|
|
CVE-2023-2390 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/10
|
|
CVE-2023-23902 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1697
|
|
CVE-2023-23907 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1702
|
|
CVE-2023-2391 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/11
|
|
CVE-2023-2392 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/12
|
|
CVE-2023-2392 - https://vuldb.com/?id.227670
|
|
CVE-2023-23924 - https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg
|
|
CVE-2023-23927 - https://github.com/craftcms/cms/security/advisories/GHSA-qcrj-6ffc-v7hq
|
|
CVE-2023-2393 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/13
|
|
CVE-2023-2393 - https://vuldb.com/?id.227671
|
|
CVE-2023-2394 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/14
|
|
CVE-2023-23948 - https://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/
|
|
CVE-2023-2395 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/15
|
|
CVE-2023-2395 - https://vuldb.com/?id.227673
|
|
CVE-2023-23956 - http://packetstormsecurity.com/files/173038/Symantec-SiteMinder-WebAgent-12.52-Cross-Site-Scripting.html
|
|
CVE-2023-2396 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/16
|
|
CVE-2023-24018 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1715
|
|
CVE-2023-24019 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1718
|
|
CVE-2023-24033 - http://packetstormsecurity.com/files/172137/Shannon-Baseband-accept-type-SDP-Attribute-Memory-Corruption.html
|
|
CVE-2023-24039 - https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt
|
|
CVE-2023-24039 - https://security.humanativaspa.it/nothing-new-under-the-sun/
|
|
CVE-2023-2404 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
|
CVE-2023-24040 - https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt
|
|
CVE-2023-24040 - https://security.humanativaspa.it/nothing-new-under-the-sun/
|
|
CVE-2023-24044 - https://gist.github.com/TJetnipat/02b3854543b7ec95d54a8de811f2e8ae
|
|
CVE-2023-24044 - https://medium.com/@jetnipat.tho/cve-2023-24044-10e48ab940d8
|
|
CVE-2023-24045 - https://dataiku.com
|
|
CVE-2023-24045 - https://gist.github.com/alert3/04e2d0a934001180104f846cfa00552b
|
|
CVE-2023-24046 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
|
|
CVE-2023-24047 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
|
|
CVE-2023-24048 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
|
|
CVE-2023-24049 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
|
|
CVE-2023-2405 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
|
CVE-2023-24050 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
|
|
CVE-2023-24051 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
|
|
CVE-2023-24052 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
|
|
CVE-2023-24055 - https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw/
|
|
CVE-2023-2406 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
|
CVE-2023-24068 - https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/
|
|
CVE-2023-24069 - https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/
|
|
CVE-2023-2407 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
|
CVE-2023-24078 - http://packetstormsecurity.com/files/173279/FuguHub-8.1-Remote-Code-Execution.html
|
|
CVE-2023-24078 - https://github.com/ojan2021/Fuguhub-8.1-RCE
|
|
CVE-2023-24095 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/05/README.md
|
|
CVE-2023-24096 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/06/README.md
|
|
CVE-2023-24097 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/03/README.md
|
|
CVE-2023-24098 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/04/README.md
|
|
CVE-2023-24099 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/07/README.md
|
|
CVE-2023-24114 - https://github.com/typecho/typecho/issues/1523
|
|
CVE-2023-24117 - https://oxnan.com/posts/WifiBasic_wepauth_5g_DoS
|
|
CVE-2023-24118 - https://oxnan.com/posts/WifiBasic_security_DoS
|
|
CVE-2023-24119 - https://oxnan.com/posts/WifiBasic_wrlEn_5g_DoS
|
|
CVE-2023-24120 - https://oxnan.com/posts/WifiBasic_wrlEn_5g_DoS
|
|
CVE-2023-24121 - https://oxnan.com/posts/WifiBasic_security_5g_DoS
|
|
CVE-2023-24122 - https://oxnan.com/posts/WifiBasic_ssid_5g_DoS
|
|
CVE-2023-24123 - https://oxnan.com/posts/WifiBasic_wepauth_DoS
|
|
CVE-2023-24124 - https://oxnan.com/posts/WifiBasic_wrlEn_DoS
|
|
CVE-2023-24125 - https://oxnan.com/posts/WifiBasic_wepkey2_5g_DoS
|
|
CVE-2023-24126 - https://oxnan.com/posts/WifiBasic_wepkey4_5g_DoS
|
|
CVE-2023-24127 - https://oxnan.com/posts/WifiBasic_wepkey1_DoS
|
|
CVE-2023-24128 - https://oxnan.com/posts/WifiBasic_wepkey2_DoS
|
|
CVE-2023-24129 - https://oxnan.com/posts/WifiBasic_wepkey4_DoS
|
|
CVE-2023-24130 - https://oxnan.com/posts/WifiBasic_wepkey_DoS
|
|
CVE-2023-24131 - https://oxnan.com/posts/WifiBasic_wepkey1_5g_DoS
|
|
CVE-2023-24132 - https://oxnan.com/posts/WifiBasic_wepkey3_5g_DoS
|
|
CVE-2023-24133 - https://oxnan.com/posts/WifiBasic_wepkey_5g_DoS
|
|
CVE-2023-24134 - https://oxnan.com/posts/WifiBasic_wepkey3_DoS
|
|
CVE-2023-24135 - https://oxnan.com/posts/WriteFacMac-Command-Injection
|
|
CVE-2023-24138 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/NTPSyncWithHost/NTPSyncWithHost.md
|
|
CVE-2023-2414 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
|
CVE-2023-2415 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
|
CVE-2023-24150 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/meshSlaveDlfw/meshSlaveDlfw.md
|
|
CVE-2023-24151 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_ip/recvSlaveCloudCheckStatus_ip.md
|
|
CVE-2023-24152 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/meshSlaveUpdate/meshSlaveUpdate.md
|
|
CVE-2023-24153 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_version/recvSlaveCloudCheckStatus.md
|
|
CVE-2023-24154 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/setUpgradeFW/setUpgradeFW.md
|
|
CVE-2023-24156 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveUpgstatus/recvSlaveUpgstatus.md
|
|
CVE-2023-24157 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/updateWifiInfo/updateWifiInfo.md
|
|
CVE-2023-24159 - https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setPasswordCfg_admpass/setPasswordCfg_admpass.md
|
|
CVE-2023-2416 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
|
CVE-2023-24160 - https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setPasswordCfg_admuser/setPasswordCfg_admuser.md
|
|
CVE-2023-24164 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/4/4.md
|
|
CVE-2023-24165 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/7/7.md
|
|
CVE-2023-24166 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/2/2.md
|
|
CVE-2023-24167 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/1/1.md
|
|
CVE-2023-24169 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/6/6.md
|
|
CVE-2023-2417 - http://packetstormsecurity.com/files/172105/Advanced-Host-Monitor-12.56-Unquoted-Service-Path.html
|
|
CVE-2023-24170 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/3/3.md
|
|
CVE-2023-24181 - https://github.com/ABB-EL/external-vulnerability-disclosures/security/advisories/GHSA-9gqg-pp5p-q9hg
|
|
CVE-2023-24182 - https://github.com/ABB-EL/external-vulnerability-disclosures/security/advisories/GHSA-7vqh-2r8q-rjg2
|
|
CVE-2023-24205 - https://github.com/Fndroid/clash_for_windows_pkg/issues/3891
|
|
CVE-2023-2421 - https://youtu.be/4JOLhAuoizE
|
|
CVE-2023-24212 - https://github.com/Venus-WQLab/bug_report/blob/main/Tenda/CVE-2023-24212.md
|
|
CVE-2023-24212 - https://github.com/w0x68y/cve-lists/blob/main/Tenda/vuln/readme.md
|
|
CVE-2023-24217 - http://packetstormsecurity.com/files/171252/Agilebio-Lab-Collector-4.234-Remote-Code-Execution.html
|
|
CVE-2023-24229 - https://github.com/sadwwcxz/Vul
|
|
CVE-2023-24229 - https://web.archive.org/web/20230315181013/https://github.com/sadwwcxz/Vul
|
|
CVE-2023-24230 - https://medium.com/@0x2bit/formwork-1-12-1-stored-xss-vulnerability-at-page-title-b6efba27891a
|
|
CVE-2023-24231 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b
|
|
CVE-2023-24232 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b
|
|
CVE-2023-24233 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b
|
|
CVE-2023-24234 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b
|
|
CVE-2023-24236 - https://github.com/Am1ngl/ttt/tree/main/19
|
|
CVE-2023-24238 - https://github.com/Am1ngl/ttt/tree/main/20
|
|
CVE-2023-24251 - https://github.com/Cutegod/CMS_0_day/issues/2
|
|
CVE-2023-2426 - https://huntr.dev/bounties/3451be4c-91c8-4d08-926b-cbff7396f425
|
|
CVE-2023-24261 - https://justinapplegate.me/2023/glinet-CVE-2023-24261/
|
|
CVE-2023-24269 - https://github.com/s4n-h4xor/CVE-Publications/blob/main/CVE-2023-24269/CVE-2023-24269.md
|
|
CVE-2023-2427 - https://huntr.dev/bounties/89005a6d-d019-4cb7-ae88-486d2d44190d
|
|
CVE-2023-24276 - https://github.com/Am1ngl/ttt/tree/main/18
|
|
CVE-2023-24279 - https://www.edoardoottavianelli.it/CVE-2023-24279
|
|
CVE-2023-24279 - https://www.youtube.com/watch?v=1mSXzzwcGMM
|
|
CVE-2023-2428 - https://huntr.dev/bounties/cee65b6d-b003-4e6a-9d14-89aa94bee43e
|
|
CVE-2023-24282 - https://www.cryptnetix.com/blog/2023/01/19/Polycom-Trio-Vulnerability-Disclosure.html
|
|
CVE-2023-2429 - https://huntr.dev/bounties/20d3a0b3-2693-4bf1-b196-10741201a540
|
|
CVE-2023-24317 - https://packetstormsecurity.com/files/170205/Judging-Management-System-1.0-Shell-Upload.html
|
|
CVE-2023-24320 - https://yuyudhn.github.io/CVE-2023-24320/
|
|
CVE-2023-24322 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md
|
|
CVE-2023-24323 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md
|
|
CVE-2023-24329 - https://github.com/python/cpython/issues/102153
|
|
CVE-2023-24330 - https://github.com/caoyebo/CVE/tree/main/dlink%20882%20-%20CVE-2023-24330
|
|
CVE-2023-24331 - https://github.com/caoyebo/CVE/tree/main/Dlink%20816%20-%20CVE-2023-24331
|
|
CVE-2023-24332 - https://github.com/caoyebo/CVE/tree/main/Tenda%20AC6%20-%20CVE-2023-24332
|
|
CVE-2023-24333 - https://github.com/caoyebo/CVE/tree/main/TENDA%20AC21%20-%20CVE-2023-24333
|
|
CVE-2023-24334 - https://github.com/caoyebo/CVE/tree/main/TENDA%20AC23%20-%20CVE-2023-24334
|
|
CVE-2023-24343 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/01
|
|
CVE-2023-24344 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/01
|
|
CVE-2023-24345 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/03
|
|
CVE-2023-24346 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/02
|
|
CVE-2023-24347 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/02
|
|
CVE-2023-24348 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/02
|
|
CVE-2023-24349 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/04
|
|
CVE-2023-24350 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/03
|
|
CVE-2023-24351 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/01
|
|
CVE-2023-24352 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/03
|
|
CVE-2023-24364 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
|
CVE-2023-24366 - https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2023-24366.md
|
|
CVE-2023-24366 - https://github.com/mrojz/rconfig-exploit/blob/main/rconfigV6_Local_File_Disclosure.md
|
|
CVE-2023-2437 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html
|
|
CVE-2023-2437 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
|
CVE-2023-2438 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
|
CVE-2023-2439 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
|
CVE-2023-2440 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
|
CVE-2023-2446 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html
|
|
CVE-2023-2446 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
|
CVE-2023-2447 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
|
CVE-2023-24472 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1709
|
|
CVE-2023-24473 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1707
|
|
CVE-2023-24479 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1762
|
|
CVE-2023-2448 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html
|
|
CVE-2023-2448 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
|
CVE-2023-2449 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html
|
|
CVE-2023-2449 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
|
CVE-2023-24496 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704
|
|
CVE-2023-24497 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704
|
|
CVE-2023-2451 - https://vuldb.com/?id.227795
|
|
CVE-2023-24519 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706
|
|
CVE-2023-24520 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706
|
|
CVE-2023-24521 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-24522 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-24523 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-24524 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-24525 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-24526 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-24527 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-24528 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-24529 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-24530 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-24582 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1710
|
|
CVE-2023-24583 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1710
|
|
CVE-2023-24585 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1725
|
|
CVE-2023-24595 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1713
|
|
CVE-2023-24609 - https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842
|
|
CVE-2023-24620 - https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md
|
|
CVE-2023-24621 - https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md
|
|
CVE-2023-24626 - https://www.exploit-db.com/exploits/51252
|
|
CVE-2023-24651 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
|
CVE-2023-24652 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
|
CVE-2023-24653 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
|
CVE-2023-24654 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
|
CVE-2023-24656 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
|
CVE-2023-24671 - https://medium.com/@SumitVerma101/windows-privilege-escalation-part-1-unquoted-service-path-c7a011a8d8ae
|
|
CVE-2023-24671 - https://packetstormsecurity.com/files/171300/VX-Search-13.8-Unquoted-Service-Path.html
|
|
CVE-2023-24674 - https://cupc4k3.medium.com/cve-2023-24674-uncovering-a-privilege-escalation-vulnerability-in-bludit-cms-dcf86c41107
|
|
CVE-2023-24674 - https://medium.com/@cupc4k3/privilege-scalation-in-bludit-cms-dcf86c41107
|
|
CVE-2023-24675 - https://cupc4k3.medium.com/cve-2023-24674-uncovering-a-privilege-escalation-vulnerability-in-bludit-cms-dcf86c41107
|
|
CVE-2023-24684 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md
|
|
CVE-2023-24685 - http://packetstormsecurity.com/files/172047/ChurchCRM-4.5.3-SQL-Injection.html
|
|
CVE-2023-24685 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md
|
|
CVE-2023-24686 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md
|
|
CVE-2023-24687 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md
|
|
CVE-2023-24688 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md
|
|
CVE-2023-24689 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md
|
|
CVE-2023-24690 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md
|
|
CVE-2023-24698 - https://foswiki.org/Support/SecurityAlert-CVE-2023-24698
|
|
CVE-2023-24709 - http://packetstormsecurity.com/files/171783/Paradox-Security-Systems-IPR512-Denial-Of-Service.html
|
|
CVE-2023-24709 - https://github.com/SlashXzerozero/Injection-vulnerability-in-Paradox-Security-Systems-IPR512
|
|
CVE-2023-24709 - https://github.com/sunktitanic/Injection-vulnerability-in-Paradox-Security-Systems-IPR512
|
|
CVE-2023-24720 - https://infosec.zeyu2001.com/2023/readiumjs-cloud-reader-everybody-gets-an-xss
|
|
CVE-2023-24721 - https://github.com/marcovntr/CVE/blob/main/2023/CVE-2023-24721/CVE-2023-24721.md
|
|
CVE-2023-24728 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
|
CVE-2023-24729 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
|
CVE-2023-24730 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
|
CVE-2023-24731 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
|
CVE-2023-24732 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
|
CVE-2023-24733 - https://github.com/AetherBlack/CVE/tree/main/PMB
|
|
CVE-2023-24734 - https://github.com/AetherBlack/CVE/tree/main/PMB
|
|
CVE-2023-24735 - https://github.com/AetherBlack/CVE/tree/main/PMB
|
|
CVE-2023-24736 - https://github.com/AetherBlack/CVE/tree/main/PMB
|
|
CVE-2023-24737 - https://github.com/AetherBlack/CVE/tree/main/PMB
|
|
CVE-2023-2474 - https://vuldb.com/?id.227866
|
|
CVE-2023-24751 - https://github.com/strukturag/libde265/issues/379
|
|
CVE-2023-24752 - https://github.com/strukturag/libde265/issues/378
|
|
CVE-2023-24754 - https://github.com/strukturag/libde265/issues/382
|
|
CVE-2023-24755 - https://github.com/strukturag/libde265/issues/384
|
|
CVE-2023-24756 - https://github.com/strukturag/libde265/issues/380
|
|
CVE-2023-24757 - https://github.com/strukturag/libde265/issues/385
|
|
CVE-2023-24758 - https://github.com/strukturag/libde265/issues/383
|
|
CVE-2023-2476 - https://vuldb.com/?id.227868
|
|
CVE-2023-24762 - https://hackmd.io/@uuXne2y3RjOdpWM87fw6_A/HyPK04zho
|
|
CVE-2023-24763 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/06/xenforum.html
|
|
CVE-2023-24769 - https://www.edoardoottavianelli.it/CVE-2023-24769
|
|
CVE-2023-24769 - https://www.youtube.com/watch?v=TRTpRlkU3Hc
|
|
CVE-2023-24773 - https://github.com/funadmin/funadmin/issues/4
|
|
CVE-2023-24774 - https://github.com/funadmin/funadmin/issues/12
|
|
CVE-2023-24775 - https://github.com/funadmin/funadmin/issues/9
|
|
CVE-2023-24780 - https://github.com/funadmin/funadmin/issues/6
|
|
CVE-2023-24781 - https://github.com/funadmin/funadmin/issues/8
|
|
CVE-2023-24782 - https://github.com/funadmin/funadmin/issues/3
|
|
CVE-2023-24785 - https://sourceforge.net/p/peazip/tickets/734/
|
|
CVE-2023-24788 - http://packetstormsecurity.com/files/171804/NotrinosERP-0.7-SQL-Injection.html
|
|
CVE-2023-24788 - https://github.com/arvandy/CVE/blob/main/CVE-2023-24788/CVE-2023-24788.md
|
|
CVE-2023-24788 - https://github.com/arvandy/CVE/blob/main/CVE-2023-24788/CVE-2023-24788.py
|
|
CVE-2023-24788 - https://github.com/arvandy/CVE/blob/main/NotrinosERP/POC.md
|
|
CVE-2023-24797 - https://github.com/DrizzlingSun/D-link/blob/main/Dir882/1/1.md
|
|
CVE-2023-24798 - https://github.com/DrizzlingSun/D-link/blob/main/Dir878/2/2.md
|
|
CVE-2023-24799 - https://github.com/DrizzlingSun/D-link/blob/main/Dir878/1/1.md
|
|
CVE-2023-24800 - https://github.com/DrizzlingSun/D-link/blob/main/Dir878/3/3.md
|
|
CVE-2023-24804 - https://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/
|
|
CVE-2023-24805 - https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x
|
|
CVE-2023-24808 - https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-cjc4-x96x-fvgf
|
|
CVE-2023-24815 - https://github.com/vert-x3/vertx-web/security/advisories/GHSA-53jx-vvf9-4x38
|
|
CVE-2023-24816 - https://github.com/ipython/ipython/security/advisories/GHSA-29gw-9793-fvw7
|
|
CVE-2023-24824 - https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh
|
|
CVE-2023-2485 - https://gitlab.com/gitlab-org/gitlab/-/issues/407830
|
|
CVE-2023-2497 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
|
CVE-2023-2507 - https://fluidattacks.com/advisories/maiden/
|
|
CVE-2023-25076 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1731
|
|
CVE-2023-25081 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25082 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25083 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25084 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25085 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25086 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25087 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25088 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25089 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25090 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25091 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25092 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25093 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25094 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25095 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25096 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25097 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25098 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25099 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25100 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25101 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25102 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25103 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25104 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25105 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25106 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25107 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25108 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25109 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25110 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25111 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25112 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25113 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25114 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25115 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25116 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25117 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25118 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25119 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25120 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25121 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25122 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25123 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25124 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
|
CVE-2023-25135 - https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable
|
|
CVE-2023-25136 - http://www.openwall.com/lists/oss-security/2023/02/13/1
|
|
CVE-2023-25136 - http://www.openwall.com/lists/oss-security/2023/02/22/1
|
|
CVE-2023-25136 - https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/
|
|
CVE-2023-25136 - https://news.ycombinator.com/item?id=34711565
|
|
CVE-2023-25156 - https://huntr.dev/bounties/2b1a9be9-45e9-490b-8de0-26a492e79795/
|
|
CVE-2023-2516 - https://huntr.dev/bounties/19470f0b-7094-4339-8d4a-4b5570b54716
|
|
CVE-2023-25171 - https://huntr.dev/bounties/3b712cb6-3fa3-4f71-8562-7a7016c6262e
|
|
CVE-2023-25173 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
|
|
CVE-2023-25181 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1726
|
|
CVE-2023-25187 - http://packetstormsecurity.com/files/173055/Nokia-ASIKA-7.13.52-Private-Key-Disclosure.html
|
|
CVE-2023-2519 - https://vuldb.com/?id.228010
|
|
CVE-2023-25194 - http://packetstormsecurity.com/files/173151/Apache-Druid-JNDI-Injection-Remote-Code-Execution.html
|
|
CVE-2023-25206 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/14/ws_productreviews.html
|
|
CVE-2023-25207 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/09/dpdfrance.html
|
|
CVE-2023-25210 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/1/1.md
|
|
CVE-2023-25211 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/2/2.md
|
|
CVE-2023-25212 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/6/6.md
|
|
CVE-2023-25213 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/5/5.md
|
|
CVE-2023-25214 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/4/4.md
|
|
CVE-2023-25215 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/3/3.md
|
|
CVE-2023-25216 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/9/9.md
|
|
CVE-2023-25217 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/10/10.md
|
|
CVE-2023-25218 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/8/8.md
|
|
CVE-2023-25219 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/11/11.md
|
|
CVE-2023-25220 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/7/7.md
|
|
CVE-2023-25221 - https://github.com/strukturag/libde265/issues/388
|
|
CVE-2023-25222 - https://github.com/LibreDWG/libredwg/issues/615
|
|
CVE-2023-2523 - https://github.com/RCEraser/cve/blob/main/Weaver.md
|
|
CVE-2023-25231 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/104
|
|
CVE-2023-25233 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113
|
|
CVE-2023-25234 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113_1
|
|
CVE-2023-25235 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113_2
|
|
CVE-2023-25240 - https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions
|
|
CVE-2023-25260 - https://cves.at/posts/cve-2023-25260/writeup/
|
|
CVE-2023-25261 - https://cves.at/posts/cve-2023-25261/writeup/
|
|
CVE-2023-25262 - https://cves.at/posts/cve-2023-25262/writeup/
|
|
CVE-2023-25263 - https://cves.at/posts/cve-2023-25263/writeup/
|
|
CVE-2023-25264 - https://frycos.github.io/vulns4free/2023/01/24/0days-united-nations.html
|
|
CVE-2023-25265 - https://frycos.github.io/vulns4free/2023/01/24/0days-united-nations.html
|
|
CVE-2023-25266 - https://frycos.github.io/vulns4free/2023/01/24/0days-united-nations.html
|
|
CVE-2023-25267 - https://gist.github.com/Frycos/62fa664bacd19a85235be19c6e4d7599
|
|
CVE-2023-25279 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20Inject%20In%20tools_AccountName
|
|
CVE-2023-25280 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20Inject%20in%20pingV4Msg
|
|
CVE-2023-25281 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/stackoverflow%20cancelPing
|
|
CVE-2023-25282 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/Permanent%20DDOS%20vulnerability%20in%20emailInfo
|
|
CVE-2023-25283 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/stackoverflow%20%20in%20reserveDHCP_HostName_1.1.1.0
|
|
CVE-2023-25289 - https://www.exploit-db.com/exploits/51142
|
|
CVE-2023-25309 - https://cxsecurity.com/issue/WLB-2023050012
|
|
CVE-2023-25309 - https://packetstormsecurity.com/files/172185/Rollout-UI-0.5-Cross-Site-Scripting.html
|
|
CVE-2023-2531 - https://huntr.dev/bounties/20463eb2-0f9d-4ea3-a2c8-93f80e7aca02
|
|
CVE-2023-25313 - https://github.com/WWBN/AVideo/security/advisories/GHSA-pgvh-p3g4-86jw
|
|
CVE-2023-25330 - https://github.com/FCncdn/MybatisPlusTenantPluginSQLInjection-POC/blob/master/Readme.en.md
|
|
CVE-2023-25344 - https://github.com/node-swig/swig-templates/issues/89
|
|
CVE-2023-25344 - https://www.gem-love.com/2023/02/01/Swig%E6%A8%A1%E6%9D%BF%E5%BC%95%E6%93%8E0day%E6%8C%96%E6%8E%98-%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E5%92%8C%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96/
|
|
CVE-2023-25345 - https://github.com/node-swig/swig-templates/issues/88
|
|
CVE-2023-25346 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25346
|
|
CVE-2023-25347 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25347
|
|
CVE-2023-25348 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25348
|
|
CVE-2023-25355 - https://seclists.org/fulldisclosure/2023/Mar/5
|
|
CVE-2023-25356 - https://seclists.org/fulldisclosure/2023/Mar/5
|
|
CVE-2023-25366 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25366.md
|
|
CVE-2023-25367 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25367.md
|
|
CVE-2023-25368 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25368.md
|
|
CVE-2023-25369 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25369.md
|
|
CVE-2023-25394 - https://danrevah.github.io/2023/05/03/CVE-2023-25394-VideoStream-LPE/
|
|
CVE-2023-25395 - https://github.com/Am1ngl/ttt/tree/main/22
|
|
CVE-2023-25403 - https://github.com/CleverStupidDog/yf-exam/issues/2
|
|
CVE-2023-25428 - https://packetstormsecurity.com/files/172259/Soft-o-Free-Password-Manager-1.1.20-DLL-Hijacking.html
|
|
CVE-2023-25431 - https://github.com/hundanchen69/bug_report/blob/main/vendors/janobe/Online%20Reviewer%20Management%20System/XSS-1.md
|
|
CVE-2023-25433 - https://gitlab.com/libtiff/libtiff/-/issues/520
|
|
CVE-2023-25434 - https://gitlab.com/libtiff/libtiff/-/issues/519
|
|
CVE-2023-25435 - https://gitlab.com/libtiff/libtiff/-/issues/518
|
|
CVE-2023-25438 - https://packetstormsecurity.com/files/172052/MilleGPG5-5.9.2-Local-Privilege-Escalation.html
|
|
CVE-2023-25439 - https://packetstormsecurity.com/files/172556/FusionInvoice-2023-1.0-Cross-Site-Scripting.html
|
|
CVE-2023-25440 - https://packetstormsecurity.com/files/172470/CiviCRM-5.59.alpha1-Cross-Site-Scripting.html
|
|
CVE-2023-2550 - https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b
|
|
CVE-2023-2551 - https://huntr.dev/bounties/5723613c-55c6-4f18-9ed3-61ad44f5de9c
|
|
CVE-2023-2552 - https://huntr.dev/bounties/ab0b4655-f57a-4113-849b-2237eeb75b32
|
|
CVE-2023-2553 - https://huntr.dev/bounties/4e1f5b56-e846-40d8-a83c-533efd56aacf
|
|
CVE-2023-2554 - https://huntr.dev/bounties/396785a0-7bb6-4db4-b4cb-607b0fd4ab4b
|
|
CVE-2023-25572 - https://github.com/marmelab/react-admin/pull/8644
|
|
CVE-2023-25572 - https://github.com/marmelab/react-admin/security/advisories/GHSA-5jcr-82fh-339v
|
|
CVE-2023-25582 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1723
|
|
CVE-2023-25583 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1723
|
|
CVE-2023-25585 - https://sourceware.org/bugzilla/show_bug.cgi?id=29892
|
|
CVE-2023-25586 - https://sourceware.org/bugzilla/show_bug.cgi?id=29855
|
|
CVE-2023-25588 - https://sourceware.org/bugzilla/show_bug.cgi?id=29677
|
|
CVE-2023-25614 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-25615 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-25616 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-25617 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-25618 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-2564 - https://huntr.dev/bounties/d13113ad-a107-416b-acc1-01e4c16ec461
|
|
CVE-2023-2566 - https://huntr.dev/bounties/47d6fc2a-989a-44eb-9cb7-ab4f8bd44496
|
|
CVE-2023-25690 - http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html
|
|
CVE-2023-25717 - https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/
|
|
CVE-2023-25718 - https://cybir.com/2022/cve/connectwise-control-dns-spoofing-poc/
|
|
CVE-2023-25718 - https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity
|
|
CVE-2023-25719 - https://cybir.com/2022/cve/hijacking-connectwise-control-and-ddos/
|
|
CVE-2023-25719 - https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity
|
|
CVE-2023-25728 - https://bugzilla.mozilla.org/show_bug.cgi?id=1790345
|
|
CVE-2023-25729 - https://bugzilla.mozilla.org/show_bug.cgi?id=1792138
|
|
CVE-2023-2573 - http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html
|
|
CVE-2023-2573 - http://seclists.org/fulldisclosure/2023/May/4
|
|
CVE-2023-2573 - https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/
|
|
CVE-2023-25732 - https://bugzilla.mozilla.org/show_bug.cgi?id=1804564
|
|
CVE-2023-25734 - https://bugzilla.mozilla.org/show_bug.cgi?id=1809923
|
|
CVE-2023-25734 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810143
|
|
CVE-2023-2574 - http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html
|
|
CVE-2023-2574 - http://seclists.org/fulldisclosure/2023/May/4
|
|
CVE-2023-2574 - https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/
|
|
CVE-2023-25741 - https://bugzilla.mozilla.org/show_bug.cgi?id=1813376
|
|
CVE-2023-25743 - https://bugzilla.mozilla.org/show_bug.cgi?id=1800203
|
|
CVE-2023-25748 - https://bugzilla.mozilla.org/show_bug.cgi?id=1798798
|
|
CVE-2023-25749 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810705
|
|
CVE-2023-2575 - http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html
|
|
CVE-2023-2575 - http://seclists.org/fulldisclosure/2023/May/4
|
|
CVE-2023-2575 - https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/
|
|
CVE-2023-25750 - https://bugzilla.mozilla.org/show_bug.cgi?id=1814733
|
|
CVE-2023-25774 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1743
|
|
CVE-2023-2579 - https://github.com/daniloalbuqrque/poc-cve-xss-inventory-press-plugin
|
|
CVE-2023-25810 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-wh8j-xr66-f296
|
|
CVE-2023-25811 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-553g-fcpf-m3wp
|
|
CVE-2023-25814 - https://github.com/metersphere/metersphere/security/advisories/GHSA-fwc3-5h55-mh2j
|
|
CVE-2023-2582 - https://www.tenable.com/security/research/tra-2023-18
|
|
CVE-2023-25826 - http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html
|
|
CVE-2023-2583 - https://huntr.dev/bounties/397ea68d-1e28-44ff-b830-c8883d067d96
|
|
CVE-2023-25848 - https://www.esri.com/arcgis-blog/products/trust-arcgis/announcements/arcgis-server-map-and-feature-service-security-2023-update-1-patch/
|
|
CVE-2023-2590 - https://huntr.dev/bounties/a4238a30-3ddb-4415-9055-e179c3d4dea7
|
|
CVE-2023-2591 - https://huntr.dev/bounties/705f79f4-f5e3-41d7-82a5-f00441cd984b
|
|
CVE-2023-2598 - https://www.openwall.com/lists/oss-security/2023/05/08/3
|
|
CVE-2023-2601 - http://packetstormsecurity.com/files/173732/WordPress-WP-Brutal-AI-Cross-Site-Request-Forgery-SQL-Injection.html
|
|
CVE-2023-26033 - https://github.com/gentoo/soko/security/advisories/GHSA-gp8g-jfq9-5q2g
|
|
CVE-2023-26034 - https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-222j-wh8m-xjrx
|
|
CVE-2023-26035 - http://packetstormsecurity.com/files/175675/ZoneMinder-Snapshots-Command-Injection.html
|
|
CVE-2023-26043 - https://github.com/GeoNode/geonode/security/advisories/GHSA-mcmc-c59m-pqq8
|
|
CVE-2023-2605 - http://packetstormsecurity.com/files/173734/WordPress-WP-Brutal-AI-Cross-Site-Scripting.html
|
|
CVE-2023-2605 - https://wpscan.com/vulnerability/372cb940-71ba-4d19-b35a-ab15f8c2fdeb
|
|
CVE-2023-26067 - http://packetstormsecurity.com/files/174763/Lexmark-Device-Embedded-Web-Server-Remote-Code-Execution.html
|
|
CVE-2023-26068 - http://packetstormsecurity.com/files/174763/Lexmark-Device-Embedded-Web-Server-Remote-Code-Execution.html
|
|
CVE-2023-26071 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2023-26072 - http://packetstormsecurity.com/files/171378/Shannon-Baseband-NrmmMsgCodec-Emergency-Number-List-Heap-Buffer-Overflow.html
|
|
CVE-2023-26073 - http://packetstormsecurity.com/files/171380/Shannon-Baseband-NrmmMsgCodec-Extended-Emergency-Number-List-Heap-Buffer-Overflow.html
|
|
CVE-2023-26074 - http://packetstormsecurity.com/files/171383/Shannon-Baseband-NrmmMsgCodec-Access-Category-Definitions-Heap-Buffer-Overflow.html
|
|
CVE-2023-26075 - http://packetstormsecurity.com/files/171387/Shannon-Baseband-NrmmMsgCodec-Intra-Object-Overflow.html
|
|
CVE-2023-26076 - http://packetstormsecurity.com/files/171400/Shannon-Baseband-NrSmPcoCodec-Intra-Object-Overflow.html
|
|
CVE-2023-26081 - https://github.com/google/security-research/security/advisories/GHSA-mhhf-w9xw-pp9x
|
|
CVE-2023-2609 - https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622
|
|
CVE-2023-2610 - https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d
|
|
CVE-2023-26102 - https://github.com/timdown/rangy/issues/478
|
|
CVE-2023-26102 - https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702
|
|
CVE-2023-26103 - https://security.snyk.io/vuln/SNYK-RUST-DENO-3315970
|
|
CVE-2023-26104 - https://gist.github.com/lirantal/637520812da06fffb91dd86d02ff6bde
|
|
CVE-2023-26104 - https://security.snyk.io/vuln/SNYK-JS-LITEWEBSERVER-3153703
|
|
CVE-2023-26105 - https://github.com/mde/utilities/issues/29
|
|
CVE-2023-26105 - https://security.snyk.io/vuln/SNYK-JS-UTILITIES-3184491
|
|
CVE-2023-26106 - https://security.snyk.io/vuln/SNYK-JS-DOTLENS-3227646
|
|
CVE-2023-26107 - https://security.snyk.io/vuln/SNYK-JS-SKETCHSVG-3167969
|
|
CVE-2023-26109 - https://security.snyk.io/vuln/SNYK-JS-NODEBLUETOOTHSERIALPORT-3311820
|
|
CVE-2023-26110 - https://security.snyk.io/vuln/SNYK-JS-NODEBLUETOOTH-3311821
|
|
CVE-2023-26111 - https://gist.github.com/lirantal/c80b28e7bee148dc287339cb483e42bc
|
|
CVE-2023-26111 - https://security.snyk.io/vuln/SNYK-JS-NODESTATIC-3149928
|
|
CVE-2023-26111 - https://security.snyk.io/vuln/SNYK-JS-NUBOSOFTWARENODESTATIC-3149927
|
|
CVE-2023-26112 - https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494
|
|
CVE-2023-26113 - https://github.com/kobezzza/Collection/issues/27
|
|
CVE-2023-26113 - https://security.snyk.io/vuln/SNYK-JS-COLLECTIONJS-3185148
|
|
CVE-2023-26114 - https://security.snyk.io/vuln/SNYK-JS-CODESERVER-3368148
|
|
CVE-2023-26115 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-4058657
|
|
CVE-2023-26115 - https://security.snyk.io/vuln/SNYK-JS-WORDWRAP-3149973
|
|
CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406320
|
|
CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406322
|
|
CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406321
|
|
CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373044
|
|
CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323
|
|
CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406325
|
|
CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406324
|
|
CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045
|
|
CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406326
|
|
CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406328
|
|
CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406327
|
|
CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046
|
|
CVE-2023-26119 - https://security.snyk.io/vuln/SNYK-JAVA-NETSOURCEFORGEHTMLUNIT-3252500
|
|
CVE-2023-2612 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
|
|
CVE-2023-2612 - https://ubuntu.com/security/CVE-2023-2612
|
|
CVE-2023-2612 - https://ubuntu.com/security/notices/USN-6127-1
|
|
CVE-2023-26120 - https://security.snyk.io/vuln/SNYK-JAVA-COMXUXUELI-3248764
|
|
CVE-2023-26121 - https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373062
|
|
CVE-2023-26122 - https://github.com/hacksparrow/safe-eval/issues/27
|
|
CVE-2023-26122 - https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373064
|
|
CVE-2023-26123 - https://security.snyk.io/vuln/SNYK-UNMANAGED-RAYSAN5RAYLIB-5421188
|
|
CVE-2023-26125 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285
|
|
CVE-2023-26126 - https://gist.github.com/lirantal/dcb32c11ce87f5aafd2282b90b4dc998
|
|
CVE-2023-26126 - https://security.snyk.io/vuln/SNYK-JS-MSTATIC-3244915
|
|
CVE-2023-26127 - https://security.snyk.io/vuln/SNYK-JS-N158-3183746
|
|
CVE-2023-26128 - https://security.snyk.io/vuln/SNYK-JS-KEEPMODULELATEST-3157165
|
|
CVE-2023-26129 - https://security.snyk.io/vuln/SNYK-JS-BWMNG-3175876
|
|
CVE-2023-26130 - https://gist.github.com/dellalibera/094aece17a86069a7d27f93c8aba2280
|
|
CVE-2023-26130 - https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-5591194
|
|
CVE-2023-26131 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMXYPROTOALGERNONENGINE-3312111
|
|
CVE-2023-26131 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMXYPROTOALGERNONTHEMES-3312112
|
|
CVE-2023-26132 - https://security.snyk.io/vuln/SNYK-JS-DOTTIE-3332763
|
|
CVE-2023-26133 - https://security.snyk.io/vuln/SNYK-JS-PROGRESSBARJS-3184152
|
|
CVE-2023-26134 - https://github.com/JPeer264/node-git-commit-info/issues/24
|
|
CVE-2023-26134 - https://security.snyk.io/vuln/SNYK-JS-GITCOMMITINFO-5740174
|
|
CVE-2023-26135 - https://github.com/brycebaril/node-flatnest/issues/4
|
|
CVE-2023-26135 - https://security.snyk.io/vuln/SNYK-JS-FLATNEST-3185149
|
|
CVE-2023-26136 - https://github.com/salesforce/tough-cookie/issues/282
|
|
CVE-2023-26136 - https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873
|
|
CVE-2023-26137 - https://gist.github.com/dellalibera/666d67165830ded052a1ede2d2c0b02a
|
|
CVE-2023-26137 - https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665554
|
|
CVE-2023-26138 - https://gist.github.com/dellalibera/d2abd809f32ec6c61be1f41d80edf61b
|
|
CVE-2023-26138 - https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665555
|
|
CVE-2023-26139 - https://gist.github.com/lelecolacola123/cc0d1e73780127aea9482c05f2ff3252
|
|
CVE-2023-26139 - https://security.snyk.io/vuln/SNYK-JS-UNDERSCOREKEYPATH-5416714
|
|
CVE-2023-2614 - https://huntr.dev/bounties/1a5e6c65-2c5e-4617-9411-5b47a7e743a6
|
|
CVE-2023-26140 - https://security.snyk.io/vuln/SNYK-JS-EXCALIDRAWEXCALIDRAW-5841658
|
|
CVE-2023-26141 - https://gist.github.com/keeganparr1/1dffd3c017339b7ed5371ed3d81e6b2a
|
|
CVE-2023-26141 - https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQ-5885107
|
|
CVE-2023-26142 - https://gist.github.com/dellalibera/9247769cc90ed96c0d72ddbcba88c65c
|
|
CVE-2023-26142 - https://security.snyk.io/vuln/SNYK-UNMANAGED-CROW-5665556
|
|
CVE-2023-26143 - https://security.snyk.io/vuln/SNYK-JS-BLAMER-5731318
|
|
CVE-2023-26144 - https://security.snyk.io/vuln/SNYK-JS-GRAPHQL-5905181
|
|
CVE-2023-26145 - https://gist.github.com/CalumHutton/45d33e9ea55bf4953b3b31c84703dfca
|
|
CVE-2023-26145 - https://security.snyk.io/vuln/SNYK-PYTHON-PYDASH-5916518
|
|
CVE-2023-26146 - https://gist.github.com/dellalibera/c53448135480cbe12257c4b413a90d20
|
|
CVE-2023-26146 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730766
|
|
CVE-2023-26147 - https://gist.github.com/dellalibera/2be265b56b7b3b00de1a777b9dec0c7b
|
|
CVE-2023-26147 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730768
|
|
CVE-2023-26148 - https://gist.github.com/dellalibera/65d136066fdd5ea4dddaadaa9b0ba90e
|
|
CVE-2023-26148 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730769
|
|
CVE-2023-26149 - https://security.snyk.io/vuln/SNYK-JS-QUILLMENTION-5921549
|
|
CVE-2023-2615 - https://huntr.dev/bounties/af9c360a-87f8-4e97-a24b-6db675ee942a
|
|
CVE-2023-26150 - https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673435
|
|
CVE-2023-26151 - https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673709
|
|
CVE-2023-26152 - https://gist.github.com/lirantal/1f7021703a2065ecaf9ec9e06a3a346d
|
|
CVE-2023-26152 - https://security.snyk.io/vuln/SNYK-JS-STATICSERVER-5722341
|
|
CVE-2023-26153 - https://gist.github.com/CalumHutton/b7aa1c2e71c8d4386463ac14f686901d
|
|
CVE-2023-26153 - https://security.snyk.io/vuln/SNYK-RUBY-GEOKITRAILS-5920323
|
|
CVE-2023-26155 - https://github.com/nrhirani/node-qpdf/issues/23
|
|
CVE-2023-26155 - https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918
|
|
CVE-2023-26156 - https://gist.github.com/mcoimbra/47b1da554a80795c45126d51e41b2b18
|
|
CVE-2023-26156 - https://security.snyk.io/vuln/SNYK-JS-CHROMEDRIVER-6049539
|
|
CVE-2023-26157 - https://security.snyk.io/vuln/SNYK-UNMANAGED-LIBREDWG-6070730
|
|
CVE-2023-26158 - https://security.snyk.io/vuln/SNYK-JS-MOCKJS-6051365
|
|
CVE-2023-26159 - https://github.com/follow-redirects/follow-redirects/issues/235
|
|
CVE-2023-26159 - https://security.snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137
|
|
CVE-2023-2616 - https://huntr.dev/bounties/564cb512-2bcc-4458-8c20-88110ab45801
|
|
CVE-2023-2617 - https://github.com/opencv/opencv_contrib/pull/3480
|
|
CVE-2023-2620 - https://gitlab.com/gitlab-org/gitlab/-/issues/410433
|
|
CVE-2023-26213 - http://seclists.org/fulldisclosure/2023/Mar/2
|
|
CVE-2023-26213 - https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/
|
|
CVE-2023-2624 - http://packetstormsecurity.com/files/174895/WordPress-KiviCare-3.2.0-Cross-Site-Scripting.html
|
|
CVE-2023-26255 - https://github.com/1nters3ct/CVEs/blob/main/CVE-2023-26255.md
|
|
CVE-2023-26256 - https://github.com/1nters3ct/CVEs/blob/main/CVE-2023-26256.md
|
|
CVE-2023-2629 - https://huntr.dev/bounties/821ff465-4754-42d1-9376-813c17f16a01
|
|
CVE-2023-2630 - https://huntr.dev/bounties/e1001870-b8d8-4921-8b9c-bbdfb1a1491e
|
|
CVE-2023-26314 - https://www.openwall.com/lists/oss-security/2023/01/05/1
|
|
CVE-2023-26325 - https://www.tenable.com/security/research/tra-2023-2
|
|
CVE-2023-26326 - https://www.tenable.com/security/research/tra-2023-7
|
|
CVE-2023-2636 - http://packetstormsecurity.com/files/173815/WordPress-AN_Gradebook-5.0.1-SQL-Injection.html
|
|
CVE-2023-2636 - https://wpscan.com/vulnerability/6a3bfd88-1251-4d40-b26f-62950a3ce0b5
|
|
CVE-2023-26360 - http://packetstormsecurity.com/files/172079/Adobe-ColdFusion-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2023-26427 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
|
CVE-2023-26428 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
|
CVE-2023-26429 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
|
CVE-2023-26430 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2023-26431 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
|
CVE-2023-26432 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
|
CVE-2023-26433 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
|
CVE-2023-26434 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
|
CVE-2023-26435 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
|
CVE-2023-26436 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
|
CVE-2023-26438 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2023-26439 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2023-26440 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2023-26441 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2023-26442 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2023-26443 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2023-26445 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2023-26446 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2023-26447 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2023-26448 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2023-26449 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2023-26450 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2023-26451 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
|
CVE-2023-26457 - https://launchpad.support.sap.com/#/notes/3281484
|
|
CVE-2023-26457 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-26458 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-26459 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-26460 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-26461 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-26469 - http://packetstormsecurity.com/files/174248/Jorani-Remote-Code-Execution.html
|
|
CVE-2023-26469 - https://github.com/Orange-Cyberdefense/CVE-repository/tree/master
|
|
CVE-2023-2647 - https://github.com/sunyixuan1228/cve/blob/main/weaver%20exec.md
|
|
CVE-2023-26475 - https://jira.xwiki.org/browse/XWIKI-20360
|
|
CVE-2023-2648 - https://github.com/sunyixuan1228/cve/blob/main/weaver.md
|
|
CVE-2023-26485 - https://github.com/github/cmark-gfm/security/advisories/GHSA-r8vr-c48j-fcc5
|
|
CVE-2023-26486 - https://github.com/vega/vega/security/advisories/GHSA-4vq7-882g-wcg4
|
|
CVE-2023-26487 - https://github.com/vega/vega/security/advisories/GHSA-w5m3-xh75-mp55
|
|
CVE-2023-2649 - https://github.com/xinzhihen06/ac23tenda/blob/main/tendaAC23.md
|
|
CVE-2023-26490 - https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-3j2f-wf52-cjg7
|
|
CVE-2023-26492 - https://github.com/directus/directus/security/advisories/GHSA-j3rg-3rgm-537h
|
|
CVE-2023-26493 - https://securitylab.github.com/advisories/GHSL-2023-027_Engine_for_Cocos_Creator/
|
|
CVE-2023-26494 - https://securitylab.github.com/advisories/GHSL-2022-138_lorawan-stack/
|
|
CVE-2023-26510 - https://ghost.org/docs/security/
|
|
CVE-2023-26510 - https://gist.github.com/yurahod/2e11eabbe4b92ef1d44b08e37023ecfb
|
|
CVE-2023-26510 - https://gist.github.com/yurahod/828d5e6a077c12f3f74c6485d1c7f0e7
|
|
CVE-2023-2652 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Lost-and-Found-Information-System---Multiple-SQL-injections.md#2classesmasterphpfdelete_item
|
|
CVE-2023-2653 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Lost-and-Found-Information-System---Multiple-SQL-injections.md
|
|
CVE-2023-2653 - https://vuldb.com/?id.228781
|
|
CVE-2023-26556 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b
|
|
CVE-2023-26557 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b
|
|
CVE-2023-2656 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/AC-Repair-and-Services-System---SQL-injections.md
|
|
CVE-2023-2657 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#1xss-vulnerability-in-productsphp
|
|
CVE-2023-2658 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#2sql-injection-vulnerability-in-productsphp
|
|
CVE-2023-2658 - https://vuldb.com/?id.228800
|
|
CVE-2023-2659 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#3sql-injection-vulnerability-in-view_productphp
|
|
CVE-2023-2660 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#4sql-injection-vulnerability-in-view_categoriesphp
|
|
CVE-2023-2660 - https://vuldb.com/?id.228802
|
|
CVE-2023-26602 - http://packetstormsecurity.com/files/171137/ASUS-ASMB8-iKVM-1.14.51-SNMP-Remote-Root.html
|
|
CVE-2023-26602 - http://seclists.org/fulldisclosure/2023/Feb/15
|
|
CVE-2023-26602 - https://nwsec.de/NWSSA-002-2023.txt
|
|
CVE-2023-26604 - http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html
|
|
CVE-2023-26604 - https://blog.compass-security.com/2012/10/dangerous-sudoers-entries-part-2-insecure-functionality/
|
|
CVE-2023-26609 - http://packetstormsecurity.com/files/171136/ABUS-Security-Camera-TVIP-20000-21150-LFI-Remote-Code-Execution.html
|
|
CVE-2023-26609 - http://seclists.org/fulldisclosure/2023/Feb/16
|
|
CVE-2023-26609 - https://nwsec.de/NWSSA-001-2023.txt
|
|
CVE-2023-2661 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#5sql-injection-vulnerability-in-classesmasterphp
|
|
CVE-2023-26612 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/SetParentsControlInfo
|
|
CVE-2023-26613 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/excu_shell
|
|
CVE-2023-26615 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1
|
|
CVE-2023-26615 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/SetMultipleActions
|
|
CVE-2023-26616 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/SetParentsControlInfo
|
|
CVE-2023-2662 - https://forum.xpdfreader.com/viewtopic.php?t=42505
|
|
CVE-2023-2663 - https://forum.xpdfreader.com/viewtopic.php?t=42421
|
|
CVE-2023-2664 - https://forum.xpdfreader.com/viewtopic.php?t=42422
|
|
CVE-2023-2666 - https://huntr.dev/bounties/0bbdc9d4-d9dc-4490-93ef-0a83b451a20f
|
|
CVE-2023-2667 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2667.md
|
|
CVE-2023-2668 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2668.md
|
|
CVE-2023-2669 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2669.md
|
|
CVE-2023-26692 - http://packetstormsecurity.com/files/171787/ZCBS-ZBBS-ZPBS-4.14k-Cross-Site-Scripting.html
|
|
CVE-2023-2670 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2670.md
|
|
CVE-2023-2670 - https://vuldb.com/?id.228886
|
|
CVE-2023-2671 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2671.md
|
|
CVE-2023-2672 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2672.md
|
|
CVE-2023-26733 - https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/README.md
|
|
CVE-2023-26733 - https://github.com/jkriege2/TinyTIFF/issues/19
|
|
CVE-2023-26735 - https://github.com/prometheus/blackbox_exporter/issues/1024
|
|
CVE-2023-2674 - https://huntr.dev/bounties/af73e913-730c-4245-88ce-26fc908d3644
|
|
CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755
|
|
CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755#issuecomment-1426155955
|
|
CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505390813
|
|
CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505560351
|
|
CVE-2023-26756 - https://googleinformationsworld.blogspot.com/2023/04/revive-adserver-541-vulnerable-to-brute.html
|
|
CVE-2023-26758 - https://www.swascan.com/it/security-advisory-sme-up-erp/
|
|
CVE-2023-26759 - https://www.swascan.com/it/security-advisory-sme-up-erp/
|
|
CVE-2023-2676 - https://github.com/xinzhihen06/dxq-cve/blob/main/h3cr160.md
|
|
CVE-2023-26760 - https://www.swascan.com/it/security-advisory-sme-up-erp/
|
|
CVE-2023-26762 - https://www.swascan.com/it/security-advisory-sme-up-erp/
|
|
CVE-2023-26767 - https://github.com/liblouis/liblouis/issues/1292
|
|
CVE-2023-26768 - https://github.com/liblouis/liblouis/issues/1301
|
|
CVE-2023-26773 - https://packetstormsecurity.com/files/171686/Sales-Tracker-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2023-26774 - https://packetstormsecurity.com/files/171692/Sales-Tracker-Management-System-1.0-Insecure-Direct-Object-Reference.html
|
|
CVE-2023-26775 - http://packetstormsecurity.com/files/171705/Monitorr-1.7.6-Cross-Site-Scripting.html
|
|
CVE-2023-26776 - http://packetstormsecurity.com/files/171705/Monitorr-1.7.6-Cross-Site-Scripting.html
|
|
CVE-2023-26777 - http://packetstormsecurity.com/files/171699/Uptime-Kuma-1.19.6-Cross-Site-Scripting.html
|
|
CVE-2023-26800 - https://github.com/winmt/my-vuls/tree/main/RG-EW1200
|
|
CVE-2023-26801 - https://github.com/winmt/my-vuls/tree/main/LB-LINK%20BL-AC1900%2C%20BL-WR9000%2C%20BL-X26%20and%20BL-LTE300%20Wireless%20Routers
|
|
CVE-2023-26802 - https://github.com/winmt/my-vuls/tree/main/DCN%20DCBI-Netlog-LAB
|
|
CVE-2023-26805 - https://github.com/Stevenbaga/fengsha/blob/main/W20E/formIPMacBindModify.md
|
|
CVE-2023-26806 - https://github.com/Stevenbaga/fengsha/blob/main/W20E/SetSysTime.md
|
|
CVE-2023-26817 - https://github.com/PGYER/codefever/issues/140
|
|
CVE-2023-26820 - https://github.com/netptop/siteproxy/issues/67
|
|
CVE-2023-26822 - https://github.com/yzskyt/Vuln/blob/main/Go-RT-AC750/Go-RT-AC750.md
|
|
CVE-2023-26839 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26839
|
|
CVE-2023-26840 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26840
|
|
CVE-2023-26841 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26841
|
|
CVE-2023-26842 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26842
|
|
CVE-2023-26843 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26843
|
|
CVE-2023-26848 - https://github.com/Am1ngl/ttt/tree/main/23
|
|
CVE-2023-26858 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/28/faqs.html
|
|
CVE-2023-26860 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/04/lgbudget.html
|
|
CVE-2023-26864 - https://friends-of-presta.github.io/security-advisories/modules/2023/01/17/smplredirectionsmanager.html
|
|
CVE-2023-26865 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/20/bdroppy.html
|
|
CVE-2023-26876 - http://packetstormsecurity.com/files/172059/Piwigo-13.5.0-SQL-Injection.html
|
|
CVE-2023-26876 - https://gist.github.com/rodnt/a190d14d1715890d8df19bad58b90693
|
|
CVE-2023-2690 - https://vuldb.com/?id.228971
|
|
CVE-2023-2691 - https://vuldb.com/?id.228972
|
|
CVE-2023-26912 - https://github.com/xenv/S-mall-ssm/issues/37
|
|
CVE-2023-26913 - https://wanheiqiyihu.top/2023/02/13/Evolucare-Ecsimaging-new-movie-php%E5%8F%8D%E5%B0%84%E6%80%A7xss/
|
|
CVE-2023-26918 - http://packetstormsecurity.com/files/171879/File-Replication-Pro-7.5.0-Insecure-Permissions-Privilege-Escalation.html
|
|
CVE-2023-26919 - https://github.com/javadelight/delight-nashorn-sandbox/issues/135
|
|
CVE-2023-26921 - https://github.com/closethe/AG550QCN_CommandInjection_ql_atfwd/blob/main/README.md
|
|
CVE-2023-26922 - https://github.com/varigit/matrix-gui-v2/issues/1
|
|
CVE-2023-26923 - https://github.com/musescore/MuseScore/issues/16346
|
|
CVE-2023-26925 - https://github.com/laotun-s/POC/blob/main/CVE-2023-26925.txt
|
|
CVE-2023-2693 - https://vuldb.com/?id.228974
|
|
CVE-2023-26934 - https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/object_copy
|
|
CVE-2023-26935 - https://github.com/huanglei3/xpdf_heapoverflow
|
|
CVE-2023-26936 - https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/gmem_copyString
|
|
CVE-2023-26937 - https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/Stack_backtracking_gstring
|
|
CVE-2023-26938 - https://github.com/huanglei3/xpdf_heapoverflow/edit/main/Stack_backtracking_readblock
|
|
CVE-2023-26949 - https://github.com/keheying/onekeyadmin/issues/1
|
|
CVE-2023-26950 - https://github.com/keheying/onekeyadmin/issues/9
|
|
CVE-2023-26952 - https://github.com/keheying/onekeyadmin/issues/7
|
|
CVE-2023-26953 - https://github.com/keheying/onekeyadmin/issues/8
|
|
CVE-2023-26954 - https://github.com/keheying/onekeyadmin/issues/11
|
|
CVE-2023-26956 - https://github.com/keheying/onekeyadmin/issues/4
|
|
CVE-2023-26958 - https://medium.com/@shiva.infocop/stored-xss-park-ticketing-management-system-phpgurukul-893583dc2e20
|
|
CVE-2023-26959 - https://medium.com/@shiva.infocop/authentication-bypass-park-ticketing-management-system-phpgurukul-427045159c05
|
|
CVE-2023-2696 - https://vuldb.com/?id.228977
|
|
CVE-2023-26961 - https://gist.github.com/DylanGrl/4269ae834c5d0ec77c9b928ad35d3be3
|
|
CVE-2023-26966 - https://gitlab.com/libtiff/libtiff/-/issues/530
|
|
CVE-2023-26974 - https://github.com/overXsky/IrfanviewPoc
|
|
CVE-2023-26976 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/AC6/205_1
|
|
CVE-2023-26978 - https://github.com/Am1ngl/ttt/tree/main/28
|
|
CVE-2023-26984 - https://github.com/Peppermint-Lab/peppermint/tree/master
|
|
CVE-2023-26987 - https://docs.google.com/document/d/14DYoZfKN__As8gBXMFae7wChKJXpmbuUdMn2Gf803Lw
|
|
CVE-2023-26987 - https://docs.google.com/document/d/14DYoZfKN__As8gBXMFae7wChKJXpmbuUdMn2Gf803Lw/edit
|
|
CVE-2023-2699 - https://vuldb.com/?id.228980
|
|
CVE-2023-26991 - https://github.com/matthiaskramm/swftools/issues/196
|
|
CVE-2023-26998 - https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/
|
|
CVE-2023-26999 - https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/
|
|
CVE-2023-27000 - https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/
|
|
CVE-2023-27008 - https://plantplants213607121.wordpress.com/2023/02/16/atutor-2-2-1-cross-site-scripting-via-the-token-body-parameter/
|
|
CVE-2023-27010 - https://packetstormsecurity.com/files/171301/Wondershare-Dr-Fone-12.9.6-Weak-Permissions-Privilege-Escalation.html
|
|
CVE-2023-27012 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/5/5.md
|
|
CVE-2023-27013 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/2/2.md
|
|
CVE-2023-27014 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/10/10.md
|
|
CVE-2023-27015 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/4/4.md
|
|
CVE-2023-27016 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/3/3.md
|
|
CVE-2023-27017 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/6/6.md
|
|
CVE-2023-27018 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/7/7.md
|
|
CVE-2023-27019 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/8/8.md
|
|
CVE-2023-27020 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/1/1.md
|
|
CVE-2023-27021 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/9/9.md
|
|
CVE-2023-27032 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/11/advancedpopupcreator.html
|
|
CVE-2023-27035 - https://forum.obsidian.md/t/embedded-web-pages-in-obsidian-canvas-can-use-sensitive-web-apis-without-the-users-permission-grant/54509
|
|
CVE-2023-27035 - https://github.com/fivex3/CVE-2023-27035
|
|
CVE-2023-27040 - https://www.exploit-db.com/exploits/50214
|
|
CVE-2023-27042 - https://github.com/hujianjie123/vuln/blob/main/Tenda/SetFirewallCfg/readme.md
|
|
CVE-2023-27054 - https://github.com/miroslavpejic85/mirotalk/issues/139
|
|
CVE-2023-27055 - https://github.com/StolidWaffle/AVer-PTZApp2
|
|
CVE-2023-27059 - https://github.com/ChurchCRM/CRM/issues/6450
|
|
CVE-2023-27061 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formWifiFilterRulesModify.md
|
|
CVE-2023-27062 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formPortalAuth.md
|
|
CVE-2023-27063 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formModifyDnsForward.md
|
|
CVE-2023-27064 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formDelDnsForward.md
|
|
CVE-2023-27065 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formDelWewifiPic.md
|
|
CVE-2023-27069 - https://www.edoardoottavianelli.it/CVE-2023-27069/
|
|
CVE-2023-27069 - https://www.youtube.com/watch?v=Ryuz1gymiw8
|
|
CVE-2023-27070 - https://www.edoardoottavianelli.it/CVE-2023-27070/
|
|
CVE-2023-27070 - https://www.youtube.com/watch?v=4WJqcseH5qk
|
|
CVE-2023-27073 - https://github.com/bhaveshkush007/CVEs/blob/main/CVE-2023-27073.txt
|
|
CVE-2023-27077 - https://github.com/B2eFly/Router/blob/main/360/360D901.md
|
|
CVE-2023-27078 - https://github.com/B2eFly/Router/blob/main/TPLINK/MR3020/1.md
|
|
CVE-2023-27079 - https://github.com/B2eFly/Router/blob/main/Tenda/G103/2.md
|
|
CVE-2023-27098 - https://github.com/c0d3x27/CVEs/tree/main/CVE-2023-27098
|
|
CVE-2023-27100 - http://packetstormsecurity.com/files/171791/pfsenseCE-2.6.0-Protection-Bypass.html
|
|
CVE-2023-27102 - https://github.com/strukturag/libde265/issues/393
|
|
CVE-2023-27103 - https://github.com/strukturag/libde265/issues/394
|
|
CVE-2023-27107 - https://gist.github.com/smidtbx10/f8ff1c4977b7f54886c6a52e9ef4e816
|
|
CVE-2023-27114 - https://github.com/radareorg/radare2/issues/21363
|
|
CVE-2023-27115 - https://github.com/WebAssembly/wabt/issues/1938
|
|
CVE-2023-27115 - https://github.com/WebAssembly/wabt/issues/1992
|
|
CVE-2023-27116 - https://github.com/WebAssembly/wabt/issues/1984
|
|
CVE-2023-27117 - https://github.com/WebAssembly/wabt/issues/1989
|
|
CVE-2023-27119 - https://github.com/WebAssembly/wabt/issues/1990
|
|
CVE-2023-27121 - https://www.mdsec.co.uk/2023/09/the-not-so-pleasant-password-manager/
|
|
CVE-2023-27130 - https://github.com/typecho/typecho/issues/1535
|
|
CVE-2023-27131 - https://github.com/typecho/typecho/issues/1536
|
|
CVE-2023-27132 - https://packetstormsecurity.com/files/174271
|
|
CVE-2023-27133 - https://packetstormsecurity.com/files/174272
|
|
CVE-2023-27135 - https://github.com/Am1ngl/ttt/tree/main/29
|
|
CVE-2023-27159 - https://gist.github.com/b33t1e/43b26c31e895baf7e7aea2dbf9743a9a
|
|
CVE-2023-27159 - https://gist.github.com/b33t1e/e9e8192317c111e7897e04d2f9bf5fdb
|
|
CVE-2023-27160 - https://gist.github.com/b33t1e/6172286862a4486b5888f3cbbdc6316d
|
|
CVE-2023-27161 - https://gist.github.com/b33t1e/5c067e0538a0b712dc3d59bd4b9a5952
|
|
CVE-2023-27162 - https://gist.github.com/b33t1e/6121210ebd9efd4f693c73b830d8ab08
|
|
CVE-2023-27163 - http://packetstormsecurity.com/files/174128/Request-Baskets-1.2.1-Server-Side-Request-Forgery.html
|
|
CVE-2023-27163 - http://packetstormsecurity.com/files/174129/Maltrail-0.53-Remote-Code-Execution.html
|
|
CVE-2023-27163 - https://gist.github.com/b33t1e/3079c10c88cad379fb166c389ce3b7b3
|
|
CVE-2023-27164 - https://gist.github.com/b33t1e/a1a0d81b1173d0d00de8f4e7958dd867
|
|
CVE-2023-27167 - https://packetstormsecurity.com/files/171523/Suprema-BioStar-2-2.8.16-SQL-Injection.html
|
|
CVE-2023-27179 - http://packetstormsecurity.com/files/171894/GDidees-CMS-3.9.1-Local-File-Disclosure-Directory-Traversal.html
|
|
CVE-2023-2718 - https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins
|
|
CVE-2023-27191 - https://apkpure.com/cn/super-security-virus-cleaner/com.ludashi.security
|
|
CVE-2023-27191 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27191/CVE%20detail.md
|
|
CVE-2023-27192 - https://apkpure.com/cn/super-security-virus-cleaner/com.ludashi.security
|
|
CVE-2023-27192 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27192/CVE%20detail.md
|
|
CVE-2023-27193 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27193/CVE%20detail.md
|
|
CVE-2023-27225 - https://packetstormsecurity.com
|
|
CVE-2023-27229 - https://github.com/Am1ngl/ttt/tree/main/30
|
|
CVE-2023-27231 - https://github.com/Am1ngl/ttt/tree/main/31
|
|
CVE-2023-27232 - https://github.com/Am1ngl/ttt/tree/main/32
|
|
CVE-2023-27233 - https://gist.github.com/renanavs/dcb13bb1cd618ce7eb0c80290b837245
|
|
CVE-2023-27234 - https://github.com/Cherry-toto/jizhicms/issues/85
|
|
CVE-2023-27235 - https://github.com/Cherry-toto/jizhicms/issues/85
|
|
CVE-2023-2724 - http://packetstormsecurity.com/files/173131/Chrome-Internal-JavaScript-Object-Access-Via-Origin-Trials.html
|
|
CVE-2023-27249 - https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc
|
|
CVE-2023-27249 - https://github.com/keepinggg/poc/tree/main/poc_of_swfdump
|
|
CVE-2023-27249 - https://github.com/matthiaskramm/swftools/issues/197
|
|
CVE-2023-27253 - http://packetstormsecurity.com/files/173487/pfSense-Restore-RRD-Data-Command-Injection.html
|
|
CVE-2023-27263 - https://mattermost.com/security-updates/
|
|
CVE-2023-27264 - https://mattermost.com/security-updates/
|
|
CVE-2023-27265 - https://mattermost.com/security-updates/
|
|
CVE-2023-27266 - https://mattermost.com/security-updates/
|
|
CVE-2023-27267 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-27268 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-27269 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-27270 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-27271 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-27290 - http://packetstormsecurity.com/files/171770/IBM-Instana-243-0-Missing-Authentication.html
|
|
CVE-2023-27292 - https://www.tenable.com/security/research/tra-2023-8
|
|
CVE-2023-27293 - https://www.tenable.com/security/research/tra-2023-8
|
|
CVE-2023-27294 - https://www.tenable.com/security/research/tra-2023-8
|
|
CVE-2023-27295 - https://www.tenable.com/security/research/tra-2023-8
|
|
CVE-2023-2730 - https://huntr.dev/bounties/6c6f5c26-d545-4e7b-82bb-1fe28006c885
|
|
CVE-2023-2731 - https://gitlab.com/libtiff/libtiff/-/issues/548
|
|
CVE-2023-27350 - http://packetstormsecurity.com/files/171982/PaperCut-MF-NG-Authentication-Bypass-Remote-Code-Execution.html
|
|
CVE-2023-27350 - http://packetstormsecurity.com/files/172022/PaperCut-NG-MG-22.0.4-Authentication-Bypass.html
|
|
CVE-2023-27350 - http://packetstormsecurity.com/files/172512/PaperCut-NG-MG-22.0.4-Remote-Code-Execution.html
|
|
CVE-2023-27350 - http://packetstormsecurity.com/files/172780/PaperCut-PaperCutNG-Authentication-Bypass.html
|
|
CVE-2023-27350 - https://news.sophos.com/en-us/2023/04/27/increased-exploitation-of-papercut-drawing-blood-around-the-internet/
|
|
CVE-2023-27372 - http://packetstormsecurity.com/files/171921/SPIP-Remote-Command-Execution.html
|
|
CVE-2023-27372 - http://packetstormsecurity.com/files/173044/SPIP-4.2.1-Remote-Code-Execution.html
|
|
CVE-2023-27379 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1756
|
|
CVE-2023-2738 - https://github.com/RCEraser/cve/blob/main/tongda.md
|
|
CVE-2023-27380 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1780
|
|
CVE-2023-27390 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1744
|
|
CVE-2023-27390 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1744
|
|
CVE-2023-27395 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1735
|
|
CVE-2023-27396 - https://www.fa.omron.co.jp/product/vulnerability/OMSR-2023-003_ja.pdf
|
|
CVE-2023-27396 - https://www.ia.omron.com/product/vulnerability/OMSR-2023-003_en.pdf
|
|
CVE-2023-2744 - http://packetstormsecurity.com/files/175106/WordPress-WP-ERP-1.12.2-SQL-Injection.html
|
|
CVE-2023-2745 - http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html
|
|
CVE-2023-27479 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qxjg-jhgw-qhrv
|
|
CVE-2023-27482 - https://github.com/elttam/publications/blob/master/writeups/home-assistant/supervisor-authentication-bypass-advisory.md
|
|
CVE-2023-27482 - https://www.elttam.com/blog/pwnassistant/
|
|
CVE-2023-27487 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-5375-pq35-hf2g
|
|
CVE-2023-27488 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-9g5w-hqr3-w2ph
|
|
CVE-2023-27491 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-5jmv-cw9p-f9rp
|
|
CVE-2023-27492 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-wpc2-2jp6-ppg2
|
|
CVE-2023-27493 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5w5-487h-qv8q
|
|
CVE-2023-27496 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-j79q-2g66-2xv5
|
|
CVE-2023-27497 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-27498 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-27499 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-27500 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-27501 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-27516 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1754
|
|
CVE-2023-2752 - https://huntr.dev/bounties/efdf5b24-6d30-4d57-a5b0-13b253ba3ea4
|
|
CVE-2023-27524 - http://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html
|
|
CVE-2023-27524 - http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html
|
|
CVE-2023-2753 - https://huntr.dev/bounties/eca2284d-e81a-4ab8-91bb-7afeca557628
|
|
CVE-2023-2756 - https://huntr.dev/bounties/cf398528-819f-456e-88e7-c06d268d3f44
|
|
CVE-2023-27561 - https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9
|
|
CVE-2023-27561 - https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334
|
|
CVE-2023-27561 - https://github.com/opencontainers/runc/issues/3751
|
|
CVE-2023-27566 - https://github.com/openl2d/moc3ingbird
|
|
CVE-2023-27568 - http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html
|
|
CVE-2023-27569 - https://security.profileo.com/cve/eo_tags_2023-27569-27570/
|
|
CVE-2023-27570 - https://security.profileo.com/cve/eo_tags_2023-27569-27570/
|
|
CVE-2023-27571 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-arris-dg3450-cable-gateway/
|
|
CVE-2023-27572 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-arris-dg3450-cable-gateway/
|
|
CVE-2023-2758 - https://www.tenable.com/security/research/tra-2023-21
|
|
CVE-2023-27581 - https://securitylab.github.com/research/github-actions-untrusted-input/
|
|
CVE-2023-27586 - https://github.com/Kozea/CairoSVG/security/advisories/GHSA-rwmf-w63j-p7gv
|
|
CVE-2023-27598 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
|
CVE-2023-27599 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
|
CVE-2023-27600 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
|
CVE-2023-27601 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
|
CVE-2023-27635 - https://bugs.debian.org/1031267
|
|
CVE-2023-27637 - https://friends-of-presta.github.io/security-advisories/module/2023/03/21/tshirtecommerce_cwe-89.html
|
|
CVE-2023-27638 - https://friends-of-presta.github.io/security-advisories/module/2023/03/21/tshirtecommerce_cwe-89.html
|
|
CVE-2023-27639 - https://friends-of-presta.github.io/security-advisories/module/2023/03/30/tshirtecommerce_cwe-22.html
|
|
CVE-2023-27640 - https://friends-of-presta.github.io/security-advisories/module/2023/03/30/tshirtecommerce_cwe-22.html
|
|
CVE-2023-27641 - https://github.com/hosakauk/exploits/blob/master/listserv_report_xss.MD
|
|
CVE-2023-27643 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27643/CVE%20detail.md
|
|
CVE-2023-27645 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27645/CVE%20detail.md
|
|
CVE-2023-27647 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27647/CVE%20detail.md
|
|
CVE-2023-27648 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27648/CVE%20detail.md
|
|
CVE-2023-27649 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27649/CVE%20detail.md
|
|
CVE-2023-2765 - https://github.com/eckert-lcc/cve/blob/main/Weaver%20oa.md
|
|
CVE-2023-2765 - https://vuldb.com/?id.229270
|
|
CVE-2023-27651 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27651/CVE%20detail.md
|
|
CVE-2023-27655 - https://forum.xpdfreader.com/viewtopic.php?t=42398
|
|
CVE-2023-27655 - https://github.com/keepinggg/poc/blob/main/poc_of_xpdf/id2
|
|
CVE-2023-27655 - https://github.com/keepinggg/poc/tree/main/poc_of_xpdf
|
|
CVE-2023-2766 - https://github.com/8079048q/cve/blob/main/weaveroa.md
|
|
CVE-2023-2769 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Serviced-Providerd-Managementd-Systemd--d-SQLd-injections.md
|
|
CVE-2023-2770 - https://github.com/tht1997/CVE_2023/blob/main/online_exam/kelasdosen.md
|
|
CVE-2023-27707 - https://srpopty.github.io/2023/02/27/DedeCMS-V5.7.160-Backend-SQLi-group/
|
|
CVE-2023-27709 - https://srpopty.github.io/2023/02/27/DedeCMS-V5.7.160-Backend-SQLi-story/
|
|
CVE-2023-2771 - https://github.com/tht1997/CVE_2023/blob/main/online_exam/kelasdosen.md
|
|
CVE-2023-27711 - https://github.com/typecho/typecho/issues/1539
|
|
CVE-2023-27711 - https://srpopty.github.io/2023/03/02/Typecho-V1.2.0-Backend-Reflected-XSS-cid/
|
|
CVE-2023-27718 - https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/1.md
|
|
CVE-2023-27719 - https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/2.md
|
|
CVE-2023-27720 - https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/4.md
|
|
CVE-2023-27727 - https://github.com/nginx/njs/issues/617
|
|
CVE-2023-27728 - https://github.com/nginx/njs/issues/618
|
|
CVE-2023-27729 - https://github.com/nginx/njs/issues/619
|
|
CVE-2023-27730 - https://github.com/nginx/njs/issues/615
|
|
CVE-2023-27739 - https://threeshield.ca/easyxdm-2.5.20.html
|
|
CVE-2023-27742 - https://github.com/G37SYS73M/CVE-2023-27742
|
|
CVE-2023-27744 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf
|
|
CVE-2023-27745 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf
|
|
CVE-2023-27754 - https://github.com/10cksYiqiyinHangzhouTechnology/vox2mesh_poc
|
|
CVE-2023-27775 - https://github.com/marcovntr/CVE/blob/main/2023/CVE-2023-27775/CVE-2023-27775.md
|
|
CVE-2023-27779 - https://docs.google.com/document/d/1kGzmc6AOCfRzJf9mDz4emkhQj84Y1XemmAMZjYK32-o/edit?usp=sharing
|
|
CVE-2023-27781 - https://github.com/tjko/jpegoptim/issues/132
|
|
CVE-2023-27783 - https://github.com/appneta/tcpreplay/issues/780
|
|
CVE-2023-27784 - https://github.com/appneta/tcpreplay/issues/787
|
|
CVE-2023-2779 - http://packetstormsecurity.com/files/173053/WordPress-Super-Socializer-7.13.52-Cross-Site-Scripting.html
|
|
CVE-2023-27796 - https://github.com/winmt/my-vuls/tree/main/RG-EW%20PRO%20Series
|
|
CVE-2023-2780 - https://huntr.dev/bounties/b12b0073-0bb0-4bd1-8fc2-ec7f17fd7689
|
|
CVE-2023-27801 - https://hackmd.io/@0dayResearch/DelDNSHnList
|
|
CVE-2023-27802 - https://hackmd.io/@0dayResearch/EditvsList
|
|
CVE-2023-27803 - https://hackmd.io/@0dayResearch/EdittriggerList
|
|
CVE-2023-27804 - https://hackmd.io/@0dayResearch/DelvsList
|
|
CVE-2023-27805 - https://hackmd.io/@0dayResearch/EditSTList
|
|
CVE-2023-27806 - https://hackmd.io/@0dayResearch/ipqos_lanip_dellist
|
|
CVE-2023-27807 - https://hackmd.io/@0dayResearch/Delstlist
|
|
CVE-2023-27808 - https://hackmd.io/@0dayResearch/DeltriggerList
|
|
CVE-2023-27810 - https://hackmd.io/@0dayResearch/ipqos_lanip_editlist
|
|
CVE-2023-27821 - https://github.com/luelueking/Databasir-1.0.7-vuln-poc
|
|
CVE-2023-27821 - https://github.com/vran-dev/databasir/issues/269
|
|
CVE-2023-27823 - https://packetstormsecurity.com/files/172276/Optoma-1080PSTX-Firmware-C02-Authentication-Bypass.html
|
|
CVE-2023-27826 - https://www.exploit-db.com/exploits/51311
|
|
CVE-2023-27830 - https://medium.com/nestedif/vulnerability-disclosure-privilege-escalation-tightvnc-8165208cce
|
|
CVE-2023-27842 - http://blog.tristaomarinho.com/extplorer-2-1-15-insecure-permissions-following-remote-code-execution/
|
|
CVE-2023-27842 - https://github.com/tristao-marinho/CVE-2023-27842
|
|
CVE-2023-27842 - https://github.com/tristao-marinho/CVE-2023-27842/blob/main/README.md
|
|
CVE-2023-27843 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/25/askforaquote.html
|
|
CVE-2023-27847 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/23/xipblog.html
|
|
CVE-2023-27848 - https://github.com/omnitaint/Vulnerability-Reports/blob/9d65add2bca71ed6d6b2e281ee6790a12504ff8e/reports/broccoli-compass/report.md
|
|
CVE-2023-27849 - https://github.com/omnitaint/Vulnerability-Reports/blob/2211ea4712f24d20b7f223fb737910fdfb041edb/reports/rails-routes-to-json/report.md
|
|
CVE-2023-2787 - https://mattermost.com/security-updates/
|
|
CVE-2023-2788 - https://mattermost.com/security-updates/
|
|
CVE-2023-27882 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1733
|
|
CVE-2023-2789 - https://github.com/DaisyPo/fuzzing-vulncollect/blob/main/cflow/stack-overflow/parser.c/README.md
|
|
CVE-2023-2789 - https://github.com/DaisyPo/fuzzing-vulncollect/files/11343936/poc-file.zip
|
|
CVE-2023-2789 - https://vuldb.com/?id.229373
|
|
CVE-2023-27890 - http://packetstormsecurity.com/files/171421/MyBB-Export-User-2.0-Cross-Site-Scripting.html
|
|
CVE-2023-27892 - https://blog.inhq.net/posts/keepkey-CVE-2023-27892/
|
|
CVE-2023-27893 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-27894 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-27895 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-27896 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-27897 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-2791 - https://mattermost.com/security-updates/
|
|
CVE-2023-2792 - https://mattermost.com/security-updates/
|
|
CVE-2023-2793 - https://mattermost.com/security-updates/
|
|
CVE-2023-27935 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1676
|
|
CVE-2023-2796 - http://packetstormsecurity.com/files/173984/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html
|
|
CVE-2023-2797 - https://mattermost.com/security-updates/
|
|
CVE-2023-27974 - https://flashpoint.io/blog/bitwarden-password-pilfering/
|
|
CVE-2023-2804 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/668#issuecomment-1492586118
|
|
CVE-2023-2804 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/675
|
|
CVE-2023-2808 - https://mattermost.com/security-updates/
|
|
CVE-2023-28095 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
|
CVE-2023-28096 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
|
CVE-2023-28097 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
|
CVE-2023-28098 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
|
CVE-2023-28100 - https://marc.info/?l=oss-security&m=167879021709955&w=2
|
|
CVE-2023-28102 - https://securitylab.github.com/advisories/GHSL-2022-094_discordrb/
|
|
CVE-2023-28106 - https://huntr.dev/bounties/fa77d780-9b23-404b-8c44-12108881d11a
|
|
CVE-2023-28115 - https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc
|
|
CVE-2023-28121 - https://www.rcesecurity.com/2023/07/patch-diffing-cve-2023-28121-to-compromise-a-woocommerce/
|
|
CVE-2023-28128 - http://packetstormsecurity.com/files/172398/Ivanti-Avalanche-FileStoreConfig-Shell-Upload.html
|
|
CVE-2023-28130 - http://packetstormsecurity.com/files/173918/Checkpoint-Gaia-Portal-R81.10-Remote-Command-Execution.html
|
|
CVE-2023-28130 - http://seclists.org/fulldisclosure/2023/Aug/4
|
|
CVE-2023-28130 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-28131 - https://www.darkreading.com/endpoint/oauth-flaw-in-expo-platform-affects-hundreds-of-third-party-sites-apps
|
|
CVE-2023-2814 - https://vuldb.com/?id.229428
|
|
CVE-2023-28140 - https://www.qualys.com/security-advisories/
|
|
CVE-2023-28141 - https://www.qualys.com/security-advisories/
|
|
CVE-2023-28142 - https://www.qualys.com/security-advisories/
|
|
CVE-2023-28143 - https://qualys.com/security-advisories
|
|
CVE-2023-28153 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-kiddoware-kids-place-parental-control-android-app/
|
|
CVE-2023-28159 - https://bugzilla.mozilla.org/show_bug.cgi?id=1783561
|
|
CVE-2023-28163 - https://bugzilla.mozilla.org/show_bug.cgi?id=1817768
|
|
CVE-2023-2817 - https://www.tenable.com/security/research/tra-2023-20,
|
|
CVE-2023-28180 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1679
|
|
CVE-2023-28248 - http://packetstormsecurity.com/files/172283/Windows-Kernel-CmpCleanupLightWeightPrepare-Use-After-Free.html
|
|
CVE-2023-28252 - http://packetstormsecurity.com/files/174668/Windows-Common-Log-File-System-Driver-clfs.sys-Privilege-Escalation.html
|
|
CVE-2023-2826 - https://vuldb.com/?id.229612
|
|
CVE-2023-2827 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-28271 - http://packetstormsecurity.com/files/172298/Windows-Kernel-Uninitialized-Memory-Pointer-Disclosure.html
|
|
CVE-2023-28285 - http://packetstormsecurity.com/files/173127/Microsoft-Office-Remote-Code-Execution.html
|
|
CVE-2023-28285 - http://packetstormsecurity.com/files/173140/Microsoft-365-MSO-2305-Build-16.0.16501.20074-Remote-Code-Execution.html
|
|
CVE-2023-28288 - http://packetstormsecurity.com/files/173126/Microsoft-SharePoint-Enterprise-Server-2016-Spoofing.html
|
|
CVE-2023-28293 - http://packetstormsecurity.com/files/172300/Windows-Kernel-CmpDoReDoCreateKey-CmpDoReOpenTransKey-Out-Of-Bounds-Read.html
|
|
CVE-2023-28293 - http://packetstormsecurity.com/files/173135/Microsoft-Windows-11-22h2-Kernel-Privilege-Escalation.html
|
|
CVE-2023-2831 - https://mattermost.com/security-updates/
|
|
CVE-2023-2832 - https://huntr.dev/bounties/37b80402-0edf-4f26-a668-b6f8b48dcdfb
|
|
CVE-2023-28343 - http://packetstormsecurity.com/files/171775/Altenergy-Power-Control-Software-C1.2.5-Command-Injection.html
|
|
CVE-2023-28343 - https://github.com/ahmedalroky/Disclosures/blob/main/apesystems/os_command_injection.md
|
|
CVE-2023-28344 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
|
CVE-2023-28344 - https://research.nccgroup.com/?research=Technical%20advisories
|
|
CVE-2023-28345 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
|
CVE-2023-28345 - https://research.nccgroup.com/?research=Technical%20advisories
|
|
CVE-2023-28346 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
|
CVE-2023-28346 - https://research.nccgroup.com/?research=Technical%20advisories
|
|
CVE-2023-28347 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
|
CVE-2023-28347 - https://research.nccgroup.com/?research=Technical%20advisories
|
|
CVE-2023-28348 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
|
CVE-2023-28348 - https://research.nccgroup.com/?research=Technical%20advisories
|
|
CVE-2023-28349 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
|
CVE-2023-28349 - https://research.nccgroup.com/?research=Technical%20advisories
|
|
CVE-2023-28350 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
|
CVE-2023-28350 - https://research.nccgroup.com/?research=Technical%20advisories
|
|
CVE-2023-28351 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
|
CVE-2023-28351 - https://research.nccgroup.com/?research=Technical%20advisories
|
|
CVE-2023-28352 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
|
CVE-2023-28352 - https://research.nccgroup.com/?research=Technical%20advisories
|
|
CVE-2023-28353 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
|
CVE-2023-28353 - https://research.nccgroup.com/?research=Technical%20advisories
|
|
CVE-2023-28365 - https://community.ui.com/releases/Security-Advisory-Bulletin-031-031/8c85fc64-e9a8-4082-9ec4-56b14effd545
|
|
CVE-2023-2837 - https://huntr.dev/bounties/a6bfd1b2-aba8-4c6f-90c4-e95b1831cb17
|
|
CVE-2023-28379 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1738
|
|
CVE-2023-2838 - https://huntr.dev/bounties/711e0988-5345-4c01-a2fe-1179604dd07f
|
|
CVE-2023-28381 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1779
|
|
CVE-2023-2839 - https://huntr.dev/bounties/42dce889-f63d-4ea9-970f-1f20fc573d5f
|
|
CVE-2023-28391 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1732
|
|
CVE-2023-28393 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1742
|
|
CVE-2023-2840 - https://huntr.dev/bounties/21926fc2-6eb1-4e24-8a36-e60f487d0257
|
|
CVE-2023-28428 - https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-68x8-9phf-j7jf
|
|
CVE-2023-28430 - https://securitylab.github.com/advisories/GHSL-2023-051_React_Native_OneSignal_SDK/
|
|
CVE-2023-28436 - https://tailscale.com/security-bulletins/#ts-2023-003
|
|
CVE-2023-2844 - https://huntr.dev/bounties/6644b36e-603d-4dbe-8ee2-5df8b8fb2e22
|
|
CVE-2023-28443 - https://github.com/directus/directus/commit/349536303983ccba68ecb3e4fb35315424011afc
|
|
CVE-2023-28443 - https://github.com/directus/directus/security/advisories/GHSA-8vg2-wf3q-mwv7
|
|
CVE-2023-28446 - https://github.com/denoland/deno/security/advisories/GHSA-vq67-rp93-65qf
|
|
CVE-2023-2845 - https://huntr.dev/bounties/ac10e81c-998e-4425-9d74-b985d9b0254c
|
|
CVE-2023-28450 - https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=blob;f=CHANGELOG
|
|
CVE-2023-28466 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962
|
|
CVE-2023-28485 - http://packetstormsecurity.com/files/172649/Wekan-6.74-Cross-Site-Scripting.html
|
|
CVE-2023-28485 - https://wekan.github.io/hall-of-fame/filebleed/
|
|
CVE-2023-28488 - https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488
|
|
CVE-2023-28489 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html
|
|
CVE-2023-28489 - http://seclists.org/fulldisclosure/2023/Jul/14
|
|
CVE-2023-2850 - https://github.com/NodeBB/NodeBB/commit/51096ad2345fb1d1380bec0a447113489ef6c359
|
|
CVE-2023-28501 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
|
CVE-2023-28502 - http://packetstormsecurity.com/files/171853/Rocket-Software-Unidata-8.2.4-Build-3003-Buffer-Overflow.html
|
|
CVE-2023-28502 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
|
CVE-2023-28503 - http://packetstormsecurity.com/files/171854/Rocket-Software-Unidata-udadmin_server-Authentication-Bypass.html
|
|
CVE-2023-28503 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
|
CVE-2023-28504 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
|
CVE-2023-28505 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
|
CVE-2023-28506 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
|
CVE-2023-28507 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
|
CVE-2023-28508 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
|
CVE-2023-28509 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
|
CVE-2023-28528 - http://packetstormsecurity.com/files/172458/IBM-AIX-7.2-inscout-Privilege-Escalation.html
|
|
CVE-2023-2859 - https://huntr.dev/bounties/d7b8ea75-c74a-4721-89bb-12e5c80fb0ba
|
|
CVE-2023-28613 - http://packetstormsecurity.com/files/172177/Shannon-Baseband-Integer-Overflow.html
|
|
CVE-2023-28616 - https://advisories.stormshield.eu/2023-006
|
|
CVE-2023-28627 - https://github.com/pymedusa/Medusa/security/advisories/GHSA-6589-x6f5-cgg9
|
|
CVE-2023-28628 - https://github.com/lambdaisland/uri/security/advisories/GHSA-cp4w-6x4w-v2h5
|
|
CVE-2023-2863 - https://www.youtube.com/watch?v=V0u9C5RVSic
|
|
CVE-2023-28637 - https://github.com/dataease/dataease/security/advisories/GHSA-8wg2-9gwc-5fx2
|
|
CVE-2023-28659 - https://www.tenable.com/security/research/tra-2023-2
|
|
CVE-2023-28660 - https://www.tenable.com/security/research/tra-2023-2
|
|
CVE-2023-28661 - https://www.tenable.com/security/research/tra-2023-2
|
|
CVE-2023-28662 - https://www.tenable.com/security/research/tra-2023-2
|
|
CVE-2023-28663 - https://www.tenable.com/security/research/tra-2023-2
|
|
CVE-2023-28664 - https://www.tenable.com/security/research/tra-2023-3
|
|
CVE-2023-28665 - https://www.tenable.com/security/research/tra-2023-3
|
|
CVE-2023-28666 - https://www.tenable.com/security/research/tra-2023-3
|
|
CVE-2023-28667 - https://www.tenable.com/security/research/tra-2023-7
|
|
CVE-2023-2870 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2870
|
|
CVE-2023-2871 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2871
|
|
CVE-2023-2872 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2872
|
|
CVE-2023-28725 - https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/2885222430/Security+Incident+March+17-18th+2023
|
|
CVE-2023-28725 - https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/951418958/Update+CAS
|
|
CVE-2023-2873 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2873
|
|
CVE-2023-2874 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2874
|
|
CVE-2023-28744 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1739
|
|
CVE-2023-2875 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2875
|
|
CVE-2023-28761 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-28762 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-28763 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-28764 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-28765 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-28770 - http://packetstormsecurity.com/files/172277/Zyxel-Chained-Remote-Code-Execution.html
|
|
CVE-2023-28771 - http://packetstormsecurity.com/files/172820/Zyxel-IKE-Packet-Decoder-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2023-28772 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
|
|
CVE-2023-28809 - http://packetstormsecurity.com/files/174506/Hikvision-Access-Control-Session-Hijacking.html
|
|
CVE-2023-2881 - https://huntr.dev/bounties/db6c32f4-742e-4262-8fd5-cefd0f133416
|
|
CVE-2023-28848 - https://github.com/nextcloud/security-advisories/security/advisories/GHSA-52hv-xw32-wf7f
|
|
CVE-2023-28850 - https://huntr.dev/bounties/5529f51e-e40f-46f1-887b-c9dbebab4f06/
|
|
CVE-2023-28853 - http://www.openwall.com/lists/oss-security/2023/07/06/6
|
|
CVE-2023-28853 - https://github.com/mastodon/mastodon/security/advisories/GHSA-38g9-pfm9-gfqv
|
|
CVE-2023-28868 - https://herolab.usd.de/en/security-advisories/usd-2022-0002/
|
|
CVE-2023-28869 - https://herolab.usd.de/en/security-advisories/usd-2022-0003/
|
|
CVE-2023-28870 - https://herolab.usd.de/en/security-advisories/usd-2022-0004/
|
|
CVE-2023-28871 - https://herolab.usd.de/en/security-advisories/usd-2022-0005/
|
|
CVE-2023-28872 - https://herolab.usd.de/en/security-advisories/usd-2022-0006/
|
|
CVE-2023-28873 - https://herolab.usd.de/en/security-advisories/usd-2022-0032/
|
|
CVE-2023-28874 - https://herolab.usd.de/en/security-advisories/usd-2022-0033/
|
|
CVE-2023-28875 - https://herolab.usd.de/security-advisories/usd-2022-0009/
|
|
CVE-2023-28876 - https://herolab.usd.de/security-advisories/usd-2022-0010/
|
|
CVE-2023-28879 - http://www.openwall.com/lists/oss-security/2023/04/12/4
|
|
CVE-2023-28879 - https://bugs.ghostscript.com/show_bug.cgi?id=706494
|
|
CVE-2023-28968 - https://www.juniper.net/documentation/us/en/software/jdpi/release-notes/jdpi-decoder-release-notes-october-2022/jdpi-decoder-release-notes-october-2022.pdf
|
|
CVE-2023-2900 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine-Rapid-development-platform-has-weak-password-vulnerability.md
|
|
CVE-2023-29004 - https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-7qqj-xhvr-46fv
|
|
CVE-2023-2901 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine%20rapid%20development%20platform%20User-GetGridJson%20has%20unauthorized%20access%20vulnerability.md
|
|
CVE-2023-2901 - https://vuldb.com/?id.229975
|
|
CVE-2023-29010 - https://github.com/Budibase/budibase/security/advisories/GHSA-9xg2-9mcv-985p
|
|
CVE-2023-29017 - https://gist.github.com/seongil-wi/2a44e082001b959bfe304b62121fb76d
|
|
CVE-2023-29017 - https://github.com/patriksimek/vm2/issues/515
|
|
CVE-2023-29017 - https://github.com/patriksimek/vm2/security/advisories/GHSA-7jxr-cg7f-gpgv
|
|
CVE-2023-2902 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The%20NFine%20rapid%20development%20platform%20Organize-GetTreeGridJson%20has%20unauthorized%20access%20vulnerability.md
|
|
CVE-2023-2902 - https://vuldb.com/?id.229976
|
|
CVE-2023-29020 - https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#synchronizer-token-pattern
|
|
CVE-2023-29020 - https://owasp.org/www-community/attacks/csrf
|
|
CVE-2023-2903 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine%20rapid%20development%20platform%20Role-GetGridJson%20has%20unauthorized%20access%20vulnerability.md
|
|
CVE-2023-2903 - https://vuldb.com/?id.229977
|
|
CVE-2023-2904 - https://www.hidglobal.com/security-center
|
|
CVE-2023-29048 - http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html
|
|
CVE-2023-29049 - http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html
|
|
CVE-2023-2905 - https://takeonme.org/cves/CVE-2023-2905.html
|
|
CVE-2023-29050 - http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html
|
|
CVE-2023-29051 - http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html
|
|
CVE-2023-29052 - http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html
|
|
CVE-2023-2906 - https://gitlab.com/wireshark/wireshark/-/issues/19229
|
|
CVE-2023-2906 - https://takeonme.org/cves/CVE-2023-2906.html
|
|
CVE-2023-2908 - https://gitlab.com/libtiff/libtiff/-/merge_requests/479
|
|
CVE-2023-29084 - http://packetstormsecurity.com/files/172755/ManageEngine-ADManager-Plus-Command-Injection.html
|
|
CVE-2023-29085 - http://packetstormsecurity.com/files/172288/Shannon-Baseband-SIP-Status-Line-Stack-Buffer-Overflow.html
|
|
CVE-2023-29086 - http://packetstormsecurity.com/files/172293/Shannon-Baseband-SIP-Min-SE-Header-Stack-Buffer-Overflow.html
|
|
CVE-2023-29087 - http://packetstormsecurity.com/files/172295/Shannon-Baseband-SIP-Retry-After-Header-Heap-Buffer-Overflow.html
|
|
CVE-2023-29088 - http://packetstormsecurity.com/files/172289/Shannon-Baseband-SIP-Session-Expires-Header-Stack-Buffer-Overflow.html
|
|
CVE-2023-29089 - http://packetstormsecurity.com/files/172292/Shannon-Baseband-Negative-Size-Memcpy-Out-Of-Bounds-Read.html
|
|
CVE-2023-29090 - http://packetstormsecurity.com/files/172287/Shannon-Baseband-Via-Header-Decoder-Stack-Buffer-Overflow.html
|
|
CVE-2023-29091 - http://packetstormsecurity.com/files/172282/Shannon-Baseband-SIP-URI-Decoder-Stack-Buffer-Overflow.html
|
|
CVE-2023-29108 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-29109 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-29110 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-29111 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-29112 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-29159 - https://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px
|
|
CVE-2023-29185 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-29186 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-29187 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-29188 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-29189 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-29199 - https://gist.github.com/leesh3288/f05730165799bf56d70391f3d9ea187c
|
|
CVE-2023-29199 - https://github.com/patriksimek/vm2/security/advisories/GHSA-xj72-wvfv-8985
|
|
CVE-2023-29205 - https://jira.xwiki.org/browse/XWIKI-18568
|
|
CVE-2023-29209 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9pc2-x9qf-7j2q
|
|
CVE-2023-29210 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p9mj-v5mf-m82x
|
|
CVE-2023-29211 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-w7v9-fc49-4qg4
|
|
CVE-2023-29212 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c5f4-p5wv-2475
|
|
CVE-2023-29214 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qx9h-c5v6-ghqh
|
|
CVE-2023-2923 - https://github.com/GleamingEyes/vul/blob/main/1.md
|
|
CVE-2023-2924 - https://github.com/RCEraser/cve/blob/main/SimField.md
|
|
CVE-2023-2925 - https://vuldb.com/?id.230079
|
|
CVE-2023-2927 - https://github.com/HuBenLab/HuBenVulList/blob/main/JiZhiCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF).md
|
|
CVE-2023-2928 - https://vuldb.com/?id.230083
|
|
CVE-2023-2934 - http://packetstormsecurity.com/files/173259/Chrome-Mojo-Message-Validation-Bypass.html
|
|
CVE-2023-2935 - http://packetstormsecurity.com/files/173196/Chrome-v8-internal-Object-SetPropertyWithAccessor-Type-Confusion.html
|
|
CVE-2023-2936 - http://packetstormsecurity.com/files/173197/Chrome-V8-Type-Confusion.html
|
|
CVE-2023-29374 - https://github.com/hwchase17/langchain/issues/1026
|
|
CVE-2023-29383 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/
|
|
CVE-2023-29383 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797
|
|
CVE-2023-29401 - https://github.com/gin-gonic/gin/issues/3555
|
|
CVE-2023-2942 - https://huntr.dev/bounties/dd56e7a0-9dff-48fc-bc59-9a22d91869eb
|
|
CVE-2023-2943 - https://huntr.dev/bounties/4190f944-dc2c-4624-9abf-31479456faa9
|
|
CVE-2023-29439 - https://lourcode.kr/posts/CVE-2023-29439-Analysis?_s_id=cve
|
|
CVE-2023-2944 - https://huntr.dev/bounties/0d67dcb1-acc0-4d5d-bb69-a09d1bc9fa1d
|
|
CVE-2023-2945 - https://huntr.dev/bounties/62de71bd-333d-4593-91a5-534ef7f0c435
|
|
CVE-2023-29459 - http://packetstormsecurity.com/files/172701/FC-Red-Bull-Salzburg-App-5.1.9-R-Improper-Authorization.html
|
|
CVE-2023-2946 - https://huntr.dev/bounties/e550f4b0-945c-4886-af7f-ee0dc30b2a08
|
|
CVE-2023-29465 - https://github.com/sagemath/FlintQS/issues/3
|
|
CVE-2023-2947 - https://huntr.dev/bounties/52534def-acab-4200-a79a-89ef4ce6a0b0
|
|
CVE-2023-29478 - https://github.com/Exopteron/BiblioRCE
|
|
CVE-2023-2948 - https://huntr.dev/bounties/2393e4d9-9e9f-455f-bf50-f20f77b0a64d
|
|
CVE-2023-29489 - https://blog.assetnote.io/2023/04/26/xss-million-websites-cpanel/
|
|
CVE-2023-2949 - https://huntr.dev/bounties/3842486f-38b1-4150-9f78-b81d0ae580c4
|
|
CVE-2023-29491 - http://www.openwall.com/lists/oss-security/2023/04/19/11
|
|
CVE-2023-2950 - https://huntr.dev/bounties/612d13cf-2ef9-44ea-b8fb-e797948a9a86
|
|
CVE-2023-29505 - https://excellium-services.com/cert-xlm-advisory/CVE-2023-29505
|
|
CVE-2023-29506 - https://jira.xwiki.org/browse/XWIKI-20335
|
|
CVE-2023-29510 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4v38-964c-xjmw
|
|
CVE-2023-29517 - https://jira.xwiki.org/browse/XWIKI-20324
|
|
CVE-2023-29519 - https://jira.xwiki.org/browse/XWIKI-20364
|
|
CVE-2023-29523 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx
|
|
CVE-2023-29528 - https://jira.xwiki.org/browse/XWIKI-20348
|
|
CVE-2023-29532 - https://bugzilla.mozilla.org/show_bug.cgi?id=1806394
|
|
CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1816007
|
|
CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1816059
|
|
CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821155
|
|
CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821576
|
|
CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821906
|
|
CVE-2023-29537 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823365
|
|
CVE-2023-2954 - https://huntr.dev/bounties/47f08086-aaae-4ca7-b0ca-24c616d3ad7d
|
|
CVE-2023-29541 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810191
|
|
CVE-2023-29542 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810793
|
|
CVE-2023-29542 - https://bugzilla.mozilla.org/show_bug.cgi?id=1815062
|
|
CVE-2023-29548 - https://bugzilla.mozilla.org/show_bug.cgi?id=1822754
|
|
CVE-2023-29562 - https://github.com/lzd521/IOT/tree/main/TP-Link%20WPA7510
|
|
CVE-2023-29566 - https://github.com/omnitaint/Vulnerability-Reports/blob/ec3645003c7f8996459b5b24c722474adc2d599f/reports/dawnsparks-node-tesseract/report.md
|
|
CVE-2023-29569 - https://github.com/cesanta/mjs/issues/239
|
|
CVE-2023-29569 - https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_ffi/readme.md
|
|
CVE-2023-29570 - https://github.com/cesanta/mjs/issues/240
|
|
CVE-2023-29570 - https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_fii2/readme.md
|
|
CVE-2023-29571 - https://github.com/cesanta/mjs/issues/241
|
|
CVE-2023-29571 - https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_gc/readme.md
|
|
CVE-2023-29573 - https://github.com/axiomatic-systems/Bento4/issues/840
|
|
CVE-2023-29573 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp4info/readme.md
|
|
CVE-2023-29574 - https://github.com/axiomatic-systems/Bento4/issues/841
|
|
CVE-2023-29574 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42avc/readme.md
|
|
CVE-2023-29575 - https://github.com/axiomatic-systems/Bento4/issues/842
|
|
CVE-2023-29575 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42aac/readme.md
|
|
CVE-2023-29576 - https://github.com/axiomatic-systems/Bento4/issues/844
|
|
CVE-2023-29576 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp4decrypt/sigv/readme.md
|
|
CVE-2023-29578 - https://github.com/TechSmith/mp4v2/issues/74
|
|
CVE-2023-29578 - https://github.com/z1r00/fuzz_vuln/blob/main/mp4v2/heap-buffer-overflow/mp4property.cpp/readme.md
|
|
CVE-2023-29579 - https://github.com/yasm/yasm/issues/214
|
|
CVE-2023-29579 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-buffer-overflow/yasm/readmd.md
|
|
CVE-2023-29580 - https://github.com/yasm/yasm/issues/215
|
|
CVE-2023-29580 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/yasm_expr_create/readmd.md
|
|
CVE-2023-29581 - https://github.com/yasm/yasm/issues/216
|
|
CVE-2023-29581 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/delete_Token/readme.md
|
|
CVE-2023-29582 - https://github.com/yasm/yasm/issues/217
|
|
CVE-2023-29582 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr1/readme.md
|
|
CVE-2023-29583 - https://github.com/yasm/yasm/issues/218
|
|
CVE-2023-29583 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr5/readme.md
|
|
CVE-2023-29584 - https://github.com/enzo1982/mp4v2/issues/30
|
|
CVE-2023-29584 - https://github.com/z1r00/fuzz_vuln/blob/main/mp4v2/heap-buffer-overflow/MP4GetVideoProfileLevel/readme.md
|
|
CVE-2023-29586 - https://packetstormsecurity.com/files/143984/TeraCopyService-3.1-Unquoted-Service-Path-Privilege-Escalation.html
|
|
CVE-2023-29623 - https://portswigger.net/web-security/cross-site-scripting/reflected
|
|
CVE-2023-29631 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/13/jmsslider.html
|
|
CVE-2023-2964 - https://wpscan.com/vulnerability/97aac334-5323-41bb-90f0-d180bcc9162f
|
|
CVE-2023-29656 - https://ramihub.github.io/
|
|
CVE-2023-29657 - http://blog.tristaomarinho.com/extplorer-2-1-15-arbitrary-file-upload/
|
|
CVE-2023-29659 - https://github.com/strukturag/libheif/issues/794
|
|
CVE-2023-29665 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/boSetPasswdSettings
|
|
CVE-2023-2968 - https://research.jfrog.com/vulnerabilities/undefined-variable-usage-in-proxy-leads-to-remote-denial-of-service-xray-520917
|
|
CVE-2023-29680 - https://medium.com/@0ta/tenda-n301-v6-cve-2023-29680-cve-2023-29681-a40f7ae6dc62
|
|
CVE-2023-29680 - https://www.youtube.com/watch?v=m7ZHfFcSKpU&ab_channel=0ta
|
|
CVE-2023-29681 - https://medium.com/@0ta/tenda-n301-v6-cve-2023-29680-cve-2023-29681-a40f7ae6dc62
|
|
CVE-2023-29681 - https://www.youtube.com/watch?v=Xy9_hmpvvA4&ab_channel=0ta
|
|
CVE-2023-29689 - http://packetstormsecurity.com/files/174088/Pyro-CMS-3.9-Server-Side-Template-Injection.html
|
|
CVE-2023-29693 - https://github.com/Stevenbaga/fengsha/blob/main/H3C/GR-1200W/SetTftpUpgrad.md
|
|
CVE-2023-29696 - https://github.com/Stevenbaga/fengsha/blob/main/H3C/GR-1200W/aVersionSet.md
|
|
CVE-2023-2971 - https://starlabs.sg/advisories/23/23-2971/
|
|
CVE-2023-29712 - https://info.vadesecure.com/hubfs/Ressource%20Marketing%20Website/Datasheet/EN/Vade_Secure_DS_Gateway_EN.pdf
|
|
CVE-2023-29712 - https://labs.yarix.com/2023/05/vade-secure-gateway-multiple-xss-cve-2023-29712-cve-2023-29713-cve-2023-29714/
|
|
CVE-2023-29713 - https://info.vadesecure.com/hubfs/Ressource%20Marketing%20Website/Datasheet/EN/Vade_Secure_DS_Gateway_EN.pdf
|
|
CVE-2023-29714 - https://info.vadesecure.com/hubfs/Ressource%20Marketing%20Website/Datasheet/EN/Vade_Secure_DS_Gateway_EN.pdf
|
|
CVE-2023-2972 - https://huntr.dev/bounties/009f1cd9-401c-49a7-bd08-be35cff6faef
|
|
CVE-2023-29722 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29722/CVE%20detail.md
|
|
CVE-2023-29724 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29724/CVE%20detail.md
|
|
CVE-2023-29726 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29726/CVE%20detail.md
|
|
CVE-2023-29731 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29731/CVE%20detail.md
|
|
CVE-2023-29732 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29732/CVE%20detail.md
|
|
CVE-2023-29733 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29733/CVE%20detail.md
|
|
CVE-2023-29734 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29734/CVE%20detail.md
|
|
CVE-2023-29735 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29735/CVE%20detail.md
|
|
CVE-2023-29736 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29736/CVE%20detail.md
|
|
CVE-2023-29738 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29738/CVE%20detail.md
|
|
CVE-2023-29738 - https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid
|
|
CVE-2023-29739 - https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid
|
|
CVE-2023-29740 - https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid
|
|
CVE-2023-29741 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29741/CVE%20detail.md
|
|
CVE-2023-29742 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29742/CVE%20detail.md
|
|
CVE-2023-29743 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29743/CVE%20detail.md
|
|
CVE-2023-29745 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29745/CVE%20detail.md
|
|
CVE-2023-29746 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29746/CVE%20detail.md
|
|
CVE-2023-29748 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29748/CVE%20detail.md
|
|
CVE-2023-29753 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29753/CVE%20detailed.md
|
|
CVE-2023-29756 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29756/CVE%20detailed.md
|
|
CVE-2023-29759 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29759/CVE%20detailed.md
|
|
CVE-2023-29766 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29766/CVE%20detailed.md
|
|
CVE-2023-29770 - https://github.com/sapplica/sentrifugo/issues/384
|
|
CVE-2023-2978 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be
|
|
CVE-2023-2979 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be
|
|
CVE-2023-2980 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be
|
|
CVE-2023-29808 - https://packetstormsecurity.com/files/172145/Companymaps-8.0-Cross-Site-Scripting.html
|
|
CVE-2023-29809 - https://packetstormsecurity.com/files/172146/Companymaps-8.0-SQL-Injection.html
|
|
CVE-2023-29809 - https://www.exploit-db.com/exploits/51422
|
|
CVE-2023-2981 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be
|
|
CVE-2023-29824 - https://github.com/scipy/scipy/issues/14713
|
|
CVE-2023-29824 - https://github.com/scipy/scipy/issues/14713#issuecomment-1629468565
|
|
CVE-2023-29827 - https://github.com/mde/ejs/issues/720
|
|
CVE-2023-2983 - https://huntr.dev/bounties/6b2f33d3-2fd0-4d2d-ad7b-2c1e2417eeb1
|
|
CVE-2023-2984 - https://huntr.dev/bounties/5df8b951-e2f1-4548-a7e3-601186e1b191
|
|
CVE-2023-29842 - http://packetstormsecurity.com/files/175105/ChurchCRM-4.5.4-SQL-Injection.html
|
|
CVE-2023-29842 - https://github.com/arvandy/CVE/blob/main/CVE-2023-29842/CVE-2023-29842.md
|
|
CVE-2023-29842 - https://github.com/arvandy/CVE/blob/main/CVE-2023-29842/CVE-2023-29842.py
|
|
CVE-2023-29847 - https://github.com/MegaTKC/AeroCMS/issues/11
|
|
CVE-2023-29848 - http://packetstormsecurity.com/files/171899/Bang-Resto-1.0-Cross-Site-Scripting.html
|
|
CVE-2023-29849 - http://packetstormsecurity.com/files/171900/Bang-Resto-1.0-SQL-Injection.html
|
|
CVE-2023-29850 - https://github.com/slims/slims9_bulian/issues/186
|
|
CVE-2023-2986 - http://packetstormsecurity.com/files/172966/WordPress-Abandoned-Cart-Lite-For-WooCommerce-5.14.2-Authentication-Bypass.html
|
|
CVE-2023-2986 - http://packetstormsecurity.com/files/173018/WordPress-Abandoned-Cart-Lite-For-WooCommerce-5.14.2-Authentication-Bypass.html
|
|
CVE-2023-2986 - https://github.com/Ayantaker/CVE-2023-2986
|
|
CVE-2023-2986 - https://github.com/TycheSoftwares/woocommerce-abandoned-cart/pull/885#issuecomment-1601813615
|
|
CVE-2023-29863 - https://medium.com/@waadalbyalii5/sql-injection-in-wsdl-file-c66fa00042f5
|
|
CVE-2023-2989 - https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/
|
|
CVE-2023-2990 - https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/
|
|
CVE-2023-29905 - https://hackmd.io/@0dayResearch/H1IFt1Jgn
|
|
CVE-2023-29906 - https://hackmd.io/@0dayResearch/rk1uu20Jh
|
|
CVE-2023-29907 - https://hackmd.io/@0dayResearch/rk-6aRRyn
|
|
CVE-2023-29908 - https://hackmd.io/@0dayResearch/Ski-S20J2
|
|
CVE-2023-29909 - https://hackmd.io/@0dayResearch/r1FC0AAy2
|
|
CVE-2023-2991 - https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/
|
|
CVE-2023-29910 - https://hackmd.io/@0dayResearch/S1aGs1Jl2
|
|
CVE-2023-29911 - https://hackmd.io/@0dayResearch/SyTaRoCJn
|
|
CVE-2023-29912 - https://hackmd.io/@0dayResearch/S1TusiR1n
|
|
CVE-2023-29913 - https://hackmd.io/@0dayResearch/HyvnMn013
|
|
CVE-2023-29914 - https://hackmd.io/@0dayResearch/H1Cn2sAk3
|
|
CVE-2023-29915 - https://hackmd.io/@0dayResearch/HJBc2lyl2
|
|
CVE-2023-29916 - https://hackmd.io/@0dayResearch/rkpbC1Jgh
|
|
CVE-2023-29917 - https://hackmd.io/@0dayResearch/rJJzEg1e3
|
|
CVE-2023-29918 - https://docs.google.com/document/d/1JAhJOlfKKD5Y5zEKo0_8a3A-nQ7Dz_GIMmlXmOvXV48/edit?usp=sharing
|
|
CVE-2023-29919 - https://github.com/xiaosed/CVE-2023-29919/
|
|
CVE-2023-29931 - https://github.com/hhxsv5/laravel-s/issues/437
|
|
CVE-2023-29950 - https://github.com/matthiaskramm/swftools/issues/198
|
|
CVE-2023-29963 - https://github.com/superjock1988/debug/blob/main/s-cms_rce.md
|
|
CVE-2023-2998 - https://huntr.dev/bounties/8282d78e-f399-4bf4-8403-f39103a31e78
|
|
CVE-2023-29983 - https://packetstormsecurity.com/files/172075/CompanyMaps-8.0-Cross-Site-Scripting.html
|
|
CVE-2023-29983 - https://www.exploit-db.com/exploits/51417
|
|
CVE-2023-29985 - https://liaorj.github.io/2023/03/17/admin-reports-date-from-has-sql-injection-vulnerability/#more
|
|
CVE-2023-29998 - https://labs.yarix.com/2023/07/gis3w-persistent-xss-in-g3wsuite-3-5-cve-2023-29998/
|
|
CVE-2023-30013 - http://packetstormsecurity.com/files/174799/TOTOLINK-Wireless-Routers-Remote-Command-Execution.html
|
|
CVE-2023-30013 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/2
|
|
CVE-2023-30053 - https://github.com/Am1ngl/ttt/tree/main/160
|
|
CVE-2023-30054 - https://github.com/Am1ngl/ttt/tree/main/161
|
|
CVE-2023-30056 - https://packetstormsecurity.com/files/172192/FICO-Origination-Manager-Decision-Module-4.8.1-XSS-Session-Hijacking.html
|
|
CVE-2023-30057 - https://packetstormsecurity.com/files/172192/FICO-Origination-Manager-Decision-Module-4.8.1-XSS-Session-Hijacking.html
|
|
CVE-2023-30061 - https://github.com/Zarathustra-L/IoT_Vul/tree/main/D-Link/DIR-879
|
|
CVE-2023-3007 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/student-management-system/password_reset.md
|
|
CVE-2023-30082 - https://blog.manavparekh.com/2023/06/cve-2023-30082.html
|
|
CVE-2023-30082 - https://github.com/manavparekh/CVEs/blob/main/CVE-2023-30082/Steps%20to%20reproduce.txt
|
|
CVE-2023-30083 - https://github.com/libming/libming/issues/266
|
|
CVE-2023-30084 - https://github.com/libming/libming/issues/268
|
|
CVE-2023-30085 - https://github.com/libming/libming/issues/267
|
|
CVE-2023-30086 - https://gitlab.com/libtiff/libtiff/-/issues/538
|
|
CVE-2023-30087 - https://github.com/cesanta/mjs/issues/244
|
|
CVE-2023-30088 - https://github.com/cesanta/mjs/issues/243
|
|
CVE-2023-3009 - https://huntr.dev/bounties/2929faca-5822-4636-8f04-ca5e0001361f
|
|
CVE-2023-30093 - https://www.edoardoottavianelli.it/CVE-2023-30093/
|
|
CVE-2023-30093 - https://www.youtube.com/watch?v=jZr2JhDd_S8
|
|
CVE-2023-30094 - https://www.edoardoottavianelli.it/CVE-2023-30094/
|
|
CVE-2023-30094 - https://www.youtube.com/watch?v=vOb9Fyg3iVo
|
|
CVE-2023-30095 - https://www.edoardoottavianelli.it/CVE-2023-30095/
|
|
CVE-2023-30095 - https://www.youtube.com/watch?v=2k7e9E0Cw0Y
|
|
CVE-2023-30096 - https://www.edoardoottavianelli.it/CVE-2023-30096/
|
|
CVE-2023-30096 - https://www.youtube.com/watch?v=ZA7R001kE2w
|
|
CVE-2023-30097 - https://www.edoardoottavianelli.it/CVE-2023-30097/
|
|
CVE-2023-30097 - https://www.youtube.com/watch?v=VAlbkvOm_DU
|
|
CVE-2023-30106 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-mts_0.zip
|
|
CVE-2023-30111 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-mts_0.zip
|
|
CVE-2023-30112 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-mts_0.zip
|
|
CVE-2023-3012 - https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69
|
|
CVE-2023-30123 - https://github.com/wuzhicms/wuzhicms/issues/205#issue-1635153937
|
|
CVE-2023-3013 - https://huntr.dev/bounties/52f95edc-cc03-4a9f-9bf8-74f641260073
|
|
CVE-2023-30135 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/8/8.md
|
|
CVE-2023-30145 - http://packetstormsecurity.com/files/172593/Camaleon-CMS-2.7.0-Server-Side-Template-Injection.html
|
|
CVE-2023-30145 - https://github.com/paragbagul111/CVE-2023-30145
|
|
CVE-2023-30146 - https://github.com/L1-0/CVE-2023-30146
|
|
CVE-2023-30148 - https://security.friendsofpresta.org/modules/2023/10/10/opartmultihtmlblock.html
|
|
CVE-2023-30149 - https://friends-of-presta.github.io/security-advisories/module/2023/06/01/cityautocomplete.html
|
|
CVE-2023-30150 - https://friends-of-presta.github.io/security-advisories/module/2023/06/06/leocustomajax.html
|
|
CVE-2023-3017 - https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-html-injection-3596f2b856c0
|
|
CVE-2023-3018 - http://packetstormsecurity.com/files/172653/Lost-And-Found-Information-System-1.0-Broken-Access-Control-Privilege-Escalation.html
|
|
CVE-2023-3018 - https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-idor-cve-2023-977966c4450d
|
|
CVE-2023-30184 - https://github.com/typecho/typecho/issues/1546
|
|
CVE-2023-30185 - https://github.com/c7w1n/CVE-2023-30185/blob/main/CVE-2023-30185.md
|
|
CVE-2023-30189 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/27/posstaticblocks.html
|
|
CVE-2023-30191 - https://friends-of-presta.github.io/security-advisories/modules/2023/05/17/cdesigner-89.html
|
|
CVE-2023-30192 - https://friends-of-presta.github.io/security-advisories/modules/2023/05/11/possearchproducts.html
|
|
CVE-2023-30194 - https://friends-of-presta.github.io/security-advisories/modules/2023/05/09/posstaticfooter.html
|
|
CVE-2023-30198 - http://packetstormsecurity.com/files/173136/PrestaShop-Winbiz-Payment-Improper-Limitation.html
|
|
CVE-2023-3020 - https://huntr.dev/bounties/92cbe37c-33fa-43bf-8d5b-69aebf51d32c
|
|
CVE-2023-3021 - https://huntr.dev/bounties/9d289d3a-2931-4e94-b61c-449581736eff
|
|
CVE-2023-30222 - https://packetstormsecurity.com
|
|
CVE-2023-30223 - https://packetstormsecurity.com
|
|
CVE-2023-30237 - https://www.pentestpartners.com/security-blog/bullied-by-bugcrowd-over-kape-cyberghost-disclosure/
|
|
CVE-2023-30253 - https://www.swascan.com/security-advisory-dolibarr-17-0-0/
|
|
CVE-2023-30256 - http://packetstormsecurity.com/files/172542/Webkul-Qloapps-1.5.2-Cross-Site-Scripting.html
|
|
CVE-2023-30256 - https://github.com/ahrixia/CVE-2023-30256
|
|
CVE-2023-30257 - https://github.com/stigward/PoCs-and-Exploits/tree/main/fiio_LPE_0day
|
|
CVE-2023-30257 - https://stigward.github.io/posts/fiio-m6-exploit/
|
|
CVE-2023-30258 - http://packetstormsecurity.com/files/175672/MagnusBilling-Remote-Command-Execution.html
|
|
CVE-2023-30258 - https://eldstal.se/advisories/230327-magnusbilling.html
|
|
CVE-2023-30259 - https://github.com/LibreCAD/LibreCAD/issues/1481
|
|
CVE-2023-3026 - https://huntr.dev/bounties/9bbcc127-1e69-4c88-b318-d2afef48eff0
|
|
CVE-2023-30264 - https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%202.md
|
|
CVE-2023-30267 - https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Reflected%20cross-site%20scripting(XSS).md
|
|
CVE-2023-30268 - https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Improper%20Input%20Validation%202.md
|
|
CVE-2023-30285 - https://github.com/D23K4N/CVE/blob/main/CVE-2023-30285.md
|
|
CVE-2023-30328 - https://github.com/rand0mIdas/randomideas/blob/main/ShimoVPN.md
|
|
CVE-2023-30328 - https://raw.githubusercontent.com/rand0mIdas/randomideas/main/ShimoVPN.md?token=GHSAT0AAAAAACA3WX4SPH2YYOCWGV6LLVSGZBIEKEQ
|
|
CVE-2023-30330 - https://github.com/Filiplain/LFI-to-RCE-SE-Suite-2.0
|
|
CVE-2023-30330 - https://www.exploit-db.com/exploits/51404
|
|
CVE-2023-30331 - https://github.com/luelueking/Beetl-3.15.0-vuln-poc
|
|
CVE-2023-30347 - https://github.com/huzefa2212/CVE-2023-30347/blob/main/poc.txt
|
|
CVE-2023-30349 - https://github.com/jflyfox/jfinal_cms/issues/54
|
|
CVE-2023-30350 - http://packetstormsecurity.com/files/172124/FS-S3900-24T4S-Privilege-Escalation.html
|
|
CVE-2023-30362 - https://github.com/obgm/libcoap/issues/1063
|
|
CVE-2023-30363 - https://github.com/Tencent/vConsole/issues/616
|
|
CVE-2023-30367 - http://packetstormsecurity.com/files/173829/mRemoteNG-1.77.3.1784-NB-Sensitive-Information-Extraction.html
|
|
CVE-2023-30367 - https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper
|
|
CVE-2023-30368 - https://github.com/2205794866/Tenda/blob/main/AC5/1.md
|
|
CVE-2023-30369 - https://github.com/2205794866/Tenda/blob/main/AC15/3.md
|
|
CVE-2023-30370 - https://github.com/2205794866/Tenda/blob/main/AC15/7.md
|
|
CVE-2023-30371 - https://github.com/2205794866/Tenda/blob/main/AC15/4.md
|
|
CVE-2023-30372 - https://github.com/2205794866/Tenda/blob/main/AC15/10.md
|
|
CVE-2023-30373 - https://github.com/2205794866/Tenda/blob/main/AC15/8.md
|
|
CVE-2023-30375 - https://github.com/2205794866/Tenda/blob/main/AC15/1.md
|
|
CVE-2023-30376 - https://github.com/2205794866/Tenda/blob/main/AC15/9.md
|
|
CVE-2023-30378 - https://github.com/2205794866/Tenda/blob/main/AC15/5.md
|
|
CVE-2023-30380 - https://github.com/Howard512966/DedeCMS-v5.7.107-Directory-Traversal
|
|
CVE-2023-30399 - https://github.com/Yof3ng/IoT/blob/master/Garo/CVE-2023-30399.md
|
|
CVE-2023-30402 - https://github.com/yasm/yasm/issues/206
|
|
CVE-2023-30405 - https://packetstormsecurity.com/files/172057/Aigital-Wireless-N-Repeater-Mini_Router.0.131229-Cross-Site-Scripting.html
|
|
CVE-2023-30415 - http://packetstormsecurity.com/files/174758/Packers-And-Movers-Management-System-1.0-SQL-Injection.html
|
|
CVE-2023-30415 - https://robsware.github.io/2023/09/01/firstcve
|
|
CVE-2023-3044 - https://github.com/baker221/poc-xpdf
|
|
CVE-2023-30440 - https://www.ibm.com/support/pages/node/6997133
|
|
CVE-2023-30445 - https://www.ibm.com/support/pages/node/7010557
|
|
CVE-2023-30446 - https://www.ibm.com/support/pages/node/7010557
|
|
CVE-2023-30447 - https://www.ibm.com/support/pages/node/7010557
|
|
CVE-2023-30448 - https://www.ibm.com/support/pages/node/7010557
|
|
CVE-2023-30449 - https://www.ibm.com/support/pages/node/7010557
|
|
CVE-2023-30451 - http://packetstormsecurity.com/files/176274/TYPO3-11.5.24-Path-Traversal.html
|
|
CVE-2023-30453 - https://y-security.de/news-en/reminder-for-jira-cross-site-scripting-cve-2023-30453/index.html
|
|
CVE-2023-30454 - https://packetstormsecurity.com/files/172063/ebankIT-6-Cross-Site-Scripting.html
|
|
CVE-2023-30455 - https://packetstormsecurity.com/files/172064/ebankIT-6-Denial-Of-Service.html
|
|
CVE-2023-30456 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
|
|
CVE-2023-30456 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8
|
|
CVE-2023-30459 - https://github.com/Toxich4/CVE-2023-30459
|
|
CVE-2023-30459 - https://smartptt.com
|
|
CVE-2023-30534 - https://github.com/Cacti/cacti/security/advisories/GHSA-77rf-774j-6h3p
|
|
CVE-2023-30544 - https://huntr.dev/bounties/1714df73-e639-4d64-ab25-ced82dad9f85/
|
|
CVE-2023-30547 - https://gist.github.com/leesh3288/381b230b04936dd4d74aaf90cc8bb244
|
|
CVE-2023-30547 - https://github.com/patriksimek/vm2/security/advisories/GHSA-ch3r-j5x3-6q2m
|
|
CVE-2023-30550 - https://github.com/metersphere/metersphere/security/advisories/GHSA-j5cq-cpw2-gp2q
|
|
CVE-2023-3056 - https://github.com/HuBenLab/HuBenVulList/blob/main/YFCMF-TP6-3.0.4%20has%20a%20Remote%20Command%20Execution%20(RCE)%20vulnerability%201.md
|
|
CVE-2023-3057 - https://github.com/HuBenLab/HuBenVulList/blob/main/YFCMF-TP6-3.0.4%20has%20a%20Remote%20Command%20Execution%20(RCE)%20vulnerability%202.md
|
|
CVE-2023-30577 - https://github.com/zmanda/amanda/security/advisories/GHSA-crrw-v393-h5q3
|
|
CVE-2023-30591 - https://starlabs.sg/advisories/23/23-30591/
|
|
CVE-2023-30613 - https://huntr.dev/bounties/c30d3503-600d-4d00-9571-98826a51f12c
|
|
CVE-2023-30620 - https://github.com/mindsdb/mindsdb/security/advisories/GHSA-2g5w-29q9-w6hx
|
|
CVE-2023-30623 - https://securitylab.github.com/research/github-actions-untrusted-input/
|
|
CVE-2023-30625 - http://packetstormsecurity.com/files/173837/Rudder-Server-SQL-Injection-Remote-Code-Execution.html
|
|
CVE-2023-30625 - https://securitylab.github.com/advisories/GHSL-2022-097_rudder-server/
|
|
CVE-2023-30628 - https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-cw6r-6ccx-5hwx
|
|
CVE-2023-30628 - https://securitylab.github.com/research/github-actions-untrusted-input/
|
|
CVE-2023-3067 - https://huntr.dev/bounties/4772ceb7-1594-414d-9b20-5b82029da7b6
|
|
CVE-2023-3069 - https://huntr.dev/bounties/00544982-365a-476b-b5fe-42f02f11d367
|
|
CVE-2023-3070 - https://huntr.dev/bounties/e193068e-0b95-403a-8453-e015241b8f1b
|
|
CVE-2023-3071 - https://huntr.dev/bounties/3e8d5166-9bc6-46e7-94a8-cad52434a39e
|
|
CVE-2023-3073 - https://huntr.dev/bounties/a4d6a082-2ea8-49a5-8e48-6d39b5cc62e1
|
|
CVE-2023-30740 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-30741 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-30742 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-30743 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-30744 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-30769 - https://www.halborn.com/blog/post/halborn-discovers-zero-day-impacting-dogecoin-and-280-networks
|
|
CVE-2023-30769 - https://www.halborn.com/disclosures
|
|
CVE-2023-30772 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
|
|
CVE-2023-30772 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=06615d11cc78162dfd5116efb71f29eb29502d37
|
|
CVE-2023-30774 - https://gitlab.com/libtiff/libtiff/-/issues/463
|
|
CVE-2023-30775 - https://gitlab.com/libtiff/libtiff/-/issues/464
|
|
CVE-2023-30777 - https://patchstack.com/articles/reflected-xss-in-advanced-custom-fields-plugins-affecting-2-million-sites?_s_id=cve
|
|
CVE-2023-30787 - https://fluidattacks.com/advisories/napoli
|
|
CVE-2023-30788 - https://fluidattacks.com/advisories/napoli
|
|
CVE-2023-30789 - https://fluidattacks.com/advisories/napoli
|
|
CVE-2023-3079 - http://packetstormsecurity.com/files/176211/Chrome-V8-Type-Confusion.html
|
|
CVE-2023-3079 - http://packetstormsecurity.com/files/176212/Chrome-V8-Type-Confusion-New-Sandbox-Escape.html
|
|
CVE-2023-30790 - https://fluidattacks.com/advisories/napoli
|
|
CVE-2023-30799 - https://github.com/MarginResearch/FOISted
|
|
CVE-2023-30802 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4
|
|
CVE-2023-30803 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4
|
|
CVE-2023-30804 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4
|
|
CVE-2023-30805 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4
|
|
CVE-2023-30806 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4
|
|
CVE-2023-3083 - https://huntr.dev/bounties/c6b29e46-02e0-43ad-920f-28ac482ea2ab
|
|
CVE-2023-3084 - https://huntr.dev/bounties/4b86b56b-c51b-4be8-8ee4-6e385d1e9e8a
|
|
CVE-2023-30858 - https://huntr.dev/bounties/444f2255-5085-466f-ba0e-5549fa8846a3/
|
|
CVE-2023-30859 - https://github.com/tritonmc/Triton/security/advisories/GHSA-8vj5-jccf-q25r
|
|
CVE-2023-3086 - https://huntr.dev/bounties/17be9e8a-abe8-41db-987f-1d5b0686ae20
|
|
CVE-2023-30860 - https://github.com/WWBN/AVideo/security/advisories/GHSA-xr9h-p2rc-rpqm
|
|
CVE-2023-30868 - http://packetstormsecurity.com/files/172730/WordPress-Tree-Page-View-1.6.7-Cross-Site-Scripting.html
|
|
CVE-2023-3090 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
|
CVE-2023-3090 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
|
CVE-2023-3094 - https://vuldb.com/?id.230670
|
|
CVE-2023-30945 - https://palantir.safebase.us/?tcuUid=e62e4dad-b39b-48ba-ba30-7b7c83406ad9
|
|
CVE-2023-30946 - https://palantir.safebase.us/?tcuUid=4cf0b6e6-564a-467b-83ae-36fec3a491c3
|
|
CVE-2023-30948 - https://palantir.safebase.us/?tcuUid=101b083b-6389-4261-98f8-23448e133a62
|
|
CVE-2023-30949 - https://palantir.safebase.us/?tcuUid=bbc1772c-e10a-45cc-b89f-48cc1a8b2cfc
|
|
CVE-2023-3095 - https://huntr.dev/bounties/35c899a9-40a0-4e17-bfb5-2a1430bc83c4
|
|
CVE-2023-30950 - https://palantir.safebase.us/?tcuUid=d839709d-c50f-4a37-8faa-b0c35054418a
|
|
CVE-2023-30951 - https://palantir.safebase.us/?tcuUid=fe021f28-9e25-42c4-acd8-772cd8006ced
|
|
CVE-2023-30952 - https://palantir.safebase.us/?tcuUid=42bdb7fa-9a6d-4462-b89d-cabc62f281f4
|
|
CVE-2023-30955 - https://palantir.safebase.us/?tcuUid=0c3f6c33-4eb0-48b5-ab87-fe48c46a4170
|
|
CVE-2023-30956 - https://palantir.safebase.us/?tcuUid=40367943-738c-4e69-b852-4a503c77478a
|
|
CVE-2023-30958 - https://palantir.safebase.us/?tcuUid=5764b094-d3c0-4380-90f2-234f36116c9b
|
|
CVE-2023-30959 - https://palantir.safebase.us/?tcuUid=4c257f07-58af-4532-892a-bdbe8ab3ec63
|
|
CVE-2023-3096 - https://github.com/i900008/vulndb/blob/main/kylinos_vul1.md
|
|
CVE-2023-30960 - https://palantir.safebase.us/?tcuUid=115d9bf4-201f-4cfe-b2fc-219e3a2d945b
|
|
CVE-2023-30961 - https://palantir.safebase.us/?tcuUid=2755c49f-2c30-459e-8bdf-f95ef3692da4
|
|
CVE-2023-30962 - https://palantir.safebase.us/?tcuUid=92dd599a-07e2-43a8-956a-9c9566794be0
|
|
CVE-2023-30963 - https://palantir.safebase.us/?tcuUid=3c6b63b7-fb67-4202-a94a-9c83515efb8a
|
|
CVE-2023-30967 - https://palantir.safebase.us/?tcuUid=8fd5809f-26f8-406e-b36f-4a6596a19d79
|
|
CVE-2023-30969 - https://palantir.safebase.us/?tcuUid=afcbc9b2-de62-44b9-b28b-2ebf0684fbf7
|
|
CVE-2023-3097 - https://github.com/i900008/vulndb/blob/main/kylinos_vul2.md
|
|
CVE-2023-3099 - https://github.com/i900008/vulndb/blob/main/kylinos_vul4.md
|
|
CVE-2023-31059 - https://cybir.com/2023/cve/poc-repetier-server-140/
|
|
CVE-2023-31060 - https://cybir.com/2023/cve/poc-repetier-server-140/
|
|
CVE-2023-31061 - https://cybir.com/2023/cve/poc-repetier-server-140/
|
|
CVE-2023-31067 - http://packetstormsecurity.com/files/174275/TSPlus-16.0.2.14-Insecure-Permissions.html
|
|
CVE-2023-31067 - https://www.exploit-db.com/exploits/51679
|
|
CVE-2023-31068 - http://packetstormsecurity.com/files/174272/TSPlus-16.0.0.0-Insecure-Permissions.html
|
|
CVE-2023-31068 - https://www.exploit-db.com/exploits/51680
|
|
CVE-2023-31069 - http://packetstormsecurity.com/files/174271/TSPlus-16.0.0.0-Insecure-Credential-Storage.html
|
|
CVE-2023-31069 - https://www.exploit-db.com/exploits/51681
|
|
CVE-2023-3109 - https://huntr.dev/bounties/6fa6070e-8f7f-43ae-8a84-e36b28256123
|
|
CVE-2023-31096 - https://cschwarz1.github.io/posts/0x04/
|
|
CVE-2023-31102 - https://ds-security.com/post/integer-overflow-in-7-zip-cve-2023-31102/
|
|
CVE-2023-31128 - https://github.com/nextcloud/cookbook/security/advisories/GHSA-c5pc-mf2f-xq8h
|
|
CVE-2023-31128 - https://securitylab.github.com/research/github-actions-untrusted-input/
|
|
CVE-2023-31132 - https://github.com/Cacti/cacti/security/advisories/GHSA-rf5w-pq3f-9876
|
|
CVE-2023-31137 - https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c
|
|
CVE-2023-3115 - https://gitlab.com/gitlab-org/gitlab/-/issues/414367
|
|
CVE-2023-3119 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Service%20Provider%20Management%20System%20-%20multiple%20vulnerabilities.md
|
|
CVE-2023-31192 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1768
|
|
CVE-2023-31194 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1745
|
|
CVE-2023-31194 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1745
|
|
CVE-2023-3120 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Service%20Provider%20Management%20System%20-%20multiple%20vulnerabilities.md
|
|
CVE-2023-31223 - https://excellium-services.com/cert-xlm-advisory/cve-2023-31223/
|
|
CVE-2023-31242 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1769
|
|
CVE-2023-31247 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1746
|
|
CVE-2023-31248 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
|
|
CVE-2023-31248 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
|
CVE-2023-31272 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1765
|
|
CVE-2023-31275 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1748
|
|
CVE-2023-3128 - https://github.com/grafana/bugbounty/security/advisories/GHSA-gxh2-6vvc-rrgp
|
|
CVE-2023-31285 - http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html
|
|
CVE-2023-31285 - http://seclists.org/fulldisclosure/2023/May/14
|
|
CVE-2023-31286 - http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html
|
|
CVE-2023-31286 - http://seclists.org/fulldisclosure/2023/May/14
|
|
CVE-2023-31287 - http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html
|
|
CVE-2023-31287 - http://seclists.org/fulldisclosure/2023/May/14
|
|
CVE-2023-31292 - https://herolab.usd.de/en/security-advisories/usd-2022-0051/
|
|
CVE-2023-31293 - https://herolab.usd.de/en/security-advisories/usd-2022-0061/
|
|
CVE-2023-31294 - https://herolab.usd.de/en/security-advisories/usd-2022-0052/
|
|
CVE-2023-31295 - https://herolab.usd.de/en/security-advisories/usd-2022-0053/
|
|
CVE-2023-31296 - https://herolab.usd.de/en/security-advisories/usd-2022-0054/
|
|
CVE-2023-31297 - https://herolab.usd.de/en/security-advisories/usd-2022-0058/
|
|
CVE-2023-31298 - https://herolab.usd.de/en/security-advisories/usd-2022-0060/
|
|
CVE-2023-31299 - https://herolab.usd.de/en/security-advisories/usd-2022-0055/
|
|
CVE-2023-31300 - https://herolab.usd.de/en/security-advisories/usd-2022-0057/
|
|
CVE-2023-31301 - https://herolab.usd.de/en/security-advisories/usd-2022-0059/
|
|
CVE-2023-31302 - https://herolab.usd.de/en/security-advisories/usd-2022-0056/
|
|
CVE-2023-3134 - https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins
|
|
CVE-2023-31404 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-31405 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-31406 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-31407 - https://launchpad.support.sap.com/#/notes/3312892
|
|
CVE-2023-31407 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-31413 - https://www.elastic.co/community/security/
|
|
CVE-2023-31414 - https://www.elastic.co/community/security/
|
|
CVE-2023-31415 - https://www.elastic.co/community/security/
|
|
CVE-2023-31416 - https://www.elastic.co/community/security
|
|
CVE-2023-31417 - https://www.elastic.co/community/security
|
|
CVE-2023-31418 - https://www.elastic.co/community/security
|
|
CVE-2023-31419 - https://www.elastic.co/community/security
|
|
CVE-2023-3142 - https://huntr.dev/bounties/d00686b0-f89a-4e14-98d7-b8dd3f92a6e5
|
|
CVE-2023-31421 - https://www.elastic.co/community/security
|
|
CVE-2023-31422 - https://www.elastic.co/community/security
|
|
CVE-2023-3143 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#11xss-vulnerability-in-adminpostsmanage_postphpcontent
|
|
CVE-2023-31433 - https://cves.at/posts/cve-2023-31433/writeup/
|
|
CVE-2023-31434 - https://cves.at/posts/cve-2023-31434/writeup/
|
|
CVE-2023-31435 - https://cves.at/posts/cve-2023-31435/writeup/
|
|
CVE-2023-31436 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
|
|
CVE-2023-31436 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
|
|
CVE-2023-31436 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
|
CVE-2023-31436 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13
|
|
CVE-2023-31439 - https://github.com/systemd/systemd/pull/28885
|
|
CVE-2023-3144 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#10xss-vulnerability-in-adminpostsmanage_postphptitle
|
|
CVE-2023-31445 - https://blog.kscsc.online/cves/202331445/md.html
|
|
CVE-2023-31445 - https://github.com/Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure
|
|
CVE-2023-31445 - https://www.swiruhack.online/cves/202331445/md.html
|
|
CVE-2023-3145 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#9sql-injection-vulnerability-in-classesusersphppost
|
|
CVE-2023-3146 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#8sql-injection-vulnerability-in-admincategoriesmanage_categoryphp
|
|
CVE-2023-31465 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-31465.md
|
|
CVE-2023-31466 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-31466.md
|
|
CVE-2023-31468 - http://packetstormsecurity.com/files/174268/Inosoft-VisiWin-7-2022-2.1-Insecure-Permissions-Privilege-Escalation.html
|
|
CVE-2023-31468 - https://www.exploit-db.com/exploits/51682
|
|
CVE-2023-3147 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#7sql-injection-vulnerability-in-admincategoriesview_categoryphp
|
|
CVE-2023-31471 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Abuse_of_Functionality_leads_to_RCE.md
|
|
CVE-2023-31472 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary_File_Creation.md
|
|
CVE-2023-31473 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary_File_Read.md
|
|
CVE-2023-31475 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Buffer_Overflow.md
|
|
CVE-2023-31475 - https://justinapplegate.me/2023/glinet-CVE-2023-31475/
|
|
CVE-2023-31476 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/GL-MV1000_Arbitrary_File_Creation.md
|
|
CVE-2023-31477 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Path_Traversal.md
|
|
CVE-2023-31478 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/SSID_Key_Disclosure.md
|
|
CVE-2023-3148 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#6sql-injection-vulnerability-in-adminpostsmanage_postphp
|
|
CVE-2023-31483 - https://github.com/CauldronDevelopmentLLC/cbang/issues/115
|
|
CVE-2023-31489 - https://github.com/FRRouting/frr/issues/13098
|
|
CVE-2023-3149 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-adminusermanage_userphp
|
|
CVE-2023-31490 - https://github.com/FRRouting/frr/issues/13099
|
|
CVE-2023-31492 - http://packetstormsecurity.com/files/177091/ManageEngine-ADManager-Plus-Recovery-Password-Disclosure.html
|
|
CVE-2023-31497 - https://github.com/0xInfection/EPScalate
|
|
CVE-2023-31498 - https://gist.github.com/captain-noob/aff11542477ddd0a92ad8b94ec75f832
|
|
CVE-2023-3150 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md
|
|
CVE-2023-31502 - https://github.com/ahmedalroky/Disclosures/blob/main/apesystems/Insufficient_Verification_of_Data_Authenticity.MD
|
|
CVE-2023-31505 - https://m3n0sd0n4ld.github.io/patoHackventuras/cve-2023-31505
|
|
CVE-2023-3151 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md
|
|
CVE-2023-3152 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#5sql-injection-vulnerability-in-adminpostsview_postphp
|
|
CVE-2023-31530 - https://github.com/leetsun/IoT/tree/main/Motorola-CX2L/CI4
|
|
CVE-2023-31543 - https://gist.github.com/adeadfed/ccc834440af354a5638f889bee34bafe
|
|
CVE-2023-31543 - https://github.com/bndr/pipreqs/pull/364
|
|
CVE-2023-31548 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-31548
|
|
CVE-2023-31554 - https://forum.xpdfreader.com/viewtopic.php?t=42421
|
|
CVE-2023-31555 - https://github.com/podofo/podofo/issues/67
|
|
CVE-2023-31556 - https://github.com/podofo/podofo/issues/66
|
|
CVE-2023-31557 - https://forum.xpdfreader.com/viewtopic.php?t=42422&sid=acb8ed31bbd74223e3c4d0fb2552c748
|
|
CVE-2023-31566 - https://github.com/podofo/podofo/issues/70
|
|
CVE-2023-31567 - https://github.com/podofo/podofo/issues/71
|
|
CVE-2023-31568 - https://github.com/podofo/podofo/issues/72
|
|
CVE-2023-31587 - https://github.com/yanbushuang/CVE/blob/main/TendaAC5.md
|
|
CVE-2023-31594 - https://github.com/Yozarseef95/CVE-2023-31594
|
|
CVE-2023-31595 - https://github.com/Yozarseef95/CVE-2023-31595
|
|
CVE-2023-31607 - https://github.com/openlink/virtuoso-opensource/issues/1120
|
|
CVE-2023-31608 - https://github.com/openlink/virtuoso-opensource/issues/1123
|
|
CVE-2023-31609 - https://github.com/openlink/virtuoso-opensource/issues/1126
|
|
CVE-2023-31610 - https://github.com/openlink/virtuoso-opensource/issues/1118
|
|
CVE-2023-31611 - https://github.com/openlink/virtuoso-opensource/issues/1119
|
|
CVE-2023-31612 - https://github.com/openlink/virtuoso-opensource/issues/1125
|
|
CVE-2023-31613 - https://github.com/openlink/virtuoso-opensource/issues/1121
|
|
CVE-2023-31615 - https://github.com/openlink/virtuoso-opensource/issues/1124
|
|
CVE-2023-31616 - https://github.com/openlink/virtuoso-opensource/issues/1122
|
|
CVE-2023-31617 - https://github.com/openlink/virtuoso-opensource/issues/1127
|
|
CVE-2023-31618 - https://github.com/openlink/virtuoso-opensource/issues/1136
|
|
CVE-2023-31619 - https://github.com/openlink/virtuoso-opensource/issues/1133
|
|
CVE-2023-31620 - https://github.com/openlink/virtuoso-opensource/issues/1128
|
|
CVE-2023-31621 - https://github.com/openlink/virtuoso-opensource/issues/1130
|
|
CVE-2023-31622 - https://github.com/openlink/virtuoso-opensource/issues/1135
|
|
CVE-2023-31623 - https://github.com/openlink/virtuoso-opensource/issues/1131
|
|
CVE-2023-31624 - https://github.com/openlink/virtuoso-opensource/issues/1134
|
|
CVE-2023-31625 - https://github.com/openlink/virtuoso-opensource/issues/1132
|
|
CVE-2023-31626 - https://github.com/openlink/virtuoso-opensource/issues/1129
|
|
CVE-2023-31627 - https://github.com/openlink/virtuoso-opensource/issues/1140
|
|
CVE-2023-31628 - https://github.com/openlink/virtuoso-opensource/issues/1141
|
|
CVE-2023-31629 - https://github.com/openlink/virtuoso-opensource/issues/1139
|
|
CVE-2023-3163 - https://gitee.com/y_project/RuoYi/issues/I78DOR
|
|
CVE-2023-31630 - https://github.com/openlink/virtuoso-opensource/issues/1138
|
|
CVE-2023-31631 - https://github.com/openlink/virtuoso-opensource/issues/1137
|
|
CVE-2023-3164 - https://gitlab.com/libtiff/libtiff/-/issues/542
|
|
CVE-2023-3165 - https://vuldb.com/?id.231109
|
|
CVE-2023-31664 - https://github.com/adilkhan7/CVE-2023-31664
|
|
CVE-2023-31677 - https://github.com/zzh-newlearner/record/blob/main/luowice.md
|
|
CVE-2023-31678 - https://github.com/zzh-newlearner/record/blob/main/yingshi_devicekey.md
|
|
CVE-2023-31679 - https://github.com/zzh-newlearner/record/blob/main/yingshi_privacy.md
|
|
CVE-2023-31689 - https://github.com/vedees/wcms/issues/15
|
|
CVE-2023-31698 - http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html
|
|
CVE-2023-31698 - https://github.com/bludit/bludit/issues/1369#issuecomment-940806199
|
|
CVE-2023-31698 - https://github.com/bludit/bludit/issues/1509
|
|
CVE-2023-31699 - https://github.com/ChurchCRM/CRM/issues/6471
|
|
CVE-2023-31700 - https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md
|
|
CVE-2023-31701 - https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md
|
|
CVE-2023-31702 - http://packetstormsecurity.com/files/172545/eScan-Management-Console-14.0.1400.2281-SQL-Injection.html
|
|
CVE-2023-31703 - http://packetstormsecurity.com/files/172540/eScan-Management-Console-14.0.1400.2281-Cross-Site-Scripting.html
|
|
CVE-2023-31705 - https://github.com/d34dun1c02n/CVE-2023-31705
|
|
CVE-2023-31708 - https://github.com/weng-xianhu/eyoucms/issues/41
|
|
CVE-2023-31714 - https://www.exploit-db.com/exploits/51383
|
|
CVE-2023-31718 - https://youtu.be/VCQkEGntN04
|
|
CVE-2023-3172 - https://huntr.dev/bounties/e50966cd-9222-46b9-aedc-1feb3f2a0b0e
|
|
CVE-2023-31723 - https://github.com/DaisyPo/fuzzing-vulncollect/blob/main/yasm/SEGV/nasm-pp.c:4008%20in%20expand_mmac_params/README.md
|
|
CVE-2023-31723 - https://github.com/yasm/yasm/issues/220
|
|
CVE-2023-31724 - https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/SEGV/nasm-pp.c:3570%20in%20do_directive
|
|
CVE-2023-31724 - https://github.com/yasm/yasm/issues/222
|
|
CVE-2023-31725 - https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params
|
|
CVE-2023-31725 - https://github.com/yasm/yasm/issues/221
|
|
CVE-2023-31726 - https://github.com/J6451/CVE-2023-31726
|
|
CVE-2023-3173 - https://huntr.dev/bounties/4d715f76-950d-4251-8139-3dffea798f14
|
|
CVE-2023-31740 - https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31740/Linksys_E2000_RCE.pdf
|
|
CVE-2023-31741 - https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31741/Linksys_E2000_RCE_2.pdf
|
|
CVE-2023-31747 - https://packetstormsecurity.com/files/172464/Filmora-12-Build-1.0.0.7-Unquoted-Service-Path.html
|
|
CVE-2023-31748 - https://packetstormsecurity.com/files/172466/MobileTrans-4.0.11-Weak-Service-Permissions.html
|
|
CVE-2023-31753 - https://github.com/khmk2k/CVE-2023-31753/
|
|
CVE-2023-31754 - https://labs.withsecure.com/advisories/optimizely-admin-panel-dom-xss
|
|
CVE-2023-31757 - https://github.com/sleepyvv/vul_report/blob/main/DedeCMS/XSS.md
|
|
CVE-2023-3176 - https://github.com/AnotherN/cvv/blob/main/imgs/Lost%20and%20Found%20Information%20System%20-%20multiple%20vulnerabilities.md#7sql-injection-vulnerability-in-adminusermanage_userphp
|
|
CVE-2023-3177 - https://github.com/AnotherN/cvv/blob/main/imgs/Lost%20and%20Found%20Information%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-admininquiriesview_inquiryphp
|
|
CVE-2023-3177 - https://vuldb.com/?id.231151
|
|
CVE-2023-3184 - http://packetstormsecurity.com/files/172908/Sales-Tracker-Management-System-1.0-HTML-Injection.html
|
|
CVE-2023-3184 - https://github.com/ctflearner/Vulnerability/blob/main/Sales_Tracker_Management_System/stms.md
|
|
CVE-2023-31851 - https://github.com/CalfCrusher/CVE-2023-31851
|
|
CVE-2023-31852 - https://github.com/CalfCrusher/CVE-2023-31852
|
|
CVE-2023-31853 - https://github.com/CalfCrusher/CVE-2023-31853
|
|
CVE-2023-31856 - https://github.com/xiangbulala/CVE/blob/main/totlink.md
|
|
CVE-2023-3187 - http://packetstormsecurity.com/files/172909/Teachers-Record-Management-System-1.0-Validation-Bypass.html
|
|
CVE-2023-3187 - https://github.com/ctflearner/Vulnerability/blob/main/Teacher_Record_Management_System/trms.md
|
|
CVE-2023-31871 - https://gist.github.com/picar0jsu/a8e623639da34f36202ce5e436668de7
|
|
CVE-2023-31873 - http://packetstormsecurity.com/files/172530/Gin-Markdown-Editor-0.7.4-Arbitrary-Code-Execution.html
|
|
CVE-2023-31874 - http://packetstormsecurity.com/files/172535/Yank-Note-3.52.1-Arbitrary-Code-Execution.html
|
|
CVE-2023-3188 - https://huntr.dev/bounties/0d0d526a-1c39-4e6a-b081-d3914468e495
|
|
CVE-2023-31893 - https://medium.com/@shooterRX/dns-recursion-leads-to-dos-attack-vivo-play-iptv-cve-2023-31893-b5ac45f38f
|
|
CVE-2023-3190 - https://huntr.dev/bounties/5562c4c4-0475-448f-a451-7c4666bc7180
|
|
CVE-2023-31902 - https://www.exploit-db.com/exploits/51010
|
|
CVE-2023-31902 - https://www.redpacketsecurity.com/mobile-mouse-code-execution/
|
|
CVE-2023-31903 - https://www.exploit-db.com/exploits/51052
|
|
CVE-2023-31904 - https://www.exploit-db.com/exploits/51015
|
|
CVE-2023-31907 - https://github.com/jerryscript-project/jerryscript/issues/5073
|
|
CVE-2023-31908 - https://github.com/jerryscript-project/jerryscript/issues/5067
|
|
CVE-2023-3191 - https://huntr.dev/bounties/19fed157-128d-4bfb-a30e-eadf748cbd1a
|
|
CVE-2023-31910 - https://github.com/jerryscript-project/jerryscript/issues/5076
|
|
CVE-2023-31913 - https://github.com/jerryscript-project/jerryscript/issues/5061
|
|
CVE-2023-31916 - https://github.com/jerryscript-project/jerryscript/issues/5062
|
|
CVE-2023-31918 - https://github.com/jerryscript-project/jerryscript/issues/5064
|
|
CVE-2023-31919 - https://github.com/jerryscript-project/jerryscript/issues/5069
|
|
CVE-2023-3192 - https://huntr.dev/bounties/f3644772-9c86-4f55-a0fa-aeb11f411551
|
|
CVE-2023-31920 - https://github.com/jerryscript-project/jerryscript/issues/5070
|
|
CVE-2023-31921 - https://github.com/jerryscript-project/jerryscript/issues/5068
|
|
CVE-2023-31922 - https://github.com/bellard/quickjs/issues/178
|
|
CVE-2023-31940 - https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug7-SQL-Injection-page_id.md
|
|
CVE-2023-31972 - https://github.com/yasm/yasm/issues/209
|
|
CVE-2023-31973 - https://github.com/yasm/yasm/issues/207
|
|
CVE-2023-31974 - https://github.com/yasm/yasm/issues/208
|
|
CVE-2023-31979 - https://github.com/petewarden/catdoc/issues/9
|
|
CVE-2023-31981 - https://github.com/irontec/sngrep/issues/430
|
|
CVE-2023-31982 - https://github.com/irontec/sngrep/issues/431
|
|
CVE-2023-31983 - https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/2/Readme.md
|
|
CVE-2023-31985 - https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/3/Readme.md
|
|
CVE-2023-31986 - https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/4/Readme.md
|
|
CVE-2023-32019 - http://packetstormsecurity.com/files/173310/Windows-Kernel-KTM-Registry-Transactions-Non-Atomic-Outcomes.html
|
|
CVE-2023-32046 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-3206 - https://github.com/shulao2020/cve/blob/main/Flying%20Fish.md
|
|
CVE-2023-32068 - https://jira.xwiki.org/browse/XWIKI-20096
|
|
CVE-2023-32071 - https://jira.xwiki.org/browse/XWIKI-20340
|
|
CVE-2023-32073 - https://github.com/WWBN/AVideo/security/advisories/GHSA-2mhh-27v7-3vcx
|
|
CVE-2023-32111 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-32112 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-32113 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-32114 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-32115 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-3217 - http://packetstormsecurity.com/files/173495/Chrome-device-OpenXrApiWrapper-InitSession-Heap-Use-After-Free.html
|
|
CVE-2023-3218 - https://huntr.dev/bounties/94d50b11-20ca-46e3-9086-dd6836421675
|
|
CVE-2023-32183 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32183
|
|
CVE-2023-32184 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32184
|
|
CVE-2023-3219 - http://packetstormsecurity.com/files/173992/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html
|
|
CVE-2023-32205 - https://bugzilla.mozilla.org/show_bug.cgi?id=1753339
|
|
CVE-2023-32205 - https://bugzilla.mozilla.org/show_bug.cgi?id=1753341
|
|
CVE-2023-32207 - https://bugzilla.mozilla.org/show_bug.cgi?id=1826116
|
|
CVE-2023-32209 - https://bugzilla.mozilla.org/show_bug.cgi?id=1767194
|
|
CVE-2023-32211 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823379
|
|
CVE-2023-32212 - https://bugzilla.mozilla.org/show_bug.cgi?id=1826622
|
|
CVE-2023-32233 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
|
|
CVE-2023-32233 - https://news.ycombinator.com/item?id=35879660
|
|
CVE-2023-3224 - https://huntr.dev/bounties/1eb74fd8-0258-4c1f-a904-83b52e373a87
|
|
CVE-2023-32243 - http://packetstormsecurity.com/files/172457/WordPress-Elementor-Lite-5.7.1-Arbitrary-Password-Reset.html
|
|
CVE-2023-3227 - https://huntr.dev/bounties/97ecf4b8-7eeb-4e39-917c-2660262ff9ba
|
|
CVE-2023-32271 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1774
|
|
CVE-2023-32275 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1753
|
|
CVE-2023-3228 - https://huntr.dev/bounties/0a7ee1fb-e693-4259-abf8-a2c3218c1647
|
|
CVE-2023-32284 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1750
|
|
CVE-2023-3229 - https://huntr.dev/bounties/31f48ca1-e5e8-436f-b779-cad597759170
|
|
CVE-2023-3230 - https://huntr.dev/bounties/390643f0-106b-4424-835d-52610aefa4c7
|
|
CVE-2023-32307 - https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-rm4c-ccvf-ff9c
|
|
CVE-2023-32309 - https://github.com/facelessuser/pymdown-extensions/security/advisories/GHSA-jh85-wwv9-24hv
|
|
CVE-2023-32313 - https://gist.github.com/arkark/c1c57eaf3e0a649af1a70c2b93b17550
|
|
CVE-2023-32313 - https://github.com/patriksimek/vm2/security/advisories/GHSA-p5gc-c584-jj6v
|
|
CVE-2023-32314 - https://gist.github.com/arkark/e9f5cf5782dec8321095be3e52acf5ac
|
|
CVE-2023-32314 - https://github.com/patriksimek/vm2/security/advisories/GHSA-whpj-8f3w-67p5
|
|
CVE-2023-32315 - http://packetstormsecurity.com/files/173607/Openfire-Authentication-Bypass-Remote-Code-Execution.html
|
|
CVE-2023-32317 - https://securitylab.github.com/advisories/GHSL-2023-081_GHSL-2023-082_Autolab/
|
|
CVE-2023-3232 - https://github.com/HuBenLab/HuBenVulList/blob/main/CRMEB%20is%20vulnerable%20to%20Broken%20Access%20Control.md
|
|
CVE-2023-32321 - https://github.com/ckan/ckan/blob/2a6080e61d5601fa0e2a0317afd6a8e9b7abf6dd/CHANGELOG.rst
|
|
CVE-2023-32322 - https://github.com/Ombi-app/Ombi/security/advisories/GHSA-28j3-84m7-gpjp
|
|
CVE-2023-32324 - https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7
|
|
CVE-2023-3233 - https://github.com/HuBenLab/HuBenVulList/blob/main/CRMEB%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF).md
|
|
CVE-2023-3234 - https://github.com/HuBenLab/HuBenVulList/blob/main/CRMEB%20is%20vulnerable%20to%20deserialization.md
|
|
CVE-2023-3235 - https://github.com/HuBenLab/HuBenVulList/blob/main/MCCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF)%201.md
|
|
CVE-2023-3236 - https://github.com/HuBenLab/HuBenVulList/blob/main/MCCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF)%202.md
|
|
CVE-2023-3237 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20contains%20a%20weak%20default%20password%20which%20gives%20attackers%20to%20access%20backstage%20management%20system.md
|
|
CVE-2023-3238 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF).md
|
|
CVE-2023-3239 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20obtain%20the%20web%20directory%20path%20and%20other%20information%20leaked%20.md
|
|
CVE-2023-3240 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20to%20contain%20an%20arbitrary%20file%20download%20vulenrability%20via%20the%20filename.md
|
|
CVE-2023-3241 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20to%20contain%20an%20arbitrary%20file%20read%20vulenrability%20via%20the%20filename.md
|
|
CVE-2023-3243 - https://www.honeywell.com/us/en/product-security
|
|
CVE-2023-3247 - https://github.com/php/php-src/security/advisories/GHSA-76gg-c692-v2mw
|
|
CVE-2023-32486 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
|
CVE-2023-32487 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
|
CVE-2023-32488 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
|
CVE-2023-32489 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
|
CVE-2023-32490 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
|
CVE-2023-32491 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
|
CVE-2023-32492 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
|
CVE-2023-32493 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
|
CVE-2023-32494 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
|
CVE-2023-32495 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
|
CVE-2023-32521 - https://www.tenable.com/security/research/tra-2023-17
|
|
CVE-2023-32522 - https://www.tenable.com/security/research/tra-2023-17
|
|
CVE-2023-32541 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1759
|
|
CVE-2023-32560 - http://packetstormsecurity.com/files/174459/Ivanti-Avalance-Remote-Code-Execution.html
|
|
CVE-2023-32560 - http://packetstormsecurity.com/files/174698/Ivanti-Avalanche-MDM-Buffer-Overflow.html
|
|
CVE-2023-32571 - https://research.nccgroup.com/2023/06/13/dynamic-linq-injection-remote-code-execution-vulnerability-cve-2023-32571/
|
|
CVE-2023-32614 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1749
|
|
CVE-2023-32615 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1771
|
|
CVE-2023-32616 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1837
|
|
CVE-2023-32629 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
|
CVE-2023-32632 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1767
|
|
CVE-2023-32634 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1755
|
|
CVE-2023-32645 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752
|
|
CVE-2023-32653 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1802
|
|
CVE-2023-32664 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1795
|
|
CVE-2023-32676 - https://securitylab.github.com/advisories/GHSL-2023-081_GHSL-2023-082_Autolab/
|
|
CVE-2023-32679 - https://github.com/craftcms/cms/security/advisories/GHSA-vqxf-r9ph-cc9c
|
|
CVE-2023-3269 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-3269 - http://www.openwall.com/lists/oss-security/2023/07/28/1
|
|
CVE-2023-3269 - http://www.openwall.com/lists/oss-security/2023/08/25/4
|
|
CVE-2023-32698 - https://github.com/goreleaser/nfpm/security/advisories/GHSA-w7jw-q4fg-qc4c
|
|
CVE-2023-32699 - https://github.com/metersphere/metersphere/security/advisories/GHSA-qffq-8gf8-mhq7
|
|
CVE-2023-32707 - http://packetstormsecurity.com/files/174602/Splunk-Enterprise-Account-Takeover.html
|
|
CVE-2023-32707 - http://packetstormsecurity.com/files/175386/Splunk-edit_user-Capability-Privilege-Escalation.html
|
|
CVE-2023-32741 - http://packetstormsecurity.com/files/175654/WordPress-Contact-Form-To-Any-API-1.1.2-SQL-Injection.html
|
|
CVE-2023-32749 - http://packetstormsecurity.com/files/172645/Pydio-Cells-4.1.2-Privilege-Escalation.html
|
|
CVE-2023-32749 - http://seclists.org/fulldisclosure/2023/May/18
|
|
CVE-2023-32749 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
|
CVE-2023-32749 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-003/-pydio-cells-unauthorised-role-assignments
|
|
CVE-2023-32750 - https://www.redteam-pentesting.de/advisories/rt-sa-2023-005/
|
|
CVE-2023-32750 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
|
CVE-2023-32751 - https://www.redteam-pentesting.de/advisories/rt-sa-2023-004/
|
|
CVE-2023-32751 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
|
CVE-2023-3276 - https://vuldb.com/?id.231626
|
|
CVE-2023-32767 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-014.txt
|
|
CVE-2023-32781 - http://packetstormsecurity.com/files/176677/PRTG-Authenticated-Remote-Code-Execution.html
|
|
CVE-2023-32784 - https://github.com/keepassxreboot/keepassxc/discussions/9433
|
|
CVE-2023-32784 - https://github.com/vdohney/keepass-password-dumper
|
|
CVE-2023-32784 - https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/
|
|
CVE-2023-3279 - https://wpscan.com/vulnerability/3b7a7070-8d61-4ff8-b003-b4ff06221635
|
|
CVE-2023-32832 - http://packetstormsecurity.com/files/175662/Android-mtk_jpeg-Driver-Race-Condition-Privilege-Escalation.html
|
|
CVE-2023-32837 - http://packetstormsecurity.com/files/175665/mtk-jpeg-Driver-Out-Of-Bounds-Read-Write.html
|
|
CVE-2023-3291 - https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5
|
|
CVE-2023-3294 - https://huntr.dev/bounties/9d308ebb-4289-411f-ac22-990383d98932
|
|
CVE-2023-32961 - https://lourcode.kr/posts/CVE-2023-32961-Analysis/
|
|
CVE-2023-3304 - https://huntr.dev/bounties/721fae61-3c8c-4e4b-8407-64321bc0ed17
|
|
CVE-2023-3305 - https://github.com/sleepyvv/vul_report/blob/main/C-data/BrokenAccessControl.md
|
|
CVE-2023-3307 - https://github.com/ctflearner/Vulnerability/blob/main/MINICAL/minical.md
|
|
CVE-2023-3308 - https://github.com/NanKeXXX/selfVuln_poc/blob/main/whaleal%3Aicefrog/icefrog_1.1.8_RCE.md
|
|
CVE-2023-3309 - https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3309
|
|
CVE-2023-3311 - https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3311
|
|
CVE-2023-3313 - https://kcm.trellix.com/corporate/index?page=content&id=SB10403
|
|
CVE-2023-33131 - http://packetstormsecurity.com/files/173361/Microsoft-365-MSO-2306-Build-16.0.16529.20100-Remote-Code-Execution.html
|
|
CVE-2023-3314 - https://kcm.trellix.com/corporate/index?page=content&id=SB10403
|
|
CVE-2023-33140 - http://packetstormsecurity.com/files/173064/Microsoft-OneNote-2305-Build-16.0.16501.20074-Spoofing.html
|
|
CVE-2023-33148 - http://packetstormsecurity.com/files/173591/Microsoft-Office-365-18.2305.1222.0-Remote-Code-Execution.html
|
|
CVE-2023-3316 - https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
|
|
CVE-2023-3318 - https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3318
|
|
CVE-2023-33185 - https://github.com/django-ses/django-ses/blob/3d627067935876487f9938310d5e1fbb249a7778/CVE/001-cert-url-signature-verification.md
|
|
CVE-2023-33190 - https://github.com/labring/sealos/security/advisories/GHSA-74j8-w7f9-pp62
|
|
CVE-2023-33194 - https://github.com/craftcms/cms/security/advisories/GHSA-3wxg-w96j-8hq9
|
|
CVE-2023-33195 - https://github.com/craftcms/cms/security/advisories/GHSA-qpgm-gjgf-8c2x
|
|
CVE-2023-33196 - https://github.com/craftcms/cms/security/advisories/GHSA-cjmm-x9x9-m2w5
|
|
CVE-2023-33197 - https://github.com/craftcms/cms/security/advisories/GHSA-6qjx-787v-6pxr
|
|
CVE-2023-3320 - http://packetstormsecurity.com/files/173048/WordPress-WP-Sticky-Social-1.0.1-CSRF-Cross-Site-Scripting.html
|
|
CVE-2023-33203 - https://bugzilla.suse.com/show_bug.cgi?id=1210685
|
|
CVE-2023-33203 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
|
|
CVE-2023-33237 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
|
CVE-2023-33238 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
|
CVE-2023-33239 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
|
CVE-2023-33241 - https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc
|
|
CVE-2023-33241 - https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/
|
|
CVE-2023-33242 - https://github.com/fireblocks-labs/zengo-lindell17-exploit-poc
|
|
CVE-2023-33242 - https://www.fireblocks.com/blog/lindell17-abort-vulnerability-technical-report/
|
|
CVE-2023-33243 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
|
CVE-2023-33243 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2022-004/-starface-authentication-with-password-hash-possible
|
|
CVE-2023-33246 - http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html
|
|
CVE-2023-33253 - https://github.com/Toxich4/CVE-2023-33253
|
|
CVE-2023-33255 - http://packetstormsecurity.com/files/172644/Papaya-Medical-Viewer-1.0-Cross-Site-Scripting.html
|
|
CVE-2023-33263 - https://packetstormsecurity.com/files/172560/WFTPD-3.25-Credential-Disclosure.html
|
|
CVE-2023-33268 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33268.md
|
|
CVE-2023-33269 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33269.md
|
|
CVE-2023-33270 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33270.md
|
|
CVE-2023-33271 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33271.md
|
|
CVE-2023-33272 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33272.md
|
|
CVE-2023-33273 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33273.md
|
|
CVE-2023-33274 - https://gist.github.com/pedromonteirobb/a0584095b46141702c8cae0f3f1b6759
|
|
CVE-2023-33276 - https://www.syss.de/en/responsible-disclosure-policy
|
|
CVE-2023-33276 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-016.txt
|
|
CVE-2023-33277 - https://www.syss.de/en/responsible-disclosure-policy
|
|
CVE-2023-33277 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-015.txt
|
|
CVE-2023-33284 - https://www.cyberskydd.se/cve/2023/CVE-2023-33284.html
|
|
CVE-2023-33288 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
|
|
CVE-2023-33289 - https://gist.github.com/6en6ar/b118888dc739e8979038f24c8ac33611
|
|
CVE-2023-33291 - http://packetstormsecurity.com/files/172476/eBankIT-6-Arbitrary-OTP-Generation.html
|
|
CVE-2023-33335 - https://inf0seq.github.io/cve/2023/05/03/Cross-Site-scripting-(XSS)-in-Sophos-iView.html
|
|
CVE-2023-33336 - https://inf0seq.github.io/cve/2023/04/30/Cross-site-scripting-(XSS)-in-Sophos-Web-Appliance-4.1.1-0.9.html
|
|
CVE-2023-33356 - https://github.com/Thecosy/IceCMS/issues/8
|
|
CVE-2023-33359 - https://github.com/Piwigo/Piwigo/issues/1908
|
|
CVE-2023-3338 - https://seclists.org/oss-sec/2023/q2/276
|
|
CVE-2023-33383 - http://packetstormsecurity.com/files/173954/Shelly-PRO-4PM-0.11.0-Authentication-Bypass.html
|
|
CVE-2023-33383 - https://www.exploitsecurity.io/post/cve-2023-33383-authentication-bypass-via-an-out-of-bounds-read-vulnerability
|
|
CVE-2023-33386 - https://github.com/b1ackc4t/MarsCTF/issues/10
|
|
CVE-2023-33387 - https://www.tuv.com/landingpage/de/schwachstelle/
|
|
CVE-2023-33408 - https://github.com/Thirukrishnan/CVE-2023-33408
|
|
CVE-2023-33409 - https://github.com/Thirukrishnan/CVE-2023-33409
|
|
CVE-2023-33410 - https://github.com/Thirukrishnan/CVE-2023-33410
|
|
CVE-2023-3342 - http://packetstormsecurity.com/files/173434/WordPress-User-Registration-3.0.2-Arbitrary-File-Upload.html
|
|
CVE-2023-33440 - http://packetstormsecurity.com/files/172672/Faculty-Evaluation-System-1.0-Shell-Upload.html
|
|
CVE-2023-33443 - https://gitlab.com/FallFur/exploiting-unprotected-admin-funcionalities-on-besder-ip-cameras/
|
|
CVE-2023-3346 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-007_en.pdf
|
|
CVE-2023-33478 - https://github.com/remoteclinic/RemoteClinic/issues/22
|
|
CVE-2023-33479 - https://github.com/remoteclinic/RemoteClinic/issues/23
|
|
CVE-2023-33480 - https://github.com/remoteclinic/RemoteClinic/issues/24
|
|
CVE-2023-33485 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/5
|
|
CVE-2023-33486 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/3
|
|
CVE-2023-33487 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/4
|
|
CVE-2023-33496 - https://github.com/edirc-wong/record/blob/main/deserialization_vulnerability_report.md
|
|
CVE-2023-33510 - https://carl1l.github.io/2023/05/08/jeecg-p3-biz-chat-1-0-5-jar-has-arbitrary-file-read-vulnerability/
|
|
CVE-2023-33518 - https://github.com/emoncms/emoncms/issues/1856
|
|
CVE-2023-33534 - https://rodelllemit.medium.com/cve-2023-33534-account-takeover-through-csrf-vulnerability-461de6f1b696
|
|
CVE-2023-33537 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/1/TL-WR940N_TL-WR841N_TL-WR740N_userRpm_FixMapCfgRpm.md
|
|
CVE-2023-33538 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md
|
|
CVE-2023-33544 - https://github.com/hawtio/hawtio/issues/2832
|
|
CVE-2023-33546 - https://github.com/janino-compiler/janino/issues/201
|
|
CVE-2023-33553 - https://github.com/0xfml/poc/blob/main/PLANET/WDRT-1800AX.md
|
|
CVE-2023-33556 - https://github.com/Am1ngl/ttt/tree/main/37
|
|
CVE-2023-33558 - https://github.com/ninj4c0d3r/OcoMon-Research/commit/6357def478b11119270b89329fceb115f12c69fc
|
|
CVE-2023-33568 - https://www.dsecbypass.com/en/dolibarr-pre-auth-contact-database-dump/
|
|
CVE-2023-33570 - https://siltonrenato02.medium.com/a-brief-summary-about-a-ssti-to-rce-in-bagisto-e900ac450490
|
|
CVE-2023-33580 - http://packetstormsecurity.com/files/173030/Student-Study-Center-Management-System-1.0-Cross-Site-Scripting.html
|
|
CVE-2023-33580 - https://www.exploit-db.com/exploits/51528
|
|
CVE-2023-33584 - http://packetstormsecurity.com/files/172718/Enrollment-System-Project-1.0-Authentication-Bypass-SQL-Injection.html
|
|
CVE-2023-33584 - https://packetstormsecurity.com/files/cve/CVE-2023-33584
|
|
CVE-2023-33584 - https://www.exploit-db.com/exploits/51501
|
|
CVE-2023-33592 - http://packetstormsecurity.com/files/173331/Lost-And-Found-Information-System-1.0-SQL-Injection.html
|
|
CVE-2023-33595 - https://github.com/python/cpython/issues/103824
|
|
CVE-2023-33621 - https://justinapplegate.me/2023/glinet-CVE-2023-33621/
|
|
CVE-2023-33625 - https://github.com/naihsin/IoT/blob/main/D-Link/DIR-600/cmd%20injection/README.md
|
|
CVE-2023-33625 - https://github.com/naihsin/IoT/tree/main/D-Link/DIR-600/cmd%20injection
|
|
CVE-2023-33626 - https://github.com/naihsin/IoT/blob/main/D-Link/DIR-600/overflow/README.md
|
|
CVE-2023-33626 - https://github.com/naihsin/IoT/tree/main/D-Link/DIR-600/overflow
|
|
CVE-2023-33627 - https://hackmd.io/@0dayResearch/UpdateSnat
|
|
CVE-2023-33628 - https://hackmd.io/@0dayResearch/DelvsList_R300
|
|
CVE-2023-33629 - https://hackmd.io/@0dayResearch/r1UjggZfh
|
|
CVE-2023-33630 - https://hackmd.io/@0dayResearch/HkUA31-Mh
|
|
CVE-2023-33631 - https://hackmd.io/@0dayResearch/DelSTList
|
|
CVE-2023-33632 - https://hackmd.io/@0dayResearch/r1N7fg-fn
|
|
CVE-2023-33633 - https://hackmd.io/@0dayResearch/UpdateWanParams
|
|
CVE-2023-33634 - https://hackmd.io/@0dayResearch/r1g5bl-Mn
|
|
CVE-2023-33635 - https://hackmd.io/@0dayResearch/UpdateMacClone
|
|
CVE-2023-33636 - https://hackmd.io/@0dayResearch/HyX6mgWz2
|
|
CVE-2023-33637 - https://hackmd.io/@0dayResearch/r1azLeWz3
|
|
CVE-2023-33638 - https://hackmd.io/@0dayResearch/ryyALdiV3
|
|
CVE-2023-33639 - https://hackmd.io/@0dayResearch/Bk2hvYkH3
|
|
CVE-2023-33640 - https://hackmd.io/@0dayResearch/S1twOtyrh
|
|
CVE-2023-33641 - https://hackmd.io/@0dayResearch/SycYkOj42
|
|
CVE-2023-33642 - https://hackmd.io/@0dayResearch/Skg0zOsVh
|
|
CVE-2023-33643 - https://hackmd.io/@0dayResearch/S1N5bdsE2
|
|
CVE-2023-33656 - https://github.com/emqx/nanomq/issues/1164
|
|
CVE-2023-33656 - https://github.com/emqx/nanomq/issues/1165#issuecomment-1515667127
|
|
CVE-2023-33657 - https://github.com/emqx/nanomq/issues/1165#issue-1668648319
|
|
CVE-2023-33658 - https://github.com/emqx/nanomq/issues/1153
|
|
CVE-2023-33659 - https://github.com/emqx/nanomq/issues/1154
|
|
CVE-2023-33660 - https://github.com/emqx/nanomq/issues/1155
|
|
CVE-2023-33661 - https://github.com/ChurchCRM/CRM/issues/6474
|
|
CVE-2023-33669 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N1/README.md
|
|
CVE-2023-33669 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N1
|
|
CVE-2023-33670 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N3/README.md
|
|
CVE-2023-33670 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N3
|
|
CVE-2023-33671 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N4/README.md
|
|
CVE-2023-33671 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N4
|
|
CVE-2023-33672 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N2/README.md
|
|
CVE-2023-33672 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N2
|
|
CVE-2023-33673 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N6/README.md
|
|
CVE-2023-33673 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N6
|
|
CVE-2023-33675 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N5/README.md
|
|
CVE-2023-33675 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N5
|
|
CVE-2023-3368 - https://starlabs.sg/advisories/23/23-3368/
|
|
CVE-2023-33684 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5771.php
|
|
CVE-2023-33690 - https://github.com/lane711/sonicjs/pull/183
|
|
CVE-2023-33690 - https://youtu.be/6ZuwA9CkQLg
|
|
CVE-2023-33693 - https://github.com/tsingsee/EasyPlayerPro-Win/pull/24
|
|
CVE-2023-33716 - https://github.com/enzo1982/mp4v2/issues/36
|
|
CVE-2023-33717 - https://github.com/enzo1982/mp4v2/issues/37
|
|
CVE-2023-33718 - https://github.com/enzo1982/mp4v2/issues/37
|
|
CVE-2023-33719 - https://github.com/enzo1982/mp4v2/issues/37
|
|
CVE-2023-33720 - https://github.com/enzo1982/mp4v2/issues/36
|
|
CVE-2023-33733 - https://github.com/c53elyas/CVE-2023-33733
|
|
CVE-2023-33740 - https://github.com/zzh-newlearner/record/blob/main/luowice_warning.md
|
|
CVE-2023-33741 - https://github.com/zzh-newlearner/record/blob/main/macrovideo_share.md
|
|
CVE-2023-33742 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html
|
|
CVE-2023-33743 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html
|
|
CVE-2023-33744 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html
|
|
CVE-2023-33745 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html
|
|
CVE-2023-33747 - http://packetstormsecurity.com/files/172768/CloudPanel-2.2.2-Privilege-Escalation-Path-Traversal.html
|
|
CVE-2023-33747 - https://github.com/EagleTube/CloudPanel
|
|
CVE-2023-33754 - https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md
|
|
CVE-2023-33757 - https://github.com/twignet/splicecom
|
|
CVE-2023-33758 - https://github.com/twignet/splicecom
|
|
CVE-2023-33759 - https://github.com/twignet/splicecom
|
|
CVE-2023-33760 - https://github.com/twignet/splicecom
|
|
CVE-2023-33761 - https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33761
|
|
CVE-2023-33763 - https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33763
|
|
CVE-2023-33764 - https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33764
|
|
CVE-2023-33778 - https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef
|
|
CVE-2023-33780 - https://github.com/invernyx/smartcars-3-bugs/security/advisories/GHSA-hx8p-f8h7-5h78
|
|
CVE-2023-33781 - https://github.com/s0tr/CVE-2023-33781
|
|
CVE-2023-33782 - https://github.com/s0tr/CVE-2023-33782
|
|
CVE-2023-33785 - https://github.com/anhdq201/netbox/issues/8
|
|
CVE-2023-33786 - https://github.com/anhdq201/netbox/issues/2
|
|
CVE-2023-33787 - https://github.com/anhdq201/netbox/issues/6
|
|
CVE-2023-33788 - https://github.com/anhdq201/netbox/issues/3
|
|
CVE-2023-33789 - https://github.com/anhdq201/netbox/issues/7
|
|
CVE-2023-33790 - https://github.com/anhdq201/netbox/issues/9
|
|
CVE-2023-33791 - https://github.com/anhdq201/netbox/issues/4
|
|
CVE-2023-33792 - https://github.com/anhdq201/netbox/issues/10
|
|
CVE-2023-33793 - https://github.com/anhdq201/netbox/issues/1
|
|
CVE-2023-33794 - https://github.com/anhdq201/netbox/issues/5
|
|
CVE-2023-33795 - https://github.com/anhdq201/netbox/issues/15
|
|
CVE-2023-33796 - https://github.com/anhdq201/netbox/issues/16
|
|
CVE-2023-33797 - https://github.com/anhdq201/netbox/issues/12
|
|
CVE-2023-33798 - https://github.com/anhdq201/netbox/issues/13
|
|
CVE-2023-33799 - https://github.com/anhdq201/netbox/issues/14
|
|
CVE-2023-3380 - https://github.com/sleepyvv/vul_report/blob/main/WAVLINK/WAVLINK-WN579X3-RCE.md
|
|
CVE-2023-33800 - https://github.com/anhdq201/netbox/issues/11
|
|
CVE-2023-33817 - https://github.com/leekenghwa/CVE-2023-33817---SQL-Injection-found-in-HotelDruid-3.0.5
|
|
CVE-2023-33829 - http://packetstormsecurity.com/files/172588/SCM-Manager-1.60-Cross-Site-Scripting.html
|
|
CVE-2023-33829 - https://github.com/n3gox/Stored-XSS-on-SCM-Manager-1.60
|
|
CVE-2023-33849 - https://www.ibm.com/support/pages/node/7001687
|
|
CVE-2023-3385 - https://gitlab.com/gitlab-org/gitlab/-/issues/416161
|
|
CVE-2023-33863 - http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html
|
|
CVE-2023-33863 - http://seclists.org/fulldisclosure/2023/Jun/2
|
|
CVE-2023-33863 - https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt
|
|
CVE-2023-33864 - http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html
|
|
CVE-2023-33864 - http://seclists.org/fulldisclosure/2023/Jun/2
|
|
CVE-2023-33864 - https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt
|
|
CVE-2023-33865 - http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html
|
|
CVE-2023-33865 - http://seclists.org/fulldisclosure/2023/Jun/2
|
|
CVE-2023-33865 - https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt
|
|
CVE-2023-33866 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1757
|
|
CVE-2023-33873 - https://www.aveva.com/en/support-and-success/cyber-security-updates/
|
|
CVE-2023-33876 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1796
|
|
CVE-2023-3389 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
|
CVE-2023-3390 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
|
CVE-2023-33919 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html
|
|
CVE-2023-33919 - http://seclists.org/fulldisclosure/2023/Jul/14
|
|
CVE-2023-33920 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html
|
|
CVE-2023-33920 - http://seclists.org/fulldisclosure/2023/Jul/14
|
|
CVE-2023-33921 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html
|
|
CVE-2023-33921 - http://seclists.org/fulldisclosure/2023/Jul/14
|
|
CVE-2023-3393 - https://huntr.dev/bounties/e4df9280-900a-407a-a07e-e7fef3345914
|
|
CVE-2023-3394 - https://huntr.dev/bounties/84bf3e85-cdeb-4b8d-9ea4-74156dbda83f
|
|
CVE-2023-33956 - https://github.com/kanboard/kanboard/security/advisories/GHSA-r36m-44gg-wxg2
|
|
CVE-2023-33968 - https://github.com/kanboard/kanboard/security/advisories/GHSA-gf8r-4p6m-v8vr
|
|
CVE-2023-33969 - https://github.com/kanboard/kanboard/security/advisories/GHSA-8qvf-9847-gpc9
|
|
CVE-2023-33970 - https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286
|
|
CVE-2023-33971 - https://github.com/pluginsGLPI/formcreator/security/advisories/GHSA-777g-3848-8r3g
|
|
CVE-2023-33977 - https://huntr.dev/bounties/6aea9a26-e29a-467b-aa5a-f767f0c2ec96/
|
|
CVE-2023-3398 - https://huntr.dev/bounties/aa087215-80e1-433d-b870-650705630e69
|
|
CVE-2023-33984 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-33985 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-33986 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-33987 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-33988 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-33989 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-33990 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-33991 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-33992 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-3401 - https://gitlab.com/gitlab-org/gitlab/-/issues/416252
|
|
CVE-2023-34039 - http://packetstormsecurity.com/files/174452/VMWare-Aria-Operations-For-Networks-Remote-Code-Execution.html
|
|
CVE-2023-34039 - http://packetstormsecurity.com/files/175320/VMWare-Aria-Operations-For-Networks-SSH-Private-Key-Exposure.html
|
|
CVE-2023-34044 - https://www.vmware.com/security/advisories/VMSA-2023-0022.html
|
|
CVE-2023-34045 - https://www.vmware.com/security/advisories/VMSA-2023-0022.html
|
|
CVE-2023-34046 - https://www.vmware.com/security/advisories/VMSA-2023-0022.html
|
|
CVE-2023-34059 - http://www.openwall.com/lists/oss-security/2023/10/27/3
|
|
CVE-2023-34059 - http://www.openwall.com/lists/oss-security/2023/11/26/1
|
|
CVE-2023-34092 - https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67
|
|
CVE-2023-34093 - https://github.com/strapi/strapi/commit/2fa8f30371bfd1db44c15e5747860ee5789096de
|
|
CVE-2023-34093 - https://github.com/strapi/strapi/releases/tag/v4.10.8
|
|
CVE-2023-34093 - https://github.com/strapi/strapi/security/advisories/GHSA-chmr-rg2f-9jmf
|
|
CVE-2023-34096 - http://packetstormsecurity.com/files/172822/Thruk-Monitoring-Web-Interface-3.06-Path-Traversal.html
|
|
CVE-2023-34096 - https://galogetlatorre.blogspot.com/2023/06/cve-2023-34096-path-traversal-thruk.html
|
|
CVE-2023-34096 - https://github.com/galoget/Thruk-CVE-2023-34096
|
|
CVE-2023-34096 - https://github.com/sni/Thruk/security/advisories/GHSA-vhqc-649h-994h
|
|
CVE-2023-34096 - https://www.exploit-db.com/exploits/51509
|
|
CVE-2023-34097 - https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qpx8-wq6q-r833
|
|
CVE-2023-34102 - https://github.com/avo-hq/avo/security/advisories/GHSA-86h2-2g4g-29qx
|
|
CVE-2023-34103 - https://github.com/avo-hq/avo/security/advisories/GHSA-5cr9-5jx3-2g39
|
|
CVE-2023-34105 - https://github.com/ossrs/srs/security/advisories/GHSA-vpr5-779c-cx62
|
|
CVE-2023-34111 - https://github.com/taosdata/grafanaplugin/security/advisories/GHSA-23wp-p848-hcgr
|
|
CVE-2023-34111 - https://securitylab.github.com/research/github-actions-untrusted-input/
|
|
CVE-2023-34112 - https://securitylab.github.com/research/github-actions-untrusted-input/
|
|
CVE-2023-34124 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html
|
|
CVE-2023-34127 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html
|
|
CVE-2023-34132 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html
|
|
CVE-2023-34133 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html
|
|
CVE-2023-34151 - https://github.com/ImageMagick/ImageMagick/issues/6341
|
|
CVE-2023-34152 - https://github.com/ImageMagick/ImageMagick/issues/6339
|
|
CVE-2023-34153 - https://github.com/ImageMagick/ImageMagick/issues/6338
|
|
CVE-2023-34188 - https://github.com/cesanta/mongoose/pull/2197
|
|
CVE-2023-34198 - https://advisories.stormshield.eu/2023-019
|
|
CVE-2023-34204 - https://github.com/imapsync/imapsync/issues/399
|
|
CVE-2023-34205 - https://github.com/moov-io/signedxml/issues/23
|
|
CVE-2023-3421 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1751
|
|
CVE-2023-34213 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
|
CVE-2023-34214 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
|
CVE-2023-34215 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
|
CVE-2023-34216 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
|
CVE-2023-34217 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
|
CVE-2023-3423 - https://huntr.dev/bounties/dd19c7d0-70f1-4d86-a552-611dfa8e0139
|
|
CVE-2023-34235 - https://github.com/strapi/strapi/releases/tag/v4.10.8
|
|
CVE-2023-34235 - https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f
|
|
CVE-2023-34251 - https://github.com/getgrav/grav/security/advisories/GHSA-f9jf-4cp4-4fq5
|
|
CVE-2023-34253 - https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/
|
|
CVE-2023-34259 - https://seclists.org/fulldisclosure/2023/Jul/15
|
|
CVE-2023-34260 - https://seclists.org/fulldisclosure/2023/Jul/15
|
|
CVE-2023-34261 - https://seclists.org/fulldisclosure/2023/Jul/15
|
|
CVE-2023-3431 - https://huntr.dev/bounties/fa741f95-b53c-4ed7-b157-e32c5145164c
|
|
CVE-2023-34312 - https://github.com/vi3t1/qq-tim-elevation
|
|
CVE-2023-34317 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1772
|
|
CVE-2023-34319 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
|
CVE-2023-3432 - https://huntr.dev/bounties/8ac3316f-431c-468d-87e4-3dafff2ecf51
|
|
CVE-2023-34346 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1764
|
|
CVE-2023-34353 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1776
|
|
CVE-2023-34354 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1781
|
|
CVE-2023-34356 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1778
|
|
CVE-2023-3436 - https://forum.xpdfreader.com/viewtopic.php?t=42618
|
|
CVE-2023-34362 - http://packetstormsecurity.com/files/172883/MOVEit-Transfer-SQL-Injection-Remote-Code-Execution.html
|
|
CVE-2023-34362 - http://packetstormsecurity.com/files/173110/MOVEit-SQL-Injection.html
|
|
CVE-2023-34365 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1763
|
|
CVE-2023-34366 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1758
|
|
CVE-2023-34366 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1758
|
|
CVE-2023-34367 - http://blog.pi3.com.pl/?p=850
|
|
CVE-2023-34367 - https://portswigger.net/daily-swig/blind-tcp-ip-hijacking-is-resurrected-for-windows-7
|
|
CVE-2023-3438 - https://kcm.trellix.com/corporate/index?page=content&id=SB10404
|
|
CVE-2023-3439 - http://www.openwall.com/lists/oss-security/2023/07/02/1
|
|
CVE-2023-3439 - https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269
|
|
CVE-2023-34407 - https://cybir.com/2023/cve/proof-of-concept-checkpoint-learning-harbinger-systems-offline-player-multiple-poc-for-cl-4-0-6-0-2-lfi-excessive-rights/
|
|
CVE-2023-34408 - https://huntr.dev/bounties/c6119106-1a5c-464c-94dd-ee7c5d0bece0/
|
|
CVE-2023-34409 - https://www.percona.com/blog/pmm-authentication-bypass-vulnerability-fixed-in-2-37-1/
|
|
CVE-2023-34426 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1766
|
|
CVE-2023-34434 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-34448 - https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/
|
|
CVE-2023-3445 - https://huntr.dev/bounties/18a74a9d-4a2d-4bf8-ae62-56a909427070
|
|
CVE-2023-34452 - https://github.com/getgrav/grav/security/advisories/GHSA-xcr8-cc2j-62fc
|
|
CVE-2023-34457 - https://github.com/MechanicalSoup/MechanicalSoup/security/advisories/GHSA-x456-3ccm-m6j4
|
|
CVE-2023-34467 - https://jira.xwiki.org/browse/XWIKI-20333
|
|
CVE-2023-34468 - http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html
|
|
CVE-2023-34488 - https://github.com/emqx/nanomq/issues/1181
|
|
CVE-2023-34494 - https://github.com/emqx/nanomq/issues/1180
|
|
CVE-2023-34553 - https://ashallen.net/wireless-smart-lock-vulnerability-disclosure
|
|
CVE-2023-34561 - https://www.youtube.com/watch?v=DMxucOWfLPc
|
|
CVE-2023-34561 - https://www.youtube.com/watch?v=ev0VXbiduuQ
|
|
CVE-2023-34561 - https://www.youtube.com/watch?v=kAeJvY6BBps
|
|
CVE-2023-34563 - https://github.com/D2y6p/CVE/blob/main/Netgear/CVE-2023-34563/EN.md
|
|
CVE-2023-34565 - https://github.com/grayfullbuster0804/netbox/issues/1
|
|
CVE-2023-34566 - https://hackmd.io/@0dayResearch/rk8hQf5rh
|
|
CVE-2023-34567 - https://hackmd.io/@0dayResearch/H1xUqzfHh
|
|
CVE-2023-34568 - https://hackmd.io/@0dayResearch/ryR8IzMH2
|
|
CVE-2023-34569 - https://hackmd.io/@0dayResearch/HymuzffSh
|
|
CVE-2023-34570 - https://hackmd.io/@0dayResearch/S1eI91_l2
|
|
CVE-2023-34571 - https://hackmd.io/@0dayResearch/S1GcUxzSn
|
|
CVE-2023-34581 - https://packetstormsecurity.com/files/172559/Service-Provider-Management-System-1.0-SQL-Injection.html
|
|
CVE-2023-34581 - https://vulners.com/packetstorm/PACKETSTORM:172559
|
|
CVE-2023-34581 - https://www.exploit-db.com/exploits/51482
|
|
CVE-2023-34598 - https://github.com/maddsec/CVE-2023-34598
|
|
CVE-2023-34599 - https://github.com/maddsec/CVE-2023-34599
|
|
CVE-2023-34602 - https://github.com/jeecgboot/jeecg-boot/issues/4983
|
|
CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/48/
|
|
CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/49/
|
|
CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/50/
|
|
CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/51/
|
|
CVE-2023-34610 - https://github.com/jdereg/json-io/issues/169
|
|
CVE-2023-34611 - https://github.com/bolerio/mjson/issues/40
|
|
CVE-2023-34612 - https://github.com/phax/ph-commons/issues/35
|
|
CVE-2023-34613 - https://github.com/maddingo/sojo/issues/15
|
|
CVE-2023-34614 - https://bitbucket.org/jmarsden/jsonij/issues/7/stack-overflow-error-caused-by-jsonij
|
|
CVE-2023-34615 - https://github.com/billdavidson/JSONUtil/issues/10
|
|
CVE-2023-34616 - https://github.com/InductiveComputerScience/pbJson/issues/2
|
|
CVE-2023-34617 - https://github.com/owlike/genson/issues/191
|
|
CVE-2023-34620 - https://github.com/hjson/hjson-java/issues/24
|
|
CVE-2023-34623 - https://github.com/trajano/jtidy/issues/4
|
|
CVE-2023-34624 - https://github.com/amplafi/htmlcleaner/issues/13
|
|
CVE-2023-34625 - https://packetstormsecurity.com/2307-exploits/mojobox14-replay.txt
|
|
CVE-2023-34625 - https://www.whid.ninja/blog/mojobox-yet-another-not-so-smartlock
|
|
CVE-2023-34634 - http://packetstormsecurity.com/files/173825/GreenShot-1.2.10-Arbitrary-Code-Execution.html
|
|
CVE-2023-34634 - http://packetstormsecurity.com/files/174222/Greenshot-1.3.274-Deserialization-Command-Execution.html
|
|
CVE-2023-34634 - https://greenshot.atlassian.net/browse/BUG-3061
|
|
CVE-2023-34634 - https://www.exploit-db.com/exploits/51633
|
|
CVE-2023-34635 - http://packetstormsecurity.com/files/173669/Wifi-Soft-Unibox-Administration-3.0-3.1-SQL-Injection.html
|
|
CVE-2023-34635 - https://www.exploit-db.com/exploits/51610
|
|
CVE-2023-34644 - https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/
|
|
CVE-2023-34645 - https://github.com/jflyfox/jfinal_cms/issues/57
|
|
CVE-2023-3465 - https://vuldb.com/?id.232711
|
|
CVE-2023-34654 - https://github.com/ae6e361b/taocms-XSS
|
|
CVE-2023-34666 - https://www.exploit-db.com/exploits/49204
|
|
CVE-2023-3469 - https://huntr.dev/bounties/3565cfc9-82c4-4db8-9b8f-494dd81b56ca
|
|
CVE-2023-34723 - http://packetstormsecurity.com/files/174553/TECHView-LA5570-Wireless-Gateway-1.0.19_T53-Traversal-Privilege-Escalation.html
|
|
CVE-2023-34723 - https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725
|
|
CVE-2023-34724 - http://packetstormsecurity.com/files/174553/TECHView-LA5570-Wireless-Gateway-1.0.19_T53-Traversal-Privilege-Escalation.html
|
|
CVE-2023-34724 - https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725
|
|
CVE-2023-34725 - http://packetstormsecurity.com/files/174553/TECHView-LA5570-Wireless-Gateway-1.0.19_T53-Traversal-Privilege-Escalation.html
|
|
CVE-2023-34725 - https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725
|
|
CVE-2023-34733 - https://github.com/zj3t/Automotive-vulnerabilities/tree/main/VW/jetta2021
|
|
CVE-2023-34734 - https://github.com/prismbreak/vulnerabilities/issues/3
|
|
CVE-2023-34735 - https://github.com/prismbreak/vulnerabilities/issues/4
|
|
CVE-2023-34736 - https://github.com/prismbreak/vulnerabilities/issues/5
|
|
CVE-2023-34750 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
|
|
CVE-2023-34751 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
|
|
CVE-2023-34752 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
|
|
CVE-2023-34753 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
|
|
CVE-2023-34754 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
|
|
CVE-2023-34755 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
|
|
CVE-2023-34756 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
|
|
CVE-2023-34758 - https://github.com/advisories/GHSA-8jxm-xp43-qh3q
|
|
CVE-2023-34758 - https://github.com/tangent65536/Slivjacker
|
|
CVE-2023-3479 - https://huntr.dev/bounties/6ac5cf87-6350-4645-8930-8f2876427723
|
|
CVE-2023-34795 - https://github.com/brechtsanders/xlsxio/issues/121
|
|
CVE-2023-34800 - https://github.com/Tyaoo/IoT-Vuls/blob/main/dlink/Go-RT-AC750/vul.md
|
|
CVE-2023-34830 - https://medium.com/@ray.999/cve-2023-34830-reflected-xss-on-i-doit-open-v24-and-below-ad58036f5407
|
|
CVE-2023-34832 - http://packetstormsecurity.com/files/172989/TP-Link-Archer-AX10-EU-_V1.2_230220-Buffer-Overflow.html
|
|
CVE-2023-34834 - https://www.exploit-db.com/exploits/51542
|
|
CVE-2023-34845 - https://github.com/bludit/bludit/issues/1369#issuecomment-940806199
|
|
CVE-2023-34849 - https://github.com/cczzmm/IOT-POC/tree/main/Ikuai
|
|
CVE-2023-3486 - https://www.tenable.com/security/research/tra-2023-23
|
|
CVE-2023-34867 - https://github.com/jerryscript-project/jerryscript/issues/5084
|
|
CVE-2023-34868 - https://github.com/jerryscript-project/jerryscript/issues/5083
|
|
CVE-2023-34872 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399
|
|
CVE-2023-3490 - https://huntr.dev/bounties/4e60ebc1-e00f-48cb-b011-3cefce688ecd
|
|
CVE-2023-3491 - https://huntr.dev/bounties/043bd900-ac78-44d2-a340-84ddd0bc4a1d
|
|
CVE-2023-34916 - https://github.com/fuge/cms/issues/4
|
|
CVE-2023-34917 - https://github.com/fuge/cms/issues/3
|
|
CVE-2023-34924 - https://github.com/ChrisL0tus/CVE-2023-34924
|
|
CVE-2023-34927 - https://github.com/casdoor/casdoor/issues/1531
|
|
CVE-2023-34928 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34928.md
|
|
CVE-2023-34929 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34929.md
|
|
CVE-2023-34930 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34930.md
|
|
CVE-2023-34931 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34931.md
|
|
CVE-2023-34932 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34932.md
|
|
CVE-2023-34933 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34933.md
|
|
CVE-2023-34934 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34934.md
|
|
CVE-2023-34935 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34935.md
|
|
CVE-2023-34936 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34936.md
|
|
CVE-2023-34937 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34937.md
|
|
CVE-2023-34939 - https://github.com/firsov/onlyoffice
|
|
CVE-2023-34939 - https://github.com/firsov/onlyoffice/blob/main/CVE-2023-34939-PoC.md
|
|
CVE-2023-34960 - http://packetstormsecurity.com/files/174314/Chamilo-1.11.18-Command-Injection.html
|
|
CVE-2023-34982 - https://www.aveva.com/en/support-and-success/cyber-security-updates/
|
|
CVE-2023-34994 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1773
|
|
CVE-2023-34998 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1770
|
|
CVE-2023-35001 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
|
|
CVE-2023-35001 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
|
CVE-2023-35002 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1760
|
|
CVE-2023-35016 - https://www.ibm.com/support/pages/node/7014397
|
|
CVE-2023-35019 - https://www.ibm.com/support/pages/node/7014397
|
|
CVE-2023-35055 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761
|
|
CVE-2023-35056 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761
|
|
CVE-2023-35057 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1821
|
|
CVE-2023-35057 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1821
|
|
CVE-2023-35088 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-3511 - https://gitlab.com/gitlab-org/gitlab/-/issues/416961
|
|
CVE-2023-35110 - https://github.com/grobmeier/jjson/issues/2
|
|
CVE-2023-35116 - https://github.com/FasterXML/jackson-databind/issues/3972
|
|
CVE-2023-35124 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1775
|
|
CVE-2023-35126 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1825
|
|
CVE-2023-35126 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1825
|
|
CVE-2023-3513 - https://starlabs.sg/advisories/23/23-3513/
|
|
CVE-2023-3514 - https://starlabs.sg/advisories/23/23-3514/
|
|
CVE-2023-3515 - https://huntr.dev/bounties/e335cd18-bc4d-4585-adb7-426c817ed053
|
|
CVE-2023-35153 - https://jira.xwiki.org/browse/XWIKI-20365
|
|
CVE-2023-35155 - https://jira.xwiki.org/browse/XWIKI-20370
|
|
CVE-2023-35156 - https://jira.xwiki.org/browse/XWIKI-20341
|
|
CVE-2023-35157 - https://jira.xwiki.org/browse/XWIKI-20339
|
|
CVE-2023-35158 - https://jira.xwiki.org/browse/XWIKI-20352
|
|
CVE-2023-35160 - https://jira.xwiki.org/browse/XWIKI-20343
|
|
CVE-2023-35162 - https://jira.xwiki.org/browse/XWIKI-20342
|
|
CVE-2023-35169 - https://github.com/Webklex/php-imap/security/advisories/GHSA-47p7-xfcc-4pv9
|
|
CVE-2023-3519 - http://packetstormsecurity.com/files/173997/Citrix-ADC-NetScaler-Remote-Code-Execution.html
|
|
CVE-2023-35193 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782
|
|
CVE-2023-35194 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782
|
|
CVE-2023-3520 - https://huntr.dev/bounties/f3b277bb-91db-419e-bcc4-fe0b055d2551
|
|
CVE-2023-3521 - https://huntr.dev/bounties/76a3441d-7f75-4a8d-a7a0-95a7f5456eb0
|
|
CVE-2023-3523 - https://huntr.dev/bounties/57e0be03-8484-415e-8b5c-c1fe4546eaac
|
|
CVE-2023-3526 - http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html
|
|
CVE-2023-3526 - http://seclists.org/fulldisclosure/2023/Aug/12
|
|
CVE-2023-3528 - https://vuldb.com/?id.233252
|
|
CVE-2023-3531 - https://huntr.dev/bounties/c9f0b3ff-bbc4-4ea1-a59e-8594b48bb414
|
|
CVE-2023-3532 - https://huntr.dev/bounties/ebd2428a-e2cb-480e-ba37-dd89ad62cf1b
|
|
CVE-2023-3533 - https://starlabs.sg/advisories/23/23-3533/
|
|
CVE-2023-35356 - http://packetstormsecurity.com/files/174115/Microsoft-Windows-Kernel-Arbitrary-Read.html
|
|
CVE-2023-35356 - http://packetstormsecurity.com/files/174118/Microsoft-Windows-Kernel-Security-Descriptor-Use-After-Free.html
|
|
CVE-2023-35356 - http://packetstormsecurity.com/files/176451/Microsoft-Windows-Registry-Predefined-Keys-Privilege-Escalation.html
|
|
CVE-2023-35357 - http://packetstormsecurity.com/files/174116/Microsoft-Windows-Kernel-Unsafe-Reference.html
|
|
CVE-2023-35358 - http://packetstormsecurity.com/files/174117/Microsoft-Windows-Kernel-Unsafe-Reference.html
|
|
CVE-2023-35359 - http://packetstormsecurity.com/files/174528/Microsoft-Windows-Privilege-Escalation.html
|
|
CVE-2023-3537 - https://vuldb.com/?id.233289
|
|
CVE-2023-35382 - http://packetstormsecurity.com/files/174450/Microsoft-Windows-Kernel-Use-After-Free.html
|
|
CVE-2023-35386 - http://packetstormsecurity.com/files/174567/Microsoft-Windows-Kernel-Integer-Overflow-Out-Of-Bounds-Read.html
|
|
CVE-2023-3545 - https://starlabs.sg/advisories/23/23-3545/
|
|
CVE-2023-3551 - https://huntr.dev/bounties/cf8878ff-6cd9-49be-b313-7ac2a94fc7f7
|
|
CVE-2023-3552 - https://huntr.dev/bounties/aeb2f43f-0602-4ac6-9685-273e87ff4ded
|
|
CVE-2023-3553 - https://huntr.dev/bounties/857f002a-2794-4807-aa5d-2f340de01870
|
|
CVE-2023-3559 - https://vuldb.com/?id.233353
|
|
CVE-2023-35633 - http://packetstormsecurity.com/files/176451/Microsoft-Windows-Registry-Predefined-Keys-Privilege-Escalation.html
|
|
CVE-2023-3565 - https://huntr.dev/bounties/fcf46e1f-2ab6-4057-9d25-cf493ab09530
|
|
CVE-2023-3566 - https://github.com/ctflearner/Vulnerability/blob/main/WALLABAG/NAME-LIMIT.md
|
|
CVE-2023-3566 - https://youtu.be/ouwud0PlHkE
|
|
CVE-2023-35668 - https://android.googlesource.com/platform/frameworks/base/+/b7bd7df91740da680a5c3a84d8dd91b4ca6956dd
|
|
CVE-2023-3567 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
|
CVE-2023-3567 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
|
CVE-2023-3568 - https://huntr.dev/bounties/f3782eb1-049b-4998-aac4-d9798ec1c123
|
|
CVE-2023-3569 - http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html
|
|
CVE-2023-3569 - http://seclists.org/fulldisclosure/2023/Aug/12
|
|
CVE-2023-35695 - https://www.tenable.com/security/research/tra-2023-17
|
|
CVE-2023-35719 - https://www.manageengine.com/products/self-service-password/kb/our-response-to-CVE-2023-35719.html
|
|
CVE-2023-3574 - https://huntr.dev/bounties/1dcb4f01-e668-4aa3-a6a3-838532e500c6
|
|
CVE-2023-3575 - https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins
|
|
CVE-2023-35759 - http://packetstormsecurity.com/files/176978/WhatsUp-Gold-2022-22.1.0-Build-39-Cross-Site-Scripting.html
|
|
CVE-2023-35788 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
|
CVE-2023-35788 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7
|
|
CVE-2023-3579 - https://github.com/nightcloudos/cve/blob/main/CSRF.md
|
|
CVE-2023-35799 - https://advisories.stormshield.eu/2023-022/
|
|
CVE-2023-3580 - https://huntr.dev/bounties/4eed53ca-06c2-43aa-aea8-c03ea5f13ce4
|
|
CVE-2023-35800 - https://advisories.stormshield.eu/2023-021/
|
|
CVE-2023-35808 - http://packetstormsecurity.com/files/174300/SugarCRM-12.2.0-Shell-Upload.html
|
|
CVE-2023-35808 - http://seclists.org/fulldisclosure/2023/Aug/26
|
|
CVE-2023-35809 - http://packetstormsecurity.com/files/174301/SugarCRM-12.2.0-Bean-Manipulation.html
|
|
CVE-2023-35810 - http://packetstormsecurity.com/files/174302/SugarCRM-12.2.0-PHP-Object-Injection.html
|
|
CVE-2023-35810 - http://seclists.org/fulldisclosure/2023/Aug/28
|
|
CVE-2023-35811 - http://packetstormsecurity.com/files/174303/SugarCRM-12.2.0-SQL-Injection.html
|
|
CVE-2023-35811 - http://seclists.org/fulldisclosure/2023/Aug/29
|
|
CVE-2023-35818 - https://espressif.com
|
|
CVE-2023-35839 - https://github.com/noear/solon/issues/145
|
|
CVE-2023-35861 - https://blog.freax13.de/cve/cve-2023-35861
|
|
CVE-2023-35863 - https://ctrl-c.club/~blue/nfsdk.html
|
|
CVE-2023-35866 - https://medium.com/@cybercitizen.tech/keepassxc-vulnerability-cve-2023-35866-dc7d447c4903
|
|
CVE-2023-35870 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-35871 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-35872 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-35873 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-35874 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-35885 - https://github.com/datackmy/FallingSkies-CVE-2023-35885
|
|
CVE-2023-35885 - https://www.datack.my/fallingskies-cloudpanel-0-day/
|
|
CVE-2023-35925 - https://github.com/IntellectualSites/FastAsyncWorldEdit/security/advisories/GHSA-whj9-m24x-qhhp
|
|
CVE-2023-35932 - https://github.com/tanghaibao/jcvi/security/advisories/GHSA-x49m-3cw7-gq5q
|
|
CVE-2023-35937 - https://github.com/metersphere/metersphere/security/advisories/GHSA-7xj3-qrx5-524r
|
|
CVE-2023-35941 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55
|
|
CVE-2023-35942 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-69vr-g55c-v2v4
|
|
CVE-2023-35943 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-mc6h-6j9x-v3gq
|
|
CVE-2023-35944 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-pvgm-7jpg-pw5g
|
|
CVE-2023-35945 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r
|
|
CVE-2023-35965 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787
|
|
CVE-2023-35966 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787
|
|
CVE-2023-35967 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788
|
|
CVE-2023-35968 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788
|
|
CVE-2023-35985 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1834
|
|
CVE-2023-3599 - https://github.com/movonow/demo/blob/main/click_fees.md
|
|
CVE-2023-3607 - https://github.com/mohdkey/cve/blob/main/kodbox.md
|
|
CVE-2023-36085 - http://packetstormsecurity.com/files/176991/SISQUAL-WFM-7.1.319.103-Host-Header-Injection.html
|
|
CVE-2023-36085 - https://github.com/omershaik0/Handmade_Exploits/tree/main/SISQUALWFM-Host-Header-Injection-CVE-2023-36085
|
|
CVE-2023-3609 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
|
CVE-2023-3609 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
|
CVE-2023-36093 - https://github.com/weng-xianhu/eyoucms/issues/44
|
|
CVE-2023-36095 - http://langchain.com
|
|
CVE-2023-36109 - https://github.com/Limesss/CVE-2023-36109/tree/main
|
|
CVE-2023-36118 - http://packetstormsecurity.com/files/172672/Faculty-Evaluation-System-1.0-Shell-Upload.html
|
|
CVE-2023-36118 - https://www.chtsecurity.com/news/4ffbe017-70e1-4789-bfe6-4d6fb0d1a0b7
|
|
CVE-2023-36119 - https://nvd.nist.gov/vuln/detail/CVE-2023-0527
|
|
CVE-2023-36121 - https://www.chtsecurity.com/news/0a4743a5-491e-4685-95ee-df8316ab5284
|
|
CVE-2023-36121 - https://www.exploit-db.com/exploits/51449
|
|
CVE-2023-36123 - https://github.com/9Bakabaka/CVE-2023-36123
|
|
CVE-2023-36143 - https://github.com/leonardobg/CVE-2023-36143
|
|
CVE-2023-36144 - https://github.com/leonardobg/CVE-2023-36144
|
|
CVE-2023-36146 - https://github.com/leonardobg/CVE-2023-36146/#readme
|
|
CVE-2023-36158 - https://cyberredteam.tech/posts/cve-2023-36158/
|
|
CVE-2023-36158 - https://github.com/unknown00759/CVE-2023-36158/blob/main/CVE-2023-36158.md
|
|
CVE-2023-36159 - https://cyberredteam.tech/posts/cve-2023-36159/
|
|
CVE-2023-36162 - https://github.com/779789571/zzcms/blob/main/README.md
|
|
CVE-2023-36163 - http://packetstormsecurity.com/files/173366/BuildaGate5-Cross-Site-Scripting.html
|
|
CVE-2023-3617 - https://github.com/movonow/demo/blob/main/kruxton.md
|
|
CVE-2023-36177 - https://oxnan.com/posts/Snapcast_jsonrpc_rce
|
|
CVE-2023-36183 - https://github.com/OpenImageIO/oiio/issues/3871
|
|
CVE-2023-36184 - https://medium.com/@Beosin_com/critical-vulnerability-in-move-vm-can-cause-total-network-shutdown-and-potential-hard-fork-in-sui-49d0d942801c
|
|
CVE-2023-3620 - https://huntr.dev/bounties/a0fd0671-f051-4d41-8928-9b19819084c9
|
|
CVE-2023-36210 - https://www.exploit-db.com/exploits/51499
|
|
CVE-2023-36211 - https://www.exploit-db.com/exploits/51502
|
|
CVE-2023-36212 - https://packetstormsecurity.com/files/172687/Total-CMS-1.7.4-Shell-Upload.html
|
|
CVE-2023-36212 - https://www.exploit-db.com/exploits/51500
|
|
CVE-2023-36213 - https://packetstormsecurity.com/files/172698/MotoCMS-3.4.3-SQL-Injection.html
|
|
CVE-2023-36213 - https://www.exploit-db.com/exploits/51504
|
|
CVE-2023-36217 - https://www.exploit-db.com/exploits/51520
|
|
CVE-2023-36220 - https://packetstormsecurity.com/files/172967/Textpattern-CMS-4.8.8-Command-Injection.html
|
|
CVE-2023-36239 - https://github.com/libming/libming/issues/273
|
|
CVE-2023-36243 - https://github.com/noirotm/flvmeta/issues/19
|
|
CVE-2023-3625 - https://github.com/MoeMion233/cve/blob/main/1.md
|
|
CVE-2023-36250 - https://github.com/BrunoTeixeira1996/CVE-2023-36250/blob/main/README.md
|
|
CVE-2023-36252 - https://www.zeroscience.mk/en/vulnerabilities/
|
|
CVE-2023-36255 - https://trovent.github.io/security-advisories/TRSA-2303-01/TRSA-2303-01.txt
|
|
CVE-2023-36255 - https://trovent.io/security-advisory-2303-01/
|
|
CVE-2023-36256 - https://www.exploit-db.com/exploits/51511
|
|
CVE-2023-36256 - https://www.hackersnotes.com/blog/pentest/online-examination-system-project-1-0-cross-site-request-forgery-csrf/
|
|
CVE-2023-3626 - https://github.com/MoeMion233/cve/blob/main/2.md
|
|
CVE-2023-36266 - http://packetstormsecurity.com/files/173809/Keeper-Security-Desktop-16.10.2-Browser-Extension-16.5.4-Password-Dumper.html
|
|
CVE-2023-3627 - https://huntr.dev/bounties/558b3dce-db03-47ba-b60b-c6eb578e04f1
|
|
CVE-2023-36271 - https://github.com/LibreDWG/libredwg/issues/681#BUG2
|
|
CVE-2023-36272 - https://github.com/LibreDWG/libredwg/issues/681#BUG1
|
|
CVE-2023-36273 - https://github.com/LibreDWG/libredwg/issues/677#BUG1
|
|
CVE-2023-36274 - https://github.com/LibreDWG/libredwg/issues/677#BUG2
|
|
CVE-2023-36306 - https://www.exploit-db.com/exploits/51643
|
|
CVE-2023-36308 - https://github.com/disintegration/imaging/issues/165
|
|
CVE-2023-36344 - https://packetstormsecurity.com/files/173990/Diebold-Nixdorf-Vynamic-View-Console-5.3.1-DLL-Hijacking.html
|
|
CVE-2023-36345 - https://youtu.be/KxjsEqNWU9E
|
|
CVE-2023-36345 - https://yuyudhn.github.io/pos-codekop-vulnerability/
|
|
CVE-2023-36346 - http://packetstormsecurity.com/files/173280/Sales-Of-Cashier-Goods-1.0-Cross-Site-Scripting.html
|
|
CVE-2023-36346 - https://www.youtube.com/watch?v=bbbA-q1syrA
|
|
CVE-2023-36346 - https://yuyudhn.github.io/pos-codekop-vulnerability/
|
|
CVE-2023-36347 - https://www.youtube.com/watch?v=7qaIeE2cyO4
|
|
CVE-2023-36347 - https://yuyudhn.github.io/pos-codekop-vulnerability/
|
|
CVE-2023-36348 - http://packetstormsecurity.com/files/173278/POS-Codekop-2.0-Shell-Upload.html
|
|
CVE-2023-36348 - https://www.youtube.com/watch?v=Ge0zqY0sGiQ
|
|
CVE-2023-36348 - https://yuyudhn.github.io/pos-codekop-vulnerability/
|
|
CVE-2023-3635 - https://research.jfrog.com/vulnerabilities/okio-gzip-source-unhandled-exception-dos-xray-523195/
|
|
CVE-2023-36354 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/7/TL-WR940N_TL-WR841N_TL-WR740N_TL-WR941ND_userRpm_AccessCtrlTimeSchedRpm.md
|
|
CVE-2023-36355 - http://packetstormsecurity.com/files/173294/TP-Link-TL-WR940N-4-Buffer-Overflow.html
|
|
CVE-2023-36357 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/5/TL-WR941ND_TL-WR940N_TL-WR841N_userRpm_LocalManageControlRpm.md
|
|
CVE-2023-36359 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/8/TP-Link%20TL-WR940N%20TL-WR841N%20TL-WR941ND%20wireless%20router%20userRpmQoSRuleListRpm%20buffer%20read%20out-of-bounds%20vulnerability.md
|
|
CVE-2023-36375 - https://packetstormsecurity.com
|
|
CVE-2023-36376 - https://packetstormsecurity.com
|
|
CVE-2023-3638 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-05
|
|
CVE-2023-36403 - http://packetstormsecurity.com/files/176209/Windows-Kernel-Race-Conditions.html
|
|
CVE-2023-36404 - http://packetstormsecurity.com/files/176110/Windows-Kernel-Information-Disclosure.html
|
|
CVE-2023-3643 - https://drive.google.com/file/d/1RXmDUAjqZvWSvHUrfRerz7My6M3KX7YG/view
|
|
CVE-2023-36463 - https://github.com/jucktnich/meldekarten-generator/security/advisories/GHSA-f2gp-85cr-vgj7
|
|
CVE-2023-36472 - https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4
|
|
CVE-2023-36542 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-36546 - https://securitycafe.ro/2023/06/19/dll-hijacking-finding-vulnerabilities-in-pestudio-9-52/
|
|
CVE-2023-36576 - http://packetstormsecurity.com/files/175659/Windows-Kernel-Containerized-Registry-Escape.html
|
|
CVE-2023-36618 - https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-Execution-Missing-Authentication.html
|
|
CVE-2023-36618 - https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-execution-missing-authentication-atos-unify-openscape/
|
|
CVE-2023-36619 - https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-Execution-Missing-Authentication.html
|
|
CVE-2023-36619 - https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-execution-missing-authentication-atos-unify-openscape/
|
|
CVE-2023-36620 - https://seclists.org/fulldisclosure/2023/Jul/12
|
|
CVE-2023-36621 - https://seclists.org/fulldisclosure/2023/Jul/12
|
|
CVE-2023-36622 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-012.txt
|
|
CVE-2023-36622 - https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013
|
|
CVE-2023-36623 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-013.txt
|
|
CVE-2023-36623 - https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013
|
|
CVE-2023-36624 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-004.txt
|
|
CVE-2023-36624 - https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013
|
|
CVE-2023-36629 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/hunting-for-android-privilege-escalation-with-a-32-line-fuzzer/
|
|
CVE-2023-36629 - https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2023-007_Xiaomi_Redmi_10sNote-1.txt
|
|
CVE-2023-36630 - https://github.com/yunaranyancat/poc-dump/blob/main/cloudpanel/README.md
|
|
CVE-2023-36631 - https://www.bencteux.fr/posts/malwarebytes_wfc/
|
|
CVE-2023-36632 - https://github.com/Daybreak2019/PoC_python3.9_Vul/blob/main/RecursionError-email.utils.parseaddr.py
|
|
CVE-2023-3665 - https://kcm.trellix.com/corporate/index?page=content&id=SB10405
|
|
CVE-2023-36656 - https://github.com/jaegertracing/jaeger-ui/security/advisories/GHSA-vv24-rm95-q56r
|
|
CVE-2023-36665 - https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665
|
|
CVE-2023-36669 - https://kratosdefense.com
|
|
CVE-2023-36670 - https://kratosdefense.com
|
|
CVE-2023-36672 - https://mullvad.net/de/blog/2023/8/9/response-to-tunnelcrack-vulnerability-disclosure/
|
|
CVE-2023-3672 - https://huntr.dev/bounties/75cfb7ad-a75f-45ff-8688-32a9c55179aa
|
|
CVE-2023-3673 - https://huntr.dev/bounties/46ca0934-5260-477b-9e86-7b16bb18d0a9
|
|
CVE-2023-36803 - http://packetstormsecurity.com/files/175109/Microsoft-Windows-Kernel-Out-Of-Bounds-Reads-Memory-Disclosure.html
|
|
CVE-2023-36806 - https://herolab.usd.de/security-advisories/usd-2023-0020/
|
|
CVE-2023-36809 - https://huntr.dev/bounties/c6eeb346-fa99-4d41-bc40-b68f8d689223/
|
|
CVE-2023-36812 - http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html
|
|
CVE-2023-36812 - https://github.com/OpenTSDB/opentsdb/commit/07c4641471c6f5c2ab5aab615969e97211eb50d9
|
|
CVE-2023-36813 - https://github.com/kanboard/kanboard/security/advisories/GHSA-9gvq-78jp-jxcx
|
|
CVE-2023-36815 - https://github.com/labring/sealos/security/advisories/GHSA-vpxf-q44g-w34w
|
|
CVE-2023-36816 - https://github.com/Bubka/2FAuth/security/advisories/GHSA-cwhq-2mcq-pp9q
|
|
CVE-2023-36820 - https://github.com/micronaut-projects/micronaut-security/security/advisories/GHSA-qw22-8w9r-864h
|
|
CVE-2023-36821 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-7grx-f945-mj96
|
|
CVE-2023-36822 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-vr8x-74pm-6vj7
|
|
CVE-2023-36828 - https://github.com/statamic/cms/security/advisories/GHSA-6r5g-cq4q-327g
|
|
CVE-2023-36844 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html
|
|
CVE-2023-36844 - http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html
|
|
CVE-2023-36845 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html
|
|
CVE-2023-36845 - http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html
|
|
CVE-2023-36845 - http://packetstormsecurity.com/files/176969/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html
|
|
CVE-2023-36846 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html
|
|
CVE-2023-36847 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html
|
|
CVE-2023-36864 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1797
|
|
CVE-2023-36864 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1797
|
|
CVE-2023-3687 - https://vuldb.com/?id.234233
|
|
CVE-2023-36874 - http://packetstormsecurity.com/files/174843/Microsoft-Error-Reporting-Local-Privilege-Elevation.html
|
|
CVE-2023-36884 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-36887 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1747
|
|
CVE-2023-36917 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-36918 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-36919 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-3692 - https://huntr.dev/bounties/be6616eb-384d-40d6-b1fd-0ec9e4973f12
|
|
CVE-2023-36921 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-36922 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-36924 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-36925 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
|
CVE-2023-36936 - https://packetstormsecurity.com
|
|
CVE-2023-36939 - https://packetstormsecurity.com
|
|
CVE-2023-36940 - https://packetstormsecurity.com
|
|
CVE-2023-36941 - https://packetstormsecurity.com
|
|
CVE-2023-36942 - https://packetstormsecurity.com
|
|
CVE-2023-36947 - https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/UploadCustomModule.md
|
|
CVE-2023-36950 - https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/loginauth.md
|
|
CVE-2023-36954 - https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/CP300%2B_3.md
|
|
CVE-2023-3696 - https://huntr.dev/bounties/1eef5a72-f6ab-4f61-b31d-fc66f5b4b467
|
|
CVE-2023-36968 - https://okankurtulus.com.tr/2023/06/21/food-ordering-system-v1-0-authenticated-sql-injection/
|
|
CVE-2023-36969 - https://okankurtulus.com.tr/2023/06/26/cms-made-simple-v2-2-17-file-upload-remote-code-execution-rce-authenticated/
|
|
CVE-2023-36970 - https://okankurtulus.com.tr/2023/06/27/cms-made-simple-v2-2-17-stored-cross-site-scripting-xss-authenticated/
|
|
CVE-2023-37049 - https://github.com/Num-Nine/CVE/issues/1
|
|
CVE-2023-37070 - https://github.com/InfoSecWarrior/Offensive-Payloads/blob/main/Cross-Site-Scripting-XSS-Payloads.txt
|
|
CVE-2023-3710 - https://www.honeywell.com/us/en/product-security
|
|
CVE-2023-3711 - https://www.honeywell.com/us/en/product-security
|
|
CVE-2023-3712 - https://www.honeywell.com/us/en/product-security
|
|
CVE-2023-37139 - https://github.com/chakra-core/ChakraCore/issues/6884
|
|
CVE-2023-37140 - https://github.com/chakra-core/ChakraCore/issues/6885
|
|
CVE-2023-37141 - https://github.com/chakra-core/ChakraCore/issues/6886
|
|
CVE-2023-37142 - https://github.com/chakra-core/ChakraCore/issues/6887
|
|
CVE-2023-37143 - https://github.com/chakra-core/ChakraCore/issues/6888
|
|
CVE-2023-37144 - https://github.com/DaDong-G/Vulnerability_info/blob/main/ac10_command_injection/Readme.md
|
|
CVE-2023-37145 - https://github.com/DaDong-G/Vulnerability_info/blob/main/TOTOLINK/lr350/1/Readme.md
|
|
CVE-2023-37146 - https://github.com/DaDong-G/Vulnerability_info/tree/main/TOTOLINK/lr350/2
|
|
CVE-2023-37148 - https://github.com/DaDong-G/Vulnerability_info/blob/main/TOTOLINK/lr350/3/README.md
|
|
CVE-2023-37149 - https://github.com/DaDong-G/Vulnerability_info/blob/main/TOTOLINK/lr350/4/README.md
|
|
CVE-2023-37150 - https://www.chtsecurity.com/news/57fd2fe6-11d9-421d-9087-88b4d5090452
|
|
CVE-2023-37151 - https://www.exploit-db.com/exploits/51431
|
|
CVE-2023-37152 - https://github.com/Trinity-SYT-SECURITY/arbitrary-file-upload-RCE/blob/main/Online%20Art%20gallery%20project%201.0.md
|
|
CVE-2023-37152 - https://www.chtsecurity.com/news/afe25fb4-55ac-45d9-9ece-cbc1edda2fb2%20
|
|
CVE-2023-37152 - https://www.exploit-db.com/exploits/51524
|
|
CVE-2023-37153 - https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue/blob/main/KodExplorer4.51.03.md
|
|
CVE-2023-37153 - https://www.chtsecurity.com/news/13a86b33-7e49-4167-9682-7ff3f51cbcba%20
|
|
CVE-2023-37164 - https://www.exploit-db.com/exploits/51529
|
|
CVE-2023-37165 - https://www.exploit-db.com/exploits/51450
|
|
CVE-2023-37170 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_1
|
|
CVE-2023-37171 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_2
|
|
CVE-2023-37172 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_3
|
|
CVE-2023-37173 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_4
|
|
CVE-2023-37174 - https://github.com/gpac/gpac/issues/2505
|
|
CVE-2023-37177 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html
|
|
CVE-2023-37192 - https://satoshihunter1.blogspot.com/2023/06/the-bitcoin-app-is-vulnerable-to-hackers.html
|
|
CVE-2023-37192 - https://www.youtube.com/watch?v=oEl4M1oZim0
|
|
CVE-2023-37201 - https://bugzilla.mozilla.org/show_bug.cgi?id=1826002
|
|
CVE-2023-37202 - https://bugzilla.mozilla.org/show_bug.cgi?id=1834711
|
|
CVE-2023-37205 - https://bugzilla.mozilla.org/show_bug.cgi?id=1704420
|
|
CVE-2023-37206 - https://bugzilla.mozilla.org/show_bug.cgi?id=1813299
|
|
CVE-2023-37207 - https://bugzilla.mozilla.org/show_bug.cgi?id=1816287
|
|
CVE-2023-37208 - https://bugzilla.mozilla.org/show_bug.cgi?id=1837675
|
|
CVE-2023-37210 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821886
|
|
CVE-2023-3725 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
|
CVE-2023-3725 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2g3m-p6c7-8rr3
|
|
CVE-2023-37261 - https://github.com/cc-tweaked/CC-Tweaked/security/advisories/GHSA-7p4w-mv69-2wm2
|
|
CVE-2023-37262 - https://github.com/cc-tweaked/CC-Tweaked/security/advisories/GHSA-7p4w-mv69-2wm2
|
|
CVE-2023-37263 - https://github.com/strapi/strapi/security/advisories/GHSA-m284-85mf-cgrc
|
|
CVE-2023-37264 - https://github.com/tektoncd/pipeline/security/advisories/GHSA-w2h3-vvvq-3m53
|
|
CVE-2023-37268 - https://github.com/warp-tech/warpgate/security/advisories/GHSA-868r-97g5-r9g4
|
|
CVE-2023-37269 - http://packetstormsecurity.com/files/173520/WinterCMS-1.2.2-Cross-Site-Scripting.html
|
|
CVE-2023-37270 - https://github.com/Piwigo/Piwigo/security/advisories/GHSA-934w-qj9p-3qcx
|
|
CVE-2023-37279 - https://github.com/contribsys/faktory/security/advisories/GHSA-x4hh-vjm7-g2jv
|
|
CVE-2023-37298 - https://github.com/laurent22/joplin/commit/caf66068bfc474bbfd505013076ed173cd90ca83
|
|
CVE-2023-37298 - https://github.com/laurent22/joplin/releases/tag/v2.11.5
|
|
CVE-2023-37299 - https://github.com/laurent22/joplin/commit/9e90d9016daf79b5414646a93fd369aedb035071
|
|
CVE-2023-37299 - https://github.com/laurent22/joplin/releases/tag/v2.11.5
|
|
CVE-2023-37302 - https://phabricator.wikimedia.org/T339111
|
|
CVE-2023-37304 - https://phabricator.wikimedia.org/T323651
|
|
CVE-2023-37305 - https://phabricator.wikimedia.org/T326952
|
|
CVE-2023-37306 - https://www.synacktiv.com/publications/php-filter-chains-file-read-from-error-based-oracle
|
|
CVE-2023-37307 - http://packetstormsecurity.com/files/176975/MISP-2.4.171-Cross-Site-Scripting.html
|
|
CVE-2023-3732 - http://packetstormsecurity.com/files/174223/Chrome-IPCZ-FragmentDescriptors-Missing-Validation.html
|
|
CVE-2023-37361 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=32305
|
|
CVE-2023-37456 - https://bugzilla.mozilla.org/show_bug.cgi?id=1795496
|
|
CVE-2023-37460 - https://github.com/codehaus-plexus/plexus-archiver/security/advisories/GHSA-wh3p-fphp-9h2m
|
|
CVE-2023-37461 - https://github.com/metersphere/metersphere/security/advisories/GHSA-xfr9-jgfp-fx3v
|
|
CVE-2023-37463 - https://github.com/github/cmark-gfm/security/advisories/GHSA-w4qg-3vf7-m9x5
|
|
CVE-2023-37466 - https://github.com/patriksimek/vm2/security/advisories/GHSA-cchq-frgv-rjh5
|
|
CVE-2023-37474 - http://packetstormsecurity.com/files/173822/Copyparty-1.8.2-Directory-Traversal.html
|
|
CVE-2023-37474 - https://github.com/9001/copyparty/security/advisories/GHSA-pxfv-7rr3-2qjg
|
|
CVE-2023-37475 - https://github.com/hamba/avro/security/advisories/GHSA-9x44-9pgq-cf45
|
|
CVE-2023-37477 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-p9xf-74xh-mhw5
|
|
CVE-2023-37478 - https://github.com/pnpm/pnpm/security/advisories/GHSA-5r98-f33j-g8h7
|
|
CVE-2023-3752 - https://vuldb.com/?id.234422
|
|
CVE-2023-37543 - https://medium.com/@hussainfathy99/exciting-news-my-first-cve-discovery-cve-2023-37543-idor-vulnerability-in-cacti-bbb6c386afed
|
|
CVE-2023-37569 - http://packetstormsecurity.com/files/174084/Emagic-Data-Center-Management-Suite-6.0-Remote-Command-Execution.html
|
|
CVE-2023-37581 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-37596 - https://github.com/sahiloj/CVE-2023-37596/blob/main/README.md
|
|
CVE-2023-37597 - https://github.com/sahiloj/CVE-2023-37597/blob/main/README.md
|
|
CVE-2023-37598 - https://github.com/sahiloj/CVE-2023-37598
|
|
CVE-2023-37600 - https://packetstormsecurity.com/files/173143/Office-Suite-Premium-10.9.1.42602-Cross-Site-Scripting.html
|
|
CVE-2023-37601 - https://packetstormsecurity.com/files/173146/Office-Suite-Premium-10.9.1.42602-Local-File-Inclusion.html
|
|
CVE-2023-37602 - https://www.exploit-db.com/exploits/51564
|
|
CVE-2023-37605 - https://medium.com/@david_42/complex-password-vs-buffer-overflow-and-the-winner-is-decbc56db5e3
|
|
CVE-2023-37607 - https://github.com/CQURE/CVEs/blob/main/CVE-2023-37607/README.md
|
|
CVE-2023-37608 - https://github.com/CQURE/CVEs/tree/main/CVE-2023-37608
|
|
CVE-2023-3761 - https://vuldb.com/?id.234446
|
|
CVE-2023-3761 - https://youtu.be/bMJwSCps0Lc
|
|
CVE-2023-37611 - https://rodelllemit.medium.com/stored-xss-in-neo-cms-8-3-3-9bd1cb973c5b
|
|
CVE-2023-37627 - https://gist.github.com/1337kid/d3e7702bd19cc9355a6b3f153eb2fe8e
|
|
CVE-2023-37628 - https://github.com/1337kid/Piggery_CMS_multiple_vulns_PoC/tree/main/CVE-2023-37628
|
|
CVE-2023-37629 - http://packetstormsecurity.com/files/173656/Online-Piggery-Management-System-1.0-Shell-Upload.html
|
|
CVE-2023-37629 - https://github.com/1337kid/Piggery_CMS_multiple_vulns_PoC/tree/main/CVE-2023-37629
|
|
CVE-2023-37630 - https://github.com/1337kid/Piggery_CMS_multiple_vulns_PoC/tree/main/CVE-2023-37630
|
|
CVE-2023-37644 - https://github.com/matthiaskramm/swftools/issues/202
|
|
CVE-2023-37649 - https://www.ghostccamm.com/blog/multi_cockpit_vulns/
|
|
CVE-2023-3765 - https://huntr.dev/bounties/4be5fd63-8a0a-490d-9ee1-f33dc768ed76
|
|
CVE-2023-37650 - https://www.ghostccamm.com/blog/multi_cockpit_vulns/
|
|
CVE-2023-37679 - http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html
|
|
CVE-2023-37679 - https://www.ihteam.net/advisory/mirth-connect
|
|
CVE-2023-37683 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37683.txt
|
|
CVE-2023-37684 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37684.txt
|
|
CVE-2023-37685 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37685.txt
|
|
CVE-2023-37686 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37686.txt
|
|
CVE-2023-37687 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37687.txt
|
|
CVE-2023-37688 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37688.txt
|
|
CVE-2023-37689 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37689.txt
|
|
CVE-2023-37690 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37690.txt
|
|
CVE-2023-37692 - https://okankurtulus.com.tr/2023/07/24/october-cms-v3-4-4-stored-cross-site-scripting-xss-authenticated/
|
|
CVE-2023-37710 - https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/fromSetWirelessRepeat
|
|
CVE-2023-37711 - https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/saveParentControlInfo
|
|
CVE-2023-37712 - https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/fromSetIpBind
|
|
CVE-2023-37714 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromRouteStatic/report.md
|
|
CVE-2023-37715 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fmL7ProtForm/reprot.md
|
|
CVE-2023-37716 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromNatStaticSetting/report.md
|
|
CVE-2023-37717 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromDhcpListClient/repot.md
|
|
CVE-2023-37718 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromSafeClientFilter/report.md
|
|
CVE-2023-37719 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromP2pListFilter/report.md
|
|
CVE-2023-3772 - http://www.openwall.com/lists/oss-security/2023/08/10/1
|
|
CVE-2023-3772 - https://bugzilla.redhat.com/show_bug.cgi?id=2218943
|
|
CVE-2023-37721 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromSafeMacFilter/report.md
|
|
CVE-2023-37722 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromSafeUrlFilter/report.md
|
|
CVE-2023-37723 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromqossetting/report.md
|
|
CVE-2023-37728 - http://icewarp.com
|
|
CVE-2023-3773 - https://bugzilla.redhat.com/show_bug.cgi?id=2218944
|
|
CVE-2023-37732 - https://github.com/yasm/yasm/issues/233
|
|
CVE-2023-37734 - https://medium.com/@jraiv02/cve-2023-37734-buffer-overflow-in-mp3-audio-converter-318fd8271911
|
|
CVE-2023-37734 - https://www.exploit-db.com/exploits/10374
|
|
CVE-2023-37748 - https://github.com/miniupnp/ngiflib/issues/25
|
|
CVE-2023-37758 - https://hackmd.io/@pSgS7xsnS5a4K7Y0yiB43g/rJr8oNn_n
|
|
CVE-2023-37759 - https://packetstormsecurity.com/files/174240/Crypto-Currency-Tracker-CCT-9.5-Add-Administrator.html
|
|
CVE-2023-3776 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
|
CVE-2023-3776 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
|
CVE-2023-37765 - https://github.com/gpac/gpac/issues/2515
|
|
CVE-2023-37766 - https://github.com/gpac/gpac/issues/2516
|
|
CVE-2023-37767 - https://github.com/gpac/gpac/issues/2514
|
|
CVE-2023-3777 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
|
CVE-2023-3777 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
|
CVE-2023-37770 - https://github.com/grame-cncm/faust/issues/922
|
|
CVE-2023-37785 - https://github.com/CrownZTX/cve-description
|
|
CVE-2023-37786 - https://github.com/CrownZTX/reflectedxss1
|
|
CVE-2023-37787 - https://github.com/CrownZTX/storedXSS
|
|
CVE-2023-37790 - https://packetstormsecurity.com/files/173508/Clarity-PPM-14.3.0.298-Cross-Site-Scripting.html
|
|
CVE-2023-37791 - https://github.com/naihsin/IoT/tree/main/D-Link/DIR-619L/overflow
|
|
CVE-2023-37793 - https://github.com/PwnYouLin/IOT_vul/blob/main/wayos/2/readme.md
|
|
CVE-2023-37794 - https://github.com/PwnYouLin/IOT_vul/tree/main/wayos/1
|
|
CVE-2023-37798 - https://www.cyderes.com/blog/cve-2023-37798-stored-cross-site-scripting-in-vanderbilt-redcap/
|
|
CVE-2023-3782 - https://research.jfrog.com/vulnerabilities/okhttp-client-brotli-dos/
|
|
CVE-2023-3783 - https://seclists.org/fulldisclosure/2023/Jul/38
|
|
CVE-2023-3783 - https://www.vulnerability-lab.com/get_content.php?id=2321
|
|
CVE-2023-37831 - https://github.com/strik3r0x1/Vulns/blob/main/User%20enumeration%20-%20Elenos.md
|
|
CVE-2023-37832 - https://github.com/strik3r0x1/Vulns/blob/main/Lack%20of%20resources%20and%20rate%20limiting%20-%20Elenos.md
|
|
CVE-2023-37833 - https://github.com/strik3r0x1/Vulns/blob/main/BAC%20leads%20to%20access%20Traps%20configurations.md
|
|
CVE-2023-37836 - https://github.com/thorfdbg/libjpeg/issues/87#BUG1
|
|
CVE-2023-37837 - https://github.com/thorfdbg/libjpeg/issues/87#BUG0
|
|
CVE-2023-3784 - https://seclists.org/fulldisclosure/2023/Jul/37
|
|
CVE-2023-3784 - https://www.vulnerability-lab.com/get_content.php?id=2317
|
|
CVE-2023-37849 - https://heegong.github.io/posts/Local-privilege-escalation-in-Panda-Dome-VPN-for-Windows-Installer/
|
|
CVE-2023-3785 - https://seclists.org/fulldisclosure/2023/Jul/39
|
|
CVE-2023-3785 - https://www.vulnerability-lab.com/get_content.php?id=2285
|
|
CVE-2023-3786 - https://seclists.org/fulldisclosure/2023/Jul/40
|
|
CVE-2023-3786 - https://www.vulnerability-lab.com/get_content.php?id=2323
|
|
CVE-2023-3787 - https://seclists.org/fulldisclosure/2023/Jul/35
|
|
CVE-2023-3787 - https://vuldb.com/?id.235054
|
|
CVE-2023-3787 - https://www.vulnerability-lab.com/get_content.php?id=2276
|
|
CVE-2023-3788 - https://seclists.org/fulldisclosure/2023/Jul/34
|
|
CVE-2023-3788 - https://www.vulnerability-lab.com/get_content.php?id=2278
|
|
CVE-2023-3789 - https://seclists.org/fulldisclosure/2023/Jul/36
|
|
CVE-2023-3789 - https://www.vulnerability-lab.com/get_content.php?id=2286
|
|
CVE-2023-37895 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-3790 - https://seclists.org/fulldisclosure/2023/Jul/33
|
|
CVE-2023-3790 - https://www.vulnerability-lab.com/get_content.php?id=2274
|
|
CVE-2023-37900 - https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf
|
|
CVE-2023-37903 - https://github.com/patriksimek/vm2/security/advisories/GHSA-g644-9gfx-q4q4
|
|
CVE-2023-37907 - https://github.com/cryptomator/cryptomator/security/advisories/GHSA-9c9p-c3mg-hpjq
|
|
CVE-2023-37910 - https://jira.xwiki.org/browse/XWIKI-20334
|
|
CVE-2023-37915 - https://github.com/OpenDDS/OpenDDS/security/advisories/GHSA-v5pp-7prc-5xq9
|
|
CVE-2023-37916 - https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-87f6-8gr7-pc6h
|
|
CVE-2023-37917 - https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r
|
|
CVE-2023-37918 - https://github.com/dapr/dapr/security/advisories/GHSA-59m6-82qm-vqgj
|
|
CVE-2023-37927 - https://bugprove.com/knowledge-hub/cve-2023-37927-and-cve-2023-37928-multiple-post-auth-blind-os-command-and-python-code-injection-vulnerabilities-in-zyxel-s-nas-326-devices/
|
|
CVE-2023-37928 - https://bugprove.com/knowledge-hub/cve-2023-37927-and-cve-2023-37928-multiple-post-auth-blind-os-command-and-python-code-injection-vulnerabilities-in-zyxel-s-nas-326-devices/
|
|
CVE-2023-37941 - http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html
|
|
CVE-2023-37979 - http://packetstormsecurity.com/files/173983/WordPress-Ninja-Forms-3.6.25-Cross-Site-Scripting.html
|
|
CVE-2023-37988 - http://packetstormsecurity.com/files/174896/WordPress-Contact-Form-Generator-2.5.5-Cross-Site-Scripting.html
|
|
CVE-2023-3801 - https://vuldb.com/?id.235069
|
|
CVE-2023-3802 - https://vuldb.com/?id.235070
|
|
CVE-2023-38022 - https://jovanbulck.github.io/files/ccs19-tale.pdf
|
|
CVE-2023-38035 - http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html
|
|
CVE-2023-38043 - https://northwave-cybersecurity.com/vulnerability-notice/arbitrary-kernel-function-call-in-ivanti-secure-access-client
|
|
CVE-2023-3811 - https://vuldb.com/?id.235079
|
|
CVE-2023-38127 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1808
|
|
CVE-2023-38127 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1808
|
|
CVE-2023-38128 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1809
|
|
CVE-2023-38128 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1809
|
|
CVE-2023-38139 - http://packetstormsecurity.com/files/174849/Microsoft-Windows-Kernel-Refcount-Overflow-Use-After-Free.html
|
|
CVE-2023-38140 - http://packetstormsecurity.com/files/175108/Microsoft-Windows-Kernel-Paged-Pool-Memory-Disclosure.html
|
|
CVE-2023-38141 - http://packetstormsecurity.com/files/175096/Microsoft-Windows-Kernel-Race-Condition-Memory-Corruption.html
|
|
CVE-2023-38146 - http://packetstormsecurity.com/files/176391/Themebleed-Windows-11-Themes-Arbitrary-Code-Execution.html
|
|
CVE-2023-38154 - http://packetstormsecurity.com/files/174568/Microsoft-Windows-Kernel-Recovery-Memory-Corruption.html
|
|
CVE-2023-3817 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-3819 - https://huntr.dev/bounties/be5e4d4c-1b0b-4c01-a1fc-00533135817c
|
|
CVE-2023-38190 - https://herolab.usd.de/security-advisories/usd-2023-0014/
|
|
CVE-2023-38191 - https://herolab.usd.de/security-advisories/usd-2023-0012/
|
|
CVE-2023-38192 - https://herolab.usd.de/security-advisories/usd-2023-0011/
|
|
CVE-2023-38193 - https://herolab.usd.de/en/security-advisories/usd-2023-0015/
|
|
CVE-2023-38194 - https://herolab.usd.de/security-advisories/usd-2023-0013/
|
|
CVE-2023-3820 - https://huntr.dev/bounties/b00a38b6-d040-494d-bf46-38f46ac1a1db
|
|
CVE-2023-38203 - https://helpx.adobe.com/security/products/coldfusion/apsb23-41.html
|
|
CVE-2023-3821 - https://huntr.dev/bounties/599ba4f6-c900-4161-9127-f1e6a6e29aaa
|
|
CVE-2023-3822 - https://huntr.dev/bounties/2a3a13fe-2a9a-4d1a-8814-fd8ed1e3b1d5
|
|
CVE-2023-3823 - https://github.com/php/php-src/security/advisories/GHSA-3qrf-m4j2-pcrr
|
|
CVE-2023-3824 - https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv
|
|
CVE-2023-38252 - https://github.com/tats/w3m/issues/270
|
|
CVE-2023-38253 - https://github.com/tats/w3m/issues/271
|
|
CVE-2023-38286 - https://github.com/p1n93r/SpringBootAdmin-thymeleaf-SSTI
|
|
CVE-2023-3830 - https://vuldb.com/?id.235151
|
|
CVE-2023-38328 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2023-38334 - http://packetstormsecurity.com/files/173696/Omnis-Studio-10.22.00-Library-Unlock.html
|
|
CVE-2023-38334 - http://seclists.org/fulldisclosure/2023/Jul/42
|
|
CVE-2023-38334 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-38334 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-006.txt
|
|
CVE-2023-38335 - http://packetstormsecurity.com/files/173695/Omnis-Studio-10.22.00-Library-Setting-Bypass.html
|
|
CVE-2023-38335 - http://seclists.org/fulldisclosure/2023/Jul/41
|
|
CVE-2023-38335 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-38335 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-005.txt
|
|
CVE-2023-38346 - https://www.pentagrid.ch/en/blog/wind-river-vxworks-tarextract-directory-traversal-vulnerability/
|
|
CVE-2023-38351 - https://0dr3f.github.io/cve/
|
|
CVE-2023-38352 - https://0dr3f.github.io/cve/
|
|
CVE-2023-38353 - https://0dr3f.github.io/cve/
|
|
CVE-2023-38354 - https://0dr3f.github.io/cve/
|
|
CVE-2023-38355 - https://0dr3f.github.io/cve/
|
|
CVE-2023-38356 - https://0dr3f.github.io/cve/
|
|
CVE-2023-38357 - http://packetstormsecurity.com/files/173609/RWS-WorldServer-11.7.3-Session-Token-Enumeration.html
|
|
CVE-2023-38357 - http://seclists.org/fulldisclosure/2023/Jul/30
|
|
CVE-2023-38357 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-001/-session-token-enumeration-in-rws-worldserver
|
|
CVE-2023-38378 - https://news.ycombinator.com/item?id=36745664
|
|
CVE-2023-38378 - https://tortel.li/post/insecure-scope/
|
|
CVE-2023-38379 - https://news.ycombinator.com/item?id=36745664
|
|
CVE-2023-38379 - https://tortel.li/post/insecure-scope/
|
|
CVE-2023-38403 - https://github.com/esnet/iperf/issues/1542
|
|
CVE-2023-38408 - http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html
|
|
CVE-2023-38408 - https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent
|
|
CVE-2023-38408 - https://news.ycombinator.com/item?id=36790196
|
|
CVE-2023-38409 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.12
|
|
CVE-2023-3843 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html
|
|
CVE-2023-3843 - https://vuldb.com/?id.235194
|
|
CVE-2023-38434 - https://github.com/cozis/xHTTP/issues/1
|
|
CVE-2023-38435 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-3844 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html
|
|
CVE-2023-3844 - https://vuldb.com/?id.235195
|
|
CVE-2023-3845 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html
|
|
CVE-2023-3846 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html
|
|
CVE-2023-3847 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html
|
|
CVE-2023-3848 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html
|
|
CVE-2023-38487 - https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-7494-7hcf-vxpg
|
|
CVE-2023-3849 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html
|
|
CVE-2023-38495 - https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf
|
|
CVE-2023-38501 - http://packetstormsecurity.com/files/173821/Copyparty-1.8.6-Cross-Site-Scripting.html
|
|
CVE-2023-38501 - https://github.com/9001/copyparty/security/advisories/GHSA-f54q-j679-p9hh
|
|
CVE-2023-38502 - https://github.com/taosdata/TDengine/security/advisories/GHSA-w23f-r2fm-27hf
|
|
CVE-2023-38507 - https://github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r
|
|
CVE-2023-3853 - https://vuldb.com/?id.235205
|
|
CVE-2023-38543 - https://northwave-cybersecurity.com/vulnerability-notice/denial-of-service-in-ivanti-secure-access-client-driver
|
|
CVE-2023-38573 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1839
|
|
CVE-2023-38617 - https://packetstormsecurity.com/files/173143/Office-Suite-Premium-10.9.1.42602-Cross-Site-Scripting.html
|
|
CVE-2023-38633 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-38633 - https://www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-38633/
|
|
CVE-2023-38646 - http://packetstormsecurity.com/files/174091/Metabase-Remote-Code-Execution.html
|
|
CVE-2023-38646 - http://packetstormsecurity.com/files/177138/Metabase-0.46.6-Remote-Code-Execution.html
|
|
CVE-2023-38666 - https://github.com/axiomatic-systems/Bento4/issues/784
|
|
CVE-2023-38669 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-001.md
|
|
CVE-2023-38670 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-002.md
|
|
CVE-2023-38671 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-003.md
|
|
CVE-2023-38672 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-004.md
|
|
CVE-2023-38673 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-005.md
|
|
CVE-2023-38674 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-006.md
|
|
CVE-2023-38675 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-007.md
|
|
CVE-2023-38676 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-008.md
|
|
CVE-2023-38677 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-009.md
|
|
CVE-2023-38678 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-010.md
|
|
CVE-2023-38687 - https://github.com/mskocik/svelecte/security/advisories/GHSA-7h45-grc5-89wq
|
|
CVE-2023-38688 - https://github.com/Xithrius/twitch-tui/security/advisories/GHSA-779w-xvpm-78jx
|
|
CVE-2023-38698 - https://github.com/ensdomains/ens-contracts/security/advisories/GHSA-rrxv-q8m4-wch3
|
|
CVE-2023-38701 - https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0120---2023-08-18
|
|
CVE-2023-38701 - https://github.com/input-output-hk/hydra/security/advisories/GHSA-6x9v-7x5r-w8w6
|
|
CVE-2023-38702 - https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-7mjh-73q3-c3fc
|
|
CVE-2023-3878 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2010.pdf
|
|
CVE-2023-38817 - https://ioctl.fail/echo-ac-writeup/
|
|
CVE-2023-3882 - https://vuldb.com/?id.235244
|
|
CVE-2023-38823 - https://github.com/nhtri2003gmail/CVE_report/blob/master/CVE-2023-38823.md
|
|
CVE-2023-38829 - https://github.com/adhikara13/CVE-2023-38829-NETIS-WF2409E
|
|
CVE-2023-3883 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2015.pdf
|
|
CVE-2023-38831 - http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html
|
|
CVE-2023-38831 - https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/
|
|
CVE-2023-38836 - http://packetstormsecurity.com/files/175026/BoidCMS-2.0.0-Shell-Upload.html
|
|
CVE-2023-3884 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2016.pdf
|
|
CVE-2023-38840 - https://github.com/bitwarden/clients/pull/5813
|
|
CVE-2023-38840 - https://github.com/markuta/bw-dump
|
|
CVE-2023-38840 - https://redmaple.tech/blogs/2023/extract-bitwarden-vault-passwords/
|
|
CVE-2023-38843 - https://gist.github.com/senzee1984/ff30f0914db39d2741ab17332f0fc6e1
|
|
CVE-2023-38844 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html
|
|
CVE-2023-38861 - https://github.com/TTY-flag/my_iot_vul/tree/main/WAVLINK/WL-WN575A3
|
|
CVE-2023-38862 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject1
|
|
CVE-2023-38863 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject4
|
|
CVE-2023-38864 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject3
|
|
CVE-2023-38865 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject5
|
|
CVE-2023-38866 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject2
|
|
CVE-2023-3887 - https://vuldb.com/?id.235249
|
|
CVE-2023-38886 - https://akerva.com/wp-content/uploads/2023/09/AKERVA_Security-Advisory_CVE-2023-38886_Dolibarr_RCE-1.pdf
|
|
CVE-2023-38888 - https://akerva.com/wp-content/uploads/2023/09/AKERVA_Security-Advisory_CVE-2023-38888_Dolibarr_XSS.pdf
|
|
CVE-2023-38890 - https://github.com/akshadjoshi/CVE-2023-38890
|
|
CVE-2023-38891 - https://github.com/jselliott/CVE-2023-38891
|
|
CVE-2023-38902 - https://gist.github.com/ZIKH26/18693c67ee7d2f8d2c60231b19194c37
|
|
CVE-2023-38904 - https://www.exploit-db.com/exploits/51576
|
|
CVE-2023-38905 - https://gist.github.com/wealeson1/e24fc8575f4e051320d69e9a75080642
|
|
CVE-2023-3891 - https://fluidattacks.com/advisories/aerosmith
|
|
CVE-2023-38910 - https://github.com/desencrypt/CVE/blob/main/CVE-2023-38910/Readme.md
|
|
CVE-2023-38911 - https://github.com/desencrypt/CVE/blob/main/CVE-2023-38911/Readme.md
|
|
CVE-2023-38912 - https://packetstormsecurity.com/files/173302/Super-Store-Finder-PHP-Script-3.6-SQL-Injection.html
|
|
CVE-2023-38921 - https://github.com/FirmRec/IoT-Vulns/tree/main/netgear/upgrade_handler
|
|
CVE-2023-38943 - https://github.com/0x727/ShuiZe_0x727
|
|
CVE-2023-38943 - https://github.com/0x727/ShuiZe_0x727/issues/160
|
|
CVE-2023-38947 - https://gitee.com/CTF-hacker/pwn/issues/I7LH2N
|
|
CVE-2023-38948 - https://gitee.com/CTF-hacker/pwn/issues/I7LI4E
|
|
CVE-2023-3896 - https://github.com/vim/vim/issues/12528
|
|
CVE-2023-38960 - https://rodelllemit.medium.com/insecure-permissions-vulnerability-in-raidenftpd-v2-4-build-4005-2016-04-01-ea7389be3d33
|
|
CVE-2023-38961 - https://github.com/jerryscript-project/jerryscript/issues/5092
|
|
CVE-2023-38965 - http://packetstormsecurity.com/files/175077/Lost-And-Found-Information-System-1.0-Insecure-Direct-Object-Reference.html
|
|
CVE-2023-38969 - https://panda002.hashnode.dev/badaso-version-297-has-an-xss-vulnerability-in-add-books
|
|
CVE-2023-3897 - http://packetstormsecurity.com/files/177179/SureMDM-On-Premise-CAPTCHA-Bypass-User-Enumeration.html
|
|
CVE-2023-38970 - https://panda002.hashnode.dev/badaso-version-297-has-an-xss-vulnerability-in-new-member
|
|
CVE-2023-38971 - https://panda002.hashnode.dev/badaso-version-297-has-xss-vulnerability-in-add-ranks
|
|
CVE-2023-38975 - https://github.com/qdrant/qdrant/issues/2268
|
|
CVE-2023-38996 - https://gist.github.com/RNPG/53b579da330ba896aa8dc2d901e5e400
|
|
CVE-2023-38997 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
|
CVE-2023-38998 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
|
CVE-2023-38999 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
|
CVE-2023-3900 - https://gitlab.com/gitlab-org/gitlab/-/issues/418770
|
|
CVE-2023-39000 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
|
CVE-2023-39001 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
|
CVE-2023-39002 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
|
CVE-2023-39003 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
|
CVE-2023-39004 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
|
CVE-2023-39005 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
|
CVE-2023-39006 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
|
CVE-2023-39007 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
|
CVE-2023-39008 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
|
CVE-2023-39010 - https://github.com/lessthanoptimal/BoofCV/issues/406
|
|
CVE-2023-39017 - https://github.com/quartz-scheduler/quartz/issues/943
|
|
CVE-2023-39026 - http://packetstormsecurity.com/files/174491/FileMage-Gateway-1.10.9-Local-File-Inclusion.html
|
|
CVE-2023-39026 - https://raindayzz.com/technicalblog/2023/08/20/FileMage-Vulnerability.html
|
|
CVE-2023-3904 - https://gitlab.com/gitlab-org/gitlab/-/issues/418226
|
|
CVE-2023-39063 - https://github.com/AndreGNogueira/CVE-2023-39063
|
|
CVE-2023-39070 - https://sourceforge.net/p/cppcheck/discussion/general/thread/fa43fb8ab1/
|
|
CVE-2023-39073 - https://gist.github.com/ph4nt0mbyt3/9456312e867c10de8f808250ec0b12d3
|
|
CVE-2023-39075 - https://blog.dhjeong.kr/posts/automotive/2023/12/how-to-fuzzing-realcars/
|
|
CVE-2023-39075 - https://blog.dhjeong.kr/posts/vuln/202307/renault-zoe/
|
|
CVE-2023-39075 - https://blog.jhyeon.dev/posts/vuln/202307/renault-zoe/
|
|
CVE-2023-39076 - https://blog.dhjeong.kr/posts/vuln/202307/gm-chevrolet/
|
|
CVE-2023-39076 - https://blog.jhyeon.dev/posts/vuln/202307/gm-chevrolet/
|
|
CVE-2023-39107 - https://www.ns-echo.com/posts/nomachine_afo.html
|
|
CVE-2023-39108 - https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_path_b.md
|
|
CVE-2023-39109 - https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_path_a.md
|
|
CVE-2023-39110 - https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_%20ajaxGetFileByPath.md
|
|
CVE-2023-39113 - https://github.com/miniupnp/ngiflib/issues/27
|
|
CVE-2023-39114 - https://github.com/miniupnp/ngiflib/issues/29
|
|
CVE-2023-39115 - http://packetstormsecurity.com/files/173950/Campcodes-Online-Matrimonial-Website-System-3.3-Cross-Site-Scripting.html
|
|
CVE-2023-39115 - https://github.com/Raj789-sec/CVE-2023-39115
|
|
CVE-2023-39115 - https://www.exploit-db.com/exploits/51656
|
|
CVE-2023-39121 - https://github.com/safe-b/CVE/issues/1
|
|
CVE-2023-39121 - https://github.com/safe-b/CVE/issues/1#issue-1817133689
|
|
CVE-2023-39122 - https://github.com/DojoSecurity/BMC-Control-M-Unauthenticated-SQL-Injection
|
|
CVE-2023-39125 - https://github.com/LMP88959/NTSC-CRT/issues/32
|
|
CVE-2023-39135 - https://blog.ostorlab.co/zip-packages-exploitation.html
|
|
CVE-2023-39136 - https://blog.ostorlab.co/zip-packages-exploitation.html
|
|
CVE-2023-39136 - https://github.com/ZipArchive/ZipArchive/issues/680
|
|
CVE-2023-39137 - https://blog.ostorlab.co/zip-packages-exploitation.html
|
|
CVE-2023-39137 - https://github.com/brendan-duncan/archive/issues/266
|
|
CVE-2023-39138 - https://blog.ostorlab.co/zip-packages-exploitation.html
|
|
CVE-2023-39139 - https://blog.ostorlab.co/zip-packages-exploitation.html
|
|
CVE-2023-3914 - https://gitlab.com/gitlab-org/gitlab/-/issues/418115
|
|
CVE-2023-39141 - https://gist.github.com/JafarAkhondali/528fe6c548b78f454911fb866b23f66e
|
|
CVE-2023-39143 - https://www.horizon3.ai/cve-2023-39143-papercut-path-traversal-file-upload-rce-vulnerability/
|
|
CVE-2023-39147 - http://packetstormsecurity.com/files/173878/Uvdesk-1.1.3-Shell-Upload.html
|
|
CVE-2023-39167 - https://seclists.org/fulldisclosure/2023/Nov/5
|
|
CVE-2023-39169 - https://seclists.org/fulldisclosure/2023/Nov/3
|
|
CVE-2023-3917 - https://gitlab.com/gitlab-org/gitlab/-/issues/417896
|
|
CVE-2023-39171 - https://seclists.org/fulldisclosure/2023/Nov/2
|
|
CVE-2023-39172 - https://seclists.org/fulldisclosure/2023/Nov/4
|
|
CVE-2023-3920 - https://gitlab.com/gitlab-org/gitlab/-/issues/417481
|
|
CVE-2023-39265 - http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html
|
|
CVE-2023-3932 - https://gitlab.com/gitlab-org/gitlab/-/issues/417594
|
|
CVE-2023-39325 - https://go.dev/issue/63417
|
|
CVE-2023-39341 - https://www.sourcenext.com/support/i/2023/230718_01
|
|
CVE-2023-39350 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rrrv-3w42-pffh
|
|
CVE-2023-39351 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q9x9-cqjc-rgwq
|
|
CVE-2023-39352 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-whwr-qcf2-2mvj
|
|
CVE-2023-39353 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hg53-9j9h-3c8f
|
|
CVE-2023-39354 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c3r2-pxxp-f8r6
|
|
CVE-2023-39355 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hvwj-vmg6-2f5h
|
|
CVE-2023-39356 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5v5-qhj5-mh6m
|
|
CVE-2023-39357 - https://github.com/Cacti/cacti/security/advisories/GHSA-6jhp-mgqg-fhqg
|
|
CVE-2023-39358 - https://github.com/Cacti/cacti/security/advisories/GHSA-gj95-7xr8-9p7g
|
|
CVE-2023-39359 - https://github.com/Cacti/cacti/security/advisories/GHSA-q4wh-3f9w-836h
|
|
CVE-2023-39360 - https://github.com/Cacti/cacti/security/advisories/GHSA-gx8c-xvjh-9qh4
|
|
CVE-2023-39361 - https://github.com/Cacti/cacti/security/advisories/GHSA-6r43-q2fw-5wrg
|
|
CVE-2023-39362 - http://packetstormsecurity.com/files/175029/Cacti-1.2.24-Command-Injection.html
|
|
CVE-2023-39362 - https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp
|
|
CVE-2023-39364 - https://github.com/Cacti/cacti/security/advisories/GHSA-4pjv-rmrp-r59x
|
|
CVE-2023-39365 - https://github.com/Cacti/cacti/security/advisories/GHSA-v5w7-hww7-2f22
|
|
CVE-2023-39366 - https://github.com/Cacti/cacti/security/advisories/GHSA-rwhh-xxm6-vcrv
|
|
CVE-2023-39420 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained/
|
|
CVE-2023-39421 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained
|
|
CVE-2023-39422 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained
|
|
CVE-2023-39423 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained
|
|
CVE-2023-39424 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained
|
|
CVE-2023-39443 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826
|
|
CVE-2023-39444 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826
|
|
CVE-2023-39453 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1830
|
|
CVE-2023-3946 - https://kcm.trellix.com/corporate/index?page=content&id=SB10402
|
|
CVE-2023-39508 - http://seclists.org/fulldisclosure/2023/Jul/43
|
|
CVE-2023-39510 - https://github.com/Cacti/cacti/security/advisories/GHSA-24w4-4hp2-3j8h
|
|
CVE-2023-39511 - https://github.com/Cacti/cacti/security/advisories/GHSA-5hpr-4hhc-8q42
|
|
CVE-2023-39512 - https://github.com/Cacti/cacti/security/advisories/GHSA-vqcc-5v63-g9q7
|
|
CVE-2023-39513 - https://github.com/Cacti/cacti/security/advisories/GHSA-9fj7-8f2j-2rw2
|
|
CVE-2023-39514 - https://github.com/Cacti/cacti/security/advisories/GHSA-6hrc-2cfc-8hm7
|
|
CVE-2023-39515 - https://github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h
|
|
CVE-2023-39516 - https://github.com/Cacti/cacti/security/advisories/GHSA-r8qq-88g3-hmgv
|
|
CVE-2023-39520 - https://github.com/cryptomator/cryptomator/security/advisories/GHSA-62gx-54j7-mjh3
|
|
CVE-2023-39523 - https://github.com/nexB/scancode.io/security/advisories/GHSA-2ggp-cmvm-f62f
|
|
CVE-2023-39534 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-fcr6-x23w-94wp
|
|
CVE-2023-39542 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1832
|
|
CVE-2023-39551 - https://www.chtsecurity.com/news/0dbe8e1d-0a6c-4604-9cf1-778ddc86a8c1
|
|
CVE-2023-39558 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-39558.md
|
|
CVE-2023-39559 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-39559.md
|
|
CVE-2023-39560 - https://github.com/Luci4n555/cve_ectouch
|
|
CVE-2023-39562 - https://github.com/ChanStormstout/Pocs/blob/master/gpac_POC/id%3A000000%2Csig%3A06%2Csrc%3A003771%2Ctime%3A328254%2Cexecs%3A120473%2Cop%3Ahavoc%2Crep%3A8
|
|
CVE-2023-39562 - https://github.com/gpac/gpac/issues/2537
|
|
CVE-2023-39578 - https://panda002.hashnode.dev/a-stored-cross-site-scripting-xss-vulnerability-in-the-create-the-function-of-zenario-cms-v94
|
|
CVE-2023-39584 - https://www.gem-love.com/2023/07/25/hexo%E5%8D%9A%E5%AE%A2%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E5%92%8C%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/#undefined
|
|
CVE-2023-39598 - https://medium.com/@muthumohanprasath.r/reflected-cross-site-scripting-on-icewarp-webclient-product-cve-2023-39598-9598b92da49c
|
|
CVE-2023-39599 - https://github.com/desencrypt/CVE/blob/main/CVE-2023-39599/Readme.md
|
|
CVE-2023-39600 - https://icewarp.com
|
|
CVE-2023-39610 - https://github.com/zn9988/publications/tree/main/1.TP-Link%20Tapo%20C100%20-%20HTTP%20Denial-Of-Service
|
|
CVE-2023-39611 - https://medium.com/@arielbreisacher/my-chart-fx-7-software-investigation-journey-leading-to-a-directory-traversal-vulnerability-067cdcd3f2e9
|
|
CVE-2023-39612 - https://febin0x4e4a.wordpress.com/2023/09/15/xss-in-filebrowser-leads-to-admin-account-takeover-in-filebrowser/
|
|
CVE-2023-39612 - https://github.com/filebrowser/filebrowser/issues/2570
|
|
CVE-2023-39615 - https://gitlab.gnome.org/GNOME/libxml2/-/issues/535
|
|
CVE-2023-39619 - https://gist.github.com/6en6ar/712a4c1eab0324f15e09232c77ea08f8
|
|
CVE-2023-39631 - https://github.com/langchain-ai/langchain/issues/8363
|
|
CVE-2023-39631 - https://github.com/pydata/numexpr/issues/442
|
|
CVE-2023-39639 - https://security.friendsofpresta.org/modules/2023/08/31/leoblog.html
|
|
CVE-2023-3964 - https://gitlab.com/gitlab-org/gitlab/-/issues/419857
|
|
CVE-2023-39641 - https://security.friendsofpresta.org/modules/2023/08/31/psaffiliate.html
|
|
CVE-2023-39642 - https://security.friendsofpresta.org/modules/2023/08/29/cartsguru.html
|
|
CVE-2023-39643 - https://security.friendsofpresta.org/modules/2023/08/29/xmlfeeds.html
|
|
CVE-2023-39654 - https://github.com/Leeyangee/leeya_bug/blob/main/%5BWarning%5DSQL%20Injection%20in%20abupy%20%3C=%20v0.4.0.md
|
|
CVE-2023-39659 - https://github.com/langchain-ai/langchain/issues/7700
|
|
CVE-2023-39660 - https://github.com/gventuri/pandas-ai/issues/399
|
|
CVE-2023-39661 - https://github.com/gventuri/pandas-ai/issues/410
|
|
CVE-2023-39662 - https://github.com/jerryjliu/llama_index/issues/7054
|
|
CVE-2023-39675 - https://blog.sorcery.ie/posts/simpleimportproduct_sqli/
|
|
CVE-2023-39676 - https://blog.sorcery.ie/posts/fieldpopupnewsletter_xss/
|
|
CVE-2023-39677 - https://blog.sorcery.ie/posts/myprestamodules_phpinfo/
|
|
CVE-2023-39681 - https://github.com/yanbochen97/CuppaCMS_RCE
|
|
CVE-2023-39683 - https://medium.com/@vificatem/cve-2023-39683-dom-xss-on-json-source-code-panel-in-zalify-easy-email-3fa08f3e0d49
|
|
CVE-2023-39685 - https://github.com/hjson/hjson-java/issues/27
|
|
CVE-2023-39695 - https://github.com/strik3r0x1/Vulns/blob/35fe4fb3d5945b5df2a87aab0cf9ec6137bcf976/Insufficient%20Session%20Expiration%20-%20Elenos.md
|
|
CVE-2023-39699 - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion
|
|
CVE-2023-3970 - https://vuldb.com/?id.235569
|
|
CVE-2023-39726 - https://dgl.cx/2023/09/ansi-terminal-security#mintty-osc50
|
|
CVE-2023-39741 - https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084
|
|
CVE-2023-39741 - https://github.com/ckolivas/lrzip/issues/246
|
|
CVE-2023-39741 - https://github.com/huanglei3/lrzip_poc/tree/main/lrzip_heap_overflow
|
|
CVE-2023-39742 - https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084
|
|
CVE-2023-39743 - https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084
|
|
CVE-2023-39743 - https://github.com/huanglei3/lrzip-next-poc/tree/main
|
|
CVE-2023-39743 - https://github.com/pete4abw/lrzip-next/issues/132
|
|
CVE-2023-39777 - https://gist.github.com/GiongfNef/8fe658dce4c7fcf3a7b4e6387e50141c
|
|
CVE-2023-39785 - https://github.com/Xunflash/IOT/tree/main/Tenda_AC8_V4/2
|
|
CVE-2023-39786 - https://github.com/Xunflash/IOT/tree/main/Tenda_AC8_V4/3
|
|
CVE-2023-3979 - https://gitlab.com/gitlab-org/gitlab/-/issues/419972
|
|
CVE-2023-3980 - https://huntr.dev/bounties/6eb3cb9a-5c78-451f-ae76-0b1e62fe5e54
|
|
CVE-2023-3981 - https://huntr.dev/bounties/f5018226-0063-415d-9675-d7e30934ff78
|
|
CVE-2023-39810 - https://www.pentagrid.ch/en/blog/busybox-cpio-directory-traversal-vulnerability/
|
|
CVE-2023-3982 - https://huntr.dev/bounties/e5e889ee-5947-4c2a-a72e-9c90e2e2a845
|
|
CVE-2023-39827 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/formAddMacfilterRule
|
|
CVE-2023-39828 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/formWifiBasicSet
|
|
CVE-2023-39829 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/fromSetWirelessRepeat
|
|
CVE-2023-3983 - https://www.tenable.com/security/research/tra-2023-24
|
|
CVE-2023-39834 - https://github.com/Pbootcms/Pbootcms/issues/8
|
|
CVE-2023-3986 - https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Men's%20Salon%20Management%20System/Stored%20XSS
|
|
CVE-2023-3987 - https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Men's%20Salon%20Management%20System/SQL%20Injection
|
|
CVE-2023-39908 - https://blog.inhq.net/posts/yubico-yubihsm-pkcs-vuln/
|
|
CVE-2023-39909 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2023-39910 - https://news.ycombinator.com/item?id=37054862
|
|
CVE-2023-39928 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831
|
|
CVE-2023-39945 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-2rq6-8j7x-frr9
|
|
CVE-2023-39946 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-j297-rg6j-m7hx
|
|
CVE-2023-39947 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-mf55-5747-c4pv
|
|
CVE-2023-39948 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-x9pj-vrgf-f68f
|
|
CVE-2023-39949 - https://github.com/eProsima/Fast-DDS/issues/3236
|
|
CVE-2023-39949 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-3jv9-j9x3-95cg
|
|
CVE-2023-39951 - https://github.com/open-telemetry/opentelemetry-java-instrumentation/security/advisories/GHSA-hghr-r469-gfq6
|
|
CVE-2023-39964 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5
|
|
CVE-2023-39965 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555
|
|
CVE-2023-39966 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-hf7j-xj3w-87g4
|
|
CVE-2023-39967 - https://github.com/wiremock/wiremock/security/advisories/GHSA-676j-xrv3-73vc
|
|
CVE-2023-39979 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities
|
|
CVE-2023-39980 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities
|
|
CVE-2023-39981 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities
|
|
CVE-2023-39982 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities
|
|
CVE-2023-39983 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities
|
|
CVE-2023-40013 - https://github.com/shubhamjain/svg-loader/security/advisories/GHSA-xc2r-jf2x-gjr8
|
|
CVE-2023-40021 - https://github.com/oppia/oppia/security/advisories/GHSA-49jp-pjc3-2532
|
|
CVE-2023-40024 - https://github.com/nexB/scancode.io/security/advisories/GHSA-6xcx-gx7r-rccj
|
|
CVE-2023-40031 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/
|
|
CVE-2023-40035 - https://github.com/craftcms/cms/security/advisories/GHSA-44wr-rmwq-3phw
|
|
CVE-2023-40036 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/
|
|
CVE-2023-4004 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
|
CVE-2023-4004 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
|
CVE-2023-40044 - http://packetstormsecurity.com/files/174917/Progress-Software-WS_FTP-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2023-40044 - https://attackerkb.com/topics/bn32f9sNax/cve-2023-40044
|
|
CVE-2023-40044 - https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044
|
|
CVE-2023-40044 - https://www.rapid7.com/blog/post/2023/09/29/etr-critical-vulnerabilities-in-ws_ftp-server/
|
|
CVE-2023-40044 - https://www.theregister.com/2023/10/02/ws_ftp_update/
|
|
CVE-2023-4005 - https://huntr.dev/bounties/f0aacce1-79bc-4765-95f1-7e824433b9e4
|
|
CVE-2023-4007 - https://huntr.dev/bounties/e891dcbc-2092-49d3-9518-23e37187a5ea
|
|
CVE-2023-40085 - https://android.googlesource.com/platform/packages/modules/NeuralNetworks/+/ed6ee1f7eca7b33160e36ac6d730a9ef395ca4f1
|
|
CVE-2023-40121 - https://android.googlesource.com/platform/frameworks/base/+/3287ac2d2565dc96bf6177967f8e3aed33954253
|
|
CVE-2023-40123 - https://android.googlesource.com/platform/frameworks/base/+/7212a4bec2d2f1a74fa54a12a04255d6a183baa9
|
|
CVE-2023-40133 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
|
|
CVE-2023-40134 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
|
|
CVE-2023-40135 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
|
|
CVE-2023-40136 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
|
|
CVE-2023-40137 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
|
|
CVE-2023-40138 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
|
|
CVE-2023-40139 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
|
|
CVE-2023-40163 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1836
|
|
CVE-2023-40164 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/
|
|
CVE-2023-40166 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/
|
|
CVE-2023-40178 - https://github.com/node-saml/node-saml/security/advisories/GHSA-vx8m-6fhw-pccw
|
|
CVE-2023-40181 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8
|
|
CVE-2023-40186 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v
|
|
CVE-2023-40187 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f
|
|
CVE-2023-40188 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9w28-wwj5-p4xq
|
|
CVE-2023-4019 - https://wpscan.com/vulnerability/0d323b07-c6e7-4aba-85bc-64659ad0c85d
|
|
CVE-2023-40194 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1833
|
|
CVE-2023-40238 - https://binarly.io/posts/finding_logofail_the_dangers_of_image_parsing_during_system_boot/index.html
|
|
CVE-2023-40274 - https://github.com/getzola/zola/issues/2257
|
|
CVE-2023-40283 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
|
CVE-2023-40283 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
|
CVE-2023-40291 - https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/
|
|
CVE-2023-40292 - https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/
|
|
CVE-2023-40293 - https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/
|
|
CVE-2023-40305 - https://savannah.gnu.org/bugs/index.php?64503
|
|
CVE-2023-4033 - https://huntr.dev/bounties/5312d6f8-67a5-4607-bd47-5e19966fa321
|
|
CVE-2023-40361 - https://github.com/vianic/CVE-2023-40361/blob/main/advisory/advisory.md
|
|
CVE-2023-40362 - https://github.com/ally-petitt/CVE-2023-40362
|
|
CVE-2023-4039 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf
|
|
CVE-2023-40459 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs
|
|
CVE-2023-40461 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs
|
|
CVE-2023-40462 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs
|
|
CVE-2023-40463 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs
|
|
CVE-2023-40464 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs
|
|
CVE-2023-40465 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs
|
|
CVE-2023-4047 - https://bugzilla.mozilla.org/show_bug.cgi?id=1839073
|
|
CVE-2023-4051 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821884
|
|
CVE-2023-40519 - https://medium.com/munchy-bytes/security-disclosure-of-vulnerabilities-cve-2023-40519-2fc319737dfa
|
|
CVE-2023-4052 - https://bugzilla.mozilla.org/show_bug.cgi?id=1824420
|
|
CVE-2023-4053 - https://bugzilla.mozilla.org/show_bug.cgi?id=1839079
|
|
CVE-2023-4054 - https://bugzilla.mozilla.org/show_bug.cgi?id=1840777
|
|
CVE-2023-40567 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2w9f-8wg4-8jfp
|
|
CVE-2023-40569 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp
|
|
CVE-2023-40574 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-422p-gj6x-93cw
|
|
CVE-2023-40575 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c6vw-92h9-5w9v
|
|
CVE-2023-40576 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x3x5-r7jm-5pq2
|
|
CVE-2023-40586 - https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h
|
|
CVE-2023-40589 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gc34-mw6m-g42x
|
|
CVE-2023-40590 - https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-wfm5-v35h-vwf4
|
|
CVE-2023-40610 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-f678-j579-4xf5
|
|
CVE-2023-40660 - http://www.openwall.com/lists/oss-security/2023/12/13/2
|
|
CVE-2023-40660 - https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651
|
|
CVE-2023-40661 - https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651
|
|
CVE-2023-40748 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40749 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40750 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40751 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40752 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40753 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40754 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40755 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40756 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40757 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40758 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40759 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40760 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40761 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40762 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40763 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40764 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40765 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40766 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40767 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
|
CVE-2023-40779 - https://medium.com/@muthumohanprasath.r/open-redirection-vulnerability-on-icewarp-webclient-product-cve-2023-40779-61176503710
|
|
CVE-2023-40781 - https://github.com/libming/libming/issues/288
|
|
CVE-2023-40791 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12
|
|
CVE-2023-40796 - https://github.com/lst-oss/Vulnerability/tree/main/Phicomm/k2
|
|
CVE-2023-40797 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/sub_4781A4
|
|
CVE-2023-40798 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/formSetIPv6status-formGetWanParameter
|
|
CVE-2023-40799 - https://github.com/lst-oss/Vulnerability/blob/main/Tenda/AC23/sub_450A4C
|
|
CVE-2023-40800 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/compare_parentcontrol_time
|
|
CVE-2023-40801 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/sub_451784
|
|
CVE-2023-40802 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/get_parentControl_list_Info
|
|
CVE-2023-40817 - https://www.esecforte.com/cve-2023-40817-html-injection-product-configuration/
|
|
CVE-2023-40829 - https://gist.github.com/wwwziziyu/85bdf8d56b415974c4827a5668f493e9
|
|
CVE-2023-40834 - https://packetstormsecurity.com/files/174525/OpenCart-CMS-4.0.2.2-Brute-Force.html
|
|
CVE-2023-40843 - https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/8/8.md
|
|
CVE-2023-40845 - https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/14/14.md
|
|
CVE-2023-40847 - https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/12/12.md
|
|
CVE-2023-40851 - https://www.exploit-db.com/exploits/51694
|
|
CVE-2023-40852 - https://www.exploit-db.com/exploits/51695
|
|
CVE-2023-40857 - https://github.com/VirusTotal/yara/issues/1945
|
|
CVE-2023-40868 - https://github.com/MinoTauro2020/CVE-2023-40868
|
|
CVE-2023-40869 - https://github.com/MinoTauro2020/CVE-2023-40869
|
|
CVE-2023-40889 - https://hackmd.io/@cspl/B1ZkFZv23
|
|
CVE-2023-40890 - https://hackmd.io/@cspl/H1PxPAUnn
|
|
CVE-2023-40942 - https://github.com/GleamingEyes/vul/blob/main/tenda_ac9/SetFirewallCfg.md
|
|
CVE-2023-40953 - https://gist.github.com/ChubbyZ/e1e5c1858c389334dcf581a19c741308
|
|
CVE-2023-40954 - https://github.com/luvsn/OdZoo/tree/main/exploits/web_progress
|
|
CVE-2023-40955 - https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/2
|
|
CVE-2023-40956 - https://github.com/luvsn/OdZoo/tree/main/exploits/website_job_search
|
|
CVE-2023-40957 - https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/3
|
|
CVE-2023-40958 - https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/1
|
|
CVE-2023-40968 - https://github.com/hzeller/timg/issues/115
|
|
CVE-2023-40969 - https://github.com/slims/slims9_bulian/issues/204
|
|
CVE-2023-40970 - https://github.com/slims/slims9_bulian/issues/205
|
|
CVE-2023-41000 - https://github.com/gpac/gpac/issues/2550
|
|
CVE-2023-41011 - https://github.com/te5tb99/For-submitting/wiki/Command-Execution-Vulnerability-in-China-Mobile-Intelligent-Home-Gateway-HG6543C4
|
|
CVE-2023-41012 - https://github.com/te5tb99/For-submitting/wiki/Command-Execution-Vulnerability-in-China-Mobile-Intelligent-Home-Gateway-HG6543C4-Identity-verification-has-design-flaws
|
|
CVE-2023-41013 - https://medium.com/@katikitala.sushmitha078/cve-2023-41013-789841dcad91
|
|
CVE-2023-4104 - https://github.com/mozilla-mobile/mozilla-vpn-client/pull/7110
|
|
CVE-2023-41040 - https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c
|
|
CVE-2023-41041 - https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-3fqm-frhg-7c85
|
|
CVE-2023-41045 - https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-g96c-x7rh-99r3
|
|
CVE-2023-41054 - https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-p4f9-h8x8-mpwf
|
|
CVE-2023-41055 - https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-xfj6-4vp9-8rgc
|
|
CVE-2023-4110 - http://packetstormsecurity.com/files/173926/PHPJabbers-Availability-Booking-Calendar-5.0-Cross-Site-Scripting.html
|
|
CVE-2023-41107 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-020.txt
|
|
CVE-2023-41107 - https://www.syss.de/pentest-blog/sicherheitsschwachstellen-im-tef-haendlerportal-syss-2023-020/-021
|
|
CVE-2023-41108 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-021.txt
|
|
CVE-2023-41108 - https://www.syss.de/pentest-blog/sicherheitsschwachstellen-im-tef-haendlerportal-syss-2023-020/-021
|
|
CVE-2023-41109 - http://packetstormsecurity.com/files/175945/SmartNode-SN200-3.21.2-23021-OS-Command-Injection.html
|
|
CVE-2023-41109 - http://seclists.org/fulldisclosure/2023/Nov/12
|
|
CVE-2023-41109 - https://www.syss.de/
|
|
CVE-2023-41109 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-019.txt
|
|
CVE-2023-4111 - http://packetstormsecurity.com/files/173927/PHPJabbers-Bus-Reservation-System-1.1-Cross-Site-Scripting.html
|
|
CVE-2023-4111 - http://packetstormsecurity.com/files/173945/PHPJabbers-Bus-Reservation-System-1.1-SQL-Injection.html
|
|
CVE-2023-4112 - http://packetstormsecurity.com/files/173930/PHPJabbers-Shuttle-Booking-Software-1.0-Cross-Site-Scripting.html
|
|
CVE-2023-4113 - http://packetstormsecurity.com/files/173931/PHPJabbers-Service-Booking-Script-1.0-Cross-Site-Scripting.html
|
|
CVE-2023-4114 - http://packetstormsecurity.com/files/173932/PHPJabbers-Night-Club-Booking-1.0-Cross-Site-Scripting.html
|
|
CVE-2023-4115 - http://packetstormsecurity.com/files/173936/PHPJabbers-Cleaning-Business-1.0-Cross-Site-Scripting.html
|
|
CVE-2023-4116 - http://packetstormsecurity.com/files/173937/PHPJabbers-Taxi-Booking-2.0-Cross-Site-Scripting.html
|
|
CVE-2023-41165 - https://advisories.stormshield.eu/2023-020/
|
|
CVE-2023-41166 - https://advisories.stormshield.eu/2023-027
|
|
CVE-2023-4117 - http://packetstormsecurity.com/files/173939/PHPJabbers-Rental-Property-Booking-2.0-Cross-Site-Scripting.html
|
|
CVE-2023-4117 - https://vuldb.com/?id.235964
|
|
CVE-2023-4119 - http://packetstormsecurity.com/files/173941/Academy-LMS-6.0-Cross-Site-Scripting.html
|
|
CVE-2023-4120 - https://github.com/RCEraser/cve/blob/main/rce.md
|
|
CVE-2023-4121 - https://github.com/torres14852/cve/blob/main/upload.md
|
|
CVE-2023-4124 - https://huntr.dev/bounties/2c684f99-d181-4106-8ee2-64a76ae6a348
|
|
CVE-2023-4125 - https://huntr.dev/bounties/85bfd18f-8d3b-4154-8b7b-1f8fcf704e28
|
|
CVE-2023-41257 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1838
|
|
CVE-2023-4126 - https://huntr.dev/bounties/7f50bf1c-bcb9-46ca-8cec-211493d280c5
|
|
CVE-2023-4127 - https://huntr.dev/bounties/cf7d19e3-1318-4c77-8366-d8d04a0b41ba
|
|
CVE-2023-41270 - https://www.slideshare.net/fuguet/smold-tv-old-smart
|
|
CVE-2023-41270 - https://www.youtube.com/watch?v=MdIT4mPTX3s
|
|
CVE-2023-4128 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
|
CVE-2023-41316 - https://github.com/tolgee/tolgee-platform/security/advisories/GHSA-gx3w-rwh5-w5cg
|
|
CVE-2023-41325 - https://github.com/OP-TEE/optee_os/security/advisories/GHSA-jrw7-63cq-7vhm
|
|
CVE-2023-41330 - https://github.com/KnpLabs/snappy/security/advisories/GHSA-92rv-4j2h-8mjj
|
|
CVE-2023-41330 - https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc
|
|
CVE-2023-41336 - https://symfony.com/bundles/ux-autocomplete/current/index.html#usage-in-a-form-with-ajax
|
|
CVE-2023-4136 - http://packetstormsecurity.com/files/174304/CrafterCMS-4.0.2-Cross-Site-Scripting.html
|
|
CVE-2023-41362 - https://blog.sorcery.ie/posts/mybb_acp_rce/
|
|
CVE-2023-41364 - https://herolab.usd.de/security-advisories/usd-2023-0002/
|
|
CVE-2023-4138 - https://huntr.dev/bounties/1b1fa915-d588-4bb1-9e82-6a6be79befed
|
|
CVE-2023-41387 - https://seredynski.com/articles/exploiting-ios-apps-to-extract-session-tokens-and-overwrite-user-data
|
|
CVE-2023-41425 - https://gist.github.com/prodigiousMind/fc69a79629c4ba9ee88a7ad526043413
|
|
CVE-2023-41436 - https://github.com/sromanhu/CSZ-CMS-Stored-XSS---Pages-Content/blob/main/README.md
|
|
CVE-2023-41442 - https://writeups.ayyappan.me/v/tor-iot-mqtt/
|
|
CVE-2023-41444 - https://blog.dru1d.ninja/windows-driver-exploit-development-irec-sys-a5eb45093945
|
|
CVE-2023-41444 - https://gist.github.com/dru1d-foofus/1af21179f253879f101c3a8d4f718bf0
|
|
CVE-2023-41445 - https://gist.github.com/RNPG/84cac1b949bab0e4c587a668385b052d
|
|
CVE-2023-41446 - https://gist.github.com/RNPG/4bb91170f8ee50b395427f26bc96a1f2
|
|
CVE-2023-41447 - https://gist.github.com/RNPG/56b9fe4dcc3a248d4288bde5ffb3a5b3
|
|
CVE-2023-41448 - https://gist.github.com/RNPG/458e17f24ebf7d8af3c5c4d7073347a0
|
|
CVE-2023-41449 - https://gist.github.com/RNPG/c1ae240f2acec138132aa64ce3faa2e0
|
|
CVE-2023-4145 - https://huntr.dev/bounties/ce852777-2994-40b4-bb4e-c4d10023eeb0
|
|
CVE-2023-41450 - https://gist.github.com/RNPG/e11af10e1bd3606de8b568033d932589
|
|
CVE-2023-41451 - https://gist.github.com/RNPG/062cfca2e293a0e7d24f5d55f8db3fde
|
|
CVE-2023-41452 - https://gist.github.com/RNPG/32be1c4bae6f9378d4f382ba0c92b367
|
|
CVE-2023-41453 - https://gist.github.com/RNPG/be2ca92cb1f943d4c340c75fbfc9b783
|
|
CVE-2023-41507 - https://github.com/redblueteam/CVE-2023-41507/
|
|
CVE-2023-41508 - https://github.com/redblueteam/CVE-2023-41508/
|
|
CVE-2023-4157 - https://huntr.dev/bounties/abc3521b-1238-4c4e-97f1-2957db670014
|
|
CVE-2023-41575 - https://github.com/soundarkutty/Stored-xss/blob/main/poc
|
|
CVE-2023-4158 - https://huntr.dev/bounties/e0e462ae-d7cb-4a84-b6fe-5f5de20e3d15
|
|
CVE-2023-41580 - https://github.com/ehtec/phpipam-exploit
|
|
CVE-2023-4159 - https://huntr.dev/bounties/e2e2365e-6a5f-4ca4-9ef1-297e3ed41f9c
|
|
CVE-2023-41593 - https://portswigger.net/web-security/cross-site-scripting
|
|
CVE-2023-41599 - http://www.so1lupus.ltd/2023/08/28/Directory-traversal-in-JFinalCMS/
|
|
CVE-2023-41601 - https://github.com/al3zx/csz_cms_1_3_0_xss_in_install_page/blob/main/README.md
|
|
CVE-2023-41613 - https://packetstormsecurity.com/files/175684/EzViz-Studio-2.2.0-DLL-Hijacking.html
|
|
CVE-2023-41615 - https://medium.com/@guravtushar231/sql-injection-in-login-field-a9073780f7e8
|
|
CVE-2023-41616 - https://medium.com/@guravtushar231/reflected-xss-in-admin-panel-7a459dcb9476
|
|
CVE-2023-41627 - https://jira.o-ran-sc.org/browse/RIC-1001
|
|
CVE-2023-41628 - https://jira.o-ran-sc.org/browse/RIC-1002
|
|
CVE-2023-41635 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41635%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md
|
|
CVE-2023-41635 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md
|
|
CVE-2023-41636 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41636%20%7C%20RealGimm%20-%20SQL%20Injection(1).md
|
|
CVE-2023-41636 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20SQL%20Injection(1).md
|
|
CVE-2023-41637 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41637%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md
|
|
CVE-2023-41637 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md
|
|
CVE-2023-41638 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41638%20%7C%20RealGimm%20-%20RCE%20via%20Unrestricted%20File%20Upload.md
|
|
CVE-2023-41638 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20RCE%20via%20Unrestricted%20File%20Upload.md
|
|
CVE-2023-41640 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41640%20%7C%20RealGimm%20-%20Information%20disclosure.md
|
|
CVE-2023-41640 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Information%20disclosure.md
|
|
CVE-2023-41642 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41642%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md
|
|
CVE-2023-41642 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md
|
|
CVE-2023-41646 - https://github.com/tristao-marinho/CVE-2023-41646/
|
|
CVE-2023-4168 - http://packetstormsecurity.com/files/174015/Adlisting-Classified-Ads-2.14.0-Information-Disclosure.html
|
|
CVE-2023-4169 - https://vuldb.com/?id.236185
|
|
CVE-2023-41703 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html
|
|
CVE-2023-41704 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html
|
|
CVE-2023-41705 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html
|
|
CVE-2023-41706 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html
|
|
CVE-2023-41707 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html
|
|
CVE-2023-41708 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html
|
|
CVE-2023-41710 - http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html
|
|
CVE-2023-41717 - https://github.com/federella/CVE-2023-41717
|
|
CVE-2023-4172 - https://vuldb.com/?id.236207
|
|
CVE-2023-4173 - http://packetstormsecurity.com/files/174016/mooSocial-3.1.8-Cross-Site-Scripting.html
|
|
CVE-2023-4174 - http://packetstormsecurity.com/files/174017/Social-Commerce-3.1.6-Cross-Site-Scripting.html
|
|
CVE-2023-4175 - https://vuldb.com/?id.236210
|
|
CVE-2023-4176 - https://vuldb.com/?id.236211
|
|
CVE-2023-4179 - https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/SQL%20Injection%20in%20doctors.php/vuln.md
|
|
CVE-2023-4180 - https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/SQL%20Injection%20in%20login.php/vuln.md
|
|
CVE-2023-4181 - https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/vertical%20privilege%20escalation/vuln.md
|
|
CVE-2023-4182 - https://vuldb.com/?id.236217
|
|
CVE-2023-4183 - https://vuldb.com/?id.236218
|
|
CVE-2023-4184 - https://vuldb.com/?id.236219
|
|
CVE-2023-4185 - https://vuldb.com/?id.236220
|
|
CVE-2023-4187 - https://huntr.dev/bounties/14941381-b669-4756-94fc-cce172472f8b
|
|
CVE-2023-41879 - https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp
|
|
CVE-2023-4188 - https://huntr.dev/bounties/fe9809b6-40ad-4e81-9197-a9aa42e8a7bf
|
|
CVE-2023-41885 - https://github.com/piccolo-orm/piccolo/security/advisories/GHSA-h7cm-mrvq-wcfr
|
|
CVE-2023-41886 - https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qqh2-wvmv-h72m
|
|
CVE-2023-41887 - https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-p3r5-x3hr-gpg5
|
|
CVE-2023-41889 - https://github.com/shirasagi/shirasagi/security/advisories/GHSA-xr45-c2jv-2v9r
|
|
CVE-2023-4189 - https://huntr.dev/bounties/b00e6986-64e7-464e-ba44-e42476bfcdc4
|
|
CVE-2023-41892 - http://packetstormsecurity.com/files/176303/Craft-CMS-4.4.14-Remote-Code-Execution.html
|
|
CVE-2023-4190 - https://huntr.dev/bounties/71bc75d2-320c-4332-ad11-9de535a06d92
|
|
CVE-2023-4191 - https://github.com/Yesec/Resort-Reservation-System/blob/main/local%20file%20inclusion/vuln.md
|
|
CVE-2023-4192 - https://github.com/Yesec/Resort-Reservation-System/blob/main/SQL%20Injection%20in%20manage_user.php/vuln.md
|
|
CVE-2023-4193 - https://github.com/Yesec/Resort-Reservation-System/blob/main/SQL%20Injection%20in%20view_fee.php/vuln.md
|
|
CVE-2023-4195 - https://huntr.dev/bounties/0bd5da2f-0e29-47ce-90f3-06518656bfd6
|
|
CVE-2023-4196 - https://huntr.dev/bounties/c275a2d4-721f-49f7-8787-b146af2056a0
|
|
CVE-2023-41966 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08
|
|
CVE-2023-41966 - https://www.sielco.org/en/contacts
|
|
CVE-2023-4197 - https://starlabs.sg/advisories/23/23-4197
|
|
CVE-2023-4198 - https://starlabs.sg/advisories/23/23-4198
|
|
CVE-2023-4199 - https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20catagory_data.php/vuln.md
|
|
CVE-2023-41998 - https://www.tenable.com/security/research/tra-2023-37
|
|
CVE-2023-41999 - https://www.tenable.com/security/research/tra-2023-37
|
|
CVE-2023-4200 - https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20product_data.php/vuln.md
|
|
CVE-2023-42000 - https://www.tenable.com/security/research/tra-2023-37
|
|
CVE-2023-4201 - https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20ex_catagory_data.php/vuln.md
|
|
CVE-2023-4202 - http://packetstormsecurity.com/files/174153/Advantech-EKI-1524-CE-EKI-1522-EKI-1521-Cross-Site-Scripting.html
|
|
CVE-2023-4202 - http://seclists.org/fulldisclosure/2023/Aug/13
|
|
CVE-2023-4202 - https://cyberdanube.com/en/en-st-polten-uas-multiple-vulnerabilities-in-advantech-eki-15xx-series/
|
|
CVE-2023-4203 - http://packetstormsecurity.com/files/174153/Advantech-EKI-1524-CE-EKI-1522-EKI-1521-Cross-Site-Scripting.html
|
|
CVE-2023-4203 - http://seclists.org/fulldisclosure/2023/Aug/13
|
|
CVE-2023-4203 - https://cyberdanube.com/en/en-st-polten-uas-multiple-vulnerabilities-in-advantech-eki-15xx-series/
|
|
CVE-2023-42134 - https://blog.stmcyber.com/pax-pos-cves-2023/
|
|
CVE-2023-42135 - https://blog.stmcyber.com/pax-pos-cves-2023/
|
|
CVE-2023-42136 - https://blog.stmcyber.com/pax-pos-cves-2023/
|
|
CVE-2023-42137 - https://blog.stmcyber.com/pax-pos-cves-2023/
|
|
CVE-2023-42143 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219
|
|
CVE-2023-42144 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219
|
|
CVE-2023-4219 - https://github.com/Yesec/-Doctor-s-Appointment-System/blob/main/SQL%20Injection%20in%20login.php/vuln.md
|
|
CVE-2023-4220 - https://starlabs.sg/advisories/23/23-4220
|
|
CVE-2023-4221 - https://starlabs.sg/advisories/23/23-4221
|
|
CVE-2023-4222 - https://starlabs.sg/advisories/23/23-4222
|
|
CVE-2023-42222 - http://packetstormsecurity.com/files/176957/WebCatalog-48.4-Arbitrary-Protocol-Execution-Code-Execution.html
|
|
CVE-2023-42222 - https://github.com/itssixtyn3in/CVE-2023-42222
|
|
CVE-2023-4223 - https://starlabs.sg/advisories/23/23-4223
|
|
CVE-2023-4224 - https://starlabs.sg/advisories/23/23-4224
|
|
CVE-2023-4225 - https://starlabs.sg/advisories/23/23-4225
|
|
CVE-2023-4226 - https://starlabs.sg/advisories/23/23-4226
|
|
CVE-2023-42270 - http://packetstormsecurity.com/files/176958/Grocy-4.0.2-Cross-Site-Request-Forgery.html
|
|
CVE-2023-42270 - http://xploit.sh/posts/cve-2023-xxxxx/
|
|
CVE-2023-42278 - https://github.com/dromara/hutool/issues/3289
|
|
CVE-2023-42282 - https://cosmosofcyberspace.github.io/npm_ip_cve/npm_ip_cve.html
|
|
CVE-2023-42283 - https://github.com/andreysanyuk/CVE-2023-42283
|
|
CVE-2023-42284 - https://github.com/andreysanyuk/CVE-2023-42284
|
|
CVE-2023-42295 - https://github.com/OpenImageIO/oiio/issues/3947
|
|
CVE-2023-42298 - https://github.com/gpac/gpac/issues/2567
|
|
CVE-2023-42299 - https://github.com/OpenImageIO/oiio/issues/3840
|
|
CVE-2023-42320 - https://github.com/aixiao0621/Tenda/blob/main/AC10/0.md
|
|
CVE-2023-42323 - https://github.com/mnbvcxz131421/douhaocms/blob/main/README.md
|
|
CVE-2023-42358 - https://jira.o-ran-sc.org/browse/RIC-1009
|
|
CVE-2023-42361 - https://gccybermonks.com/posts/pdfjira/
|
|
CVE-2023-42362 - https://github.com/Mr-n0b3dy/CVE-2023-42362
|
|
CVE-2023-42374 - https://beosin.com/resources/%22memory-bomb%22-vulnerability-causes-sui-node-to-crash?lang=en-US
|
|
CVE-2023-42405 - https://github.com/fit2cloud/rackshift/issues/79
|
|
CVE-2023-42406 - https://github.com/1dreamGN/CVE/blob/main/CVE-2023-42406.md
|
|
CVE-2023-42406 - https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000_sql_:sysmanage:editrole.php.md
|
|
CVE-2023-42448 - https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0130---2023-10-03
|
|
CVE-2023-42448 - https://github.com/input-output-hk/hydra/security/advisories/GHSA-mgcx-6p7h-5996
|
|
CVE-2023-42449 - https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0130---2023-10-03
|
|
CVE-2023-42449 - https://github.com/input-output-hk/hydra/security/advisories/GHSA-9m8q-7wxv-v65p
|
|
CVE-2023-42459 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-gq8g-fj58-22gm
|
|
CVE-2023-42468 - https://github.com/actuator/com.cutestudio.colordialer/blob/main/CWE-284.md
|
|
CVE-2023-42469 - https://github.com/actuator/com.full.dialer.top.secure.encrypted
|
|
CVE-2023-42469 - https://github.com/actuator/com.full.dialer.top.secure.encrypted/blob/main/dial.gif
|
|
CVE-2023-42469 - https://github.com/actuator/com.full.dialer.top.secure.encrypted/blob/main/poc.apk
|
|
CVE-2023-42469 - https://github.com/actuator/cve/blob/main/CVE-2023-42469
|
|
CVE-2023-42470 - https://github.com/actuator/cve/blob/main/CVE-2023-42470
|
|
CVE-2023-42470 - https://github.com/actuator/imou/blob/main/imou-life-6.8.0.md
|
|
CVE-2023-42470 - https://github.com/actuator/imou/blob/main/poc.apk
|
|
CVE-2023-42471 - https://github.com/actuator/cve/blob/main/CVE-2023-42471
|
|
CVE-2023-42471 - https://github.com/actuator/wave.ai.browser/blob/main/CWE-94.md
|
|
CVE-2023-42471 - https://github.com/actuator/wave.ai.browser/blob/main/poc.apk
|
|
CVE-2023-4250 - https://wpscan.com/vulnerability/9c271619-f478-45c3-91d9-be0f55ee06a2
|
|
CVE-2023-4255 - https://github.com/tats/w3m/issues/268
|
|
CVE-2023-4256 - https://github.com/appneta/tcpreplay/issues/813
|
|
CVE-2023-4257 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
|
CVE-2023-4257 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-853q-q69w-gf5j
|
|
CVE-2023-4259 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
|
CVE-2023-4259 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gghm-c696-f4j4
|
|
CVE-2023-4260 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
|
CVE-2023-4260 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gj27-862r-55wh
|
|
CVE-2023-4262 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
|
CVE-2023-4262 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-56p9-5p3v-hhrc
|
|
CVE-2023-4263 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
|
CVE-2023-4263 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rf6q-rhhp-pqhf
|
|
CVE-2023-4264 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
|
CVE-2023-4264 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rgx6-3w4j-gf5j
|
|
CVE-2023-4265 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
|
CVE-2023-4265 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-4vgv-5r6q-r6xh
|
|
CVE-2023-42752 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
|
CVE-2023-42753 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
|
CVE-2023-42753 - https://seclists.org/oss-sec/2023/q3/216
|
|
CVE-2023-42753 - https://www.openwall.com/lists/oss-security/2023/09/22/10
|
|
CVE-2023-42754 - https://seclists.org/oss-sec/2023/q4/14
|
|
CVE-2023-42755 - https://seclists.org/oss-sec/2023/q3/229
|
|
CVE-2023-42756 - https://seclists.org/oss-sec/2023/q3/242
|
|
CVE-2023-42769 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08
|
|
CVE-2023-42769 - https://www.sielco.org/en/contacts
|
|
CVE-2023-4278 - http://packetstormsecurity.com/files/175007/WordPress-Masterstudy-LMS-3.0.17-Account-Creation.html
|
|
CVE-2023-42787 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-q5pq-8666-j8fr
|
|
CVE-2023-42788 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-qpv8-g6qv-rf8p
|
|
CVE-2023-42793 - http://packetstormsecurity.com/files/174860/JetBrains-TeamCity-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2023-42793 - https://attackerkb.com/topics/1XEEEkGHzt/cve-2023-42793
|
|
CVE-2023-42793 - https://www.securityweek.com/recently-patched-teamcity-vulnerability-exploited-to-hack-servers/
|
|
CVE-2023-42799 - https://github.com/moonlight-stream/moonlight-common-c/security/advisories/GHSA-r8cf-45f4-vf8m
|
|
CVE-2023-42800 - https://github.com/moonlight-stream/moonlight-common-c/security/advisories/GHSA-4927-23jw-rq62
|
|
CVE-2023-42808 - https://securitylab.github.com/advisories/GHSL-2023-026_Common_Voice/
|
|
CVE-2023-42811 - https://github.com/RustCrypto/AEADs/security/advisories/GHSA-423w-p2w9-r7vq
|
|
CVE-2023-42812 - https://github.com/galaxyproject/galaxy/security/advisories/GHSA-vf5q-r8p9-35xh
|
|
CVE-2023-42821 - https://github.com/gomarkdown/markdown/security/advisories/GHSA-m9xq-6h2j-65r2
|
|
CVE-2023-42882 - http://packetstormsecurity.com/files/176536/macOS-AppleVADriver-Out-Of-Bounds-Write.html
|
|
CVE-2023-42926 - http://packetstormsecurity.com/files/176535/macOS-AppleGVA-Memory-Handling.html
|
|
CVE-2023-42940 - http://seclists.org/fulldisclosure/2023/Dec/20
|
|
CVE-2023-4295 - http://packetstormsecurity.com/files/176109/Arm-Mali-CSF-Overflow-Use-After-Free.html
|
|
CVE-2023-4296 - http://packetstormsecurity.com/files/174703/PTC-Codebeamer-Cross-Site-Scripting.html
|
|
CVE-2023-4296 - http://seclists.org/fulldisclosure/2023/Sep/10
|
|
CVE-2023-4304 - https://huntr.dev/bounties/59fe5037-b253-4b0f-be69-1d2e4af8b4a9
|
|
CVE-2023-4309 - https://www.youtube.com/watch?v=yeG1xZkHc64
|
|
CVE-2023-43116 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0003.md
|
|
CVE-2023-43131 - https://www.exploit-db.com/exploits/51641
|
|
CVE-2023-43144 - https://github.com/projectworldsofficial/Assets-management-system-in-php/issues/2
|
|
CVE-2023-43147 - https://github.com/MinoTauro2020/CVE-2023-43147/
|
|
CVE-2023-43148 - https://github.com/MinoTauro2020/CVE-2023-43148
|
|
CVE-2023-43149 - https://github.com/MinoTauro2020/CVE-2023-43149
|
|
CVE-2023-43154 - https://cxsecurity.com/issue/WLB-2023090075
|
|
CVE-2023-43154 - https://github.com/ally-petitt/macs-cms-auth-bypass
|
|
CVE-2023-43176 - https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&version=3.1
|
|
CVE-2023-43177 - https://convergetp.com/2023/11/16/crushftp-zero-day-cve-2023-43177-discovered/
|
|
CVE-2023-43183 - http://seclists.org/fulldisclosure/2024/Jan/43
|
|
CVE-2023-43183 - https://packetstormsecurity.com/files/176841/Reprise-License-Manager-15.1-Privilege-Escalation-File-Write.html
|
|
CVE-2023-43196 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug4.md
|
|
CVE-2023-43197 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug1.md
|
|
CVE-2023-43198 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug5.md
|
|
CVE-2023-43199 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug6.md
|
|
CVE-2023-43200 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug3.md
|
|
CVE-2023-43201 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug2.md
|
|
CVE-2023-43208 - http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html
|
|
CVE-2023-43208 - https://www.horizon3.ai/nextgen-mirth-connect-remote-code-execution-vulnerability-cve-2023-43208/
|
|
CVE-2023-4321 - https://huntr.dev/bounties/fce38751-bfd6-484c-b6e1-935e0aa8ffdc
|
|
CVE-2023-4322 - https://huntr.dev/bounties/06e2484c-d6f1-4497-af67-26549be9fffd
|
|
CVE-2023-43222 - https://blog.csdn.net/weixin_51394168/article/details/132817842
|
|
CVE-2023-43226 - https://github.com/zzq66/cve/
|
|
CVE-2023-43235 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/823G/SetWifiDownSettings/1.md
|
|
CVE-2023-43236 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/dir_setWanWifi/1.md
|
|
CVE-2023-43237 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/setMAC/1.md
|
|
CVE-2023-43238 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/form2Dhcpip_cgi/1.md
|
|
CVE-2023-43239 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/showMACfilterMAC/1.md
|
|
CVE-2023-43240 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/ipportFilter/1.md
|
|
CVE-2023-43241 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/823G/SetWLanRadioSecurity/1.md
|
|
CVE-2023-43242 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/form2IPQoSTcDel/1.md
|
|
CVE-2023-43250 - http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html
|
|
CVE-2023-43250 - http://seclists.org/fulldisclosure/2023/Oct/15
|
|
CVE-2023-43251 - http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html
|
|
CVE-2023-43251 - http://seclists.org/fulldisclosure/2023/Oct/15
|
|
CVE-2023-43252 - http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html
|
|
CVE-2023-43252 - http://seclists.org/fulldisclosure/2023/Oct/15
|
|
CVE-2023-43260 - https://gist.github.com/win3zz/c7eda501edcf5383df32fabe00938d13
|
|
CVE-2023-43261 - http://packetstormsecurity.com/files/176988/Milesight-UR5X-UR32L-UR32-UR35-UR41-Credential-Leakage.html
|
|
CVE-2023-43261 - https://github.com/win3zz/CVE-2023-43261
|
|
CVE-2023-43275 - https://github.com/thedarknessdied/dedecms/blob/main/v5.7_110-CSRF.md
|
|
CVE-2023-43278 - https://blog.csdn.net/sugaryzheng/article/details/133283101?spm=1001.2014.3001.5501
|
|
CVE-2023-43284 - https://github.com/MateusTesser/CVE-2023-43284
|
|
CVE-2023-43291 - https://gist.github.com/Dar1in9s/e3db6b04daacb68633a97581bbd5921b
|
|
CVE-2023-43309 - https://github.com/TishaManandhar/Webmin_xss_POC/blob/main/XSS
|
|
CVE-2023-43319 - https://medium.com/@muthumohanprasath.r/reflected-cross-site-scripting-on-icewarp-webclient-product-cve-2023-43319-c2ad758ac2bc
|
|
CVE-2023-43320 - http://packetstormsecurity.com/files/176967/Proxmox-VE-7.4-1-TOTP-Brute-Force.html
|
|
CVE-2023-43321 - https://github.com/Push3AX/vul/blob/main/DCN/DCFW_1800_SDC_CommandInjection.md
|
|
CVE-2023-43323 - https://github.com/ahrixia/CVE-2023-43323
|
|
CVE-2023-43325 - https://github.com/ahrixia/CVE-2023-43325
|
|
CVE-2023-43326 - https://github.com/ahrixia/CVE-2023-43326
|
|
CVE-2023-43336 - https://medium.com/@janirudransh/security-disclosure-of-vulnerability-cve-2023-23336-4429d416f826
|
|
CVE-2023-43338 - https://github.com/cesanta/mjs/issues/250
|
|
CVE-2023-43339 - https://github.com/sromanhu/CVE-2023-43339-CMSmadesimple-Reflected-XSS---Installation/blob/main/README.md
|
|
CVE-2023-43339 - https://github.com/sromanhu/Cmsmadesimple-CMS-Stored-XSS/blob/main/README.md
|
|
CVE-2023-43340 - https://github.com/sromanhu/-CVE-2023-43340-Evolution-Reflected-XSS---Installation-Admin-Options
|
|
CVE-2023-43340 - https://github.com/sromanhu/Evolution-Reflected-XSS---Installation-Admin-Options
|
|
CVE-2023-43341 - https://github.com/sromanhu/CVE-2023-43341-Evolution-Reflected-XSS---Installation-Connection-
|
|
CVE-2023-43341 - https://github.com/sromanhu/Evolution-Reflected-XSS---Installation-Connection-
|
|
CVE-2023-43342 - https://github.com/sromanhu/CVE-2023-43342-Quick-CMS-Stored-XSS---Languages-Frontend
|
|
CVE-2023-43342 - https://github.com/sromanhu/Quick-CMS-Stored-XSS---Languages-Frontend
|
|
CVE-2023-43343 - https://github.com/sromanhu/CVE-2023-43343-Quick-CMS-Stored-XSS---Pages-Files
|
|
CVE-2023-43343 - https://github.com/sromanhu/Quick-CMS-Stored-XSS---Pages-Files
|
|
CVE-2023-43344 - https://github.com/sromanhu/CVE-2023-43344-Quick-CMS-Stored-XSS---SEO-Meta-description
|
|
CVE-2023-43345 - https://github.com/sromanhu/CVE-2023-43345-Quick-CMS-Stored-XSS---Pages-Content
|
|
CVE-2023-43346 - https://github.com/sromanhu/CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend
|
|
CVE-2023-43346 - https://github.com/sromanhu/Quick-CMS-Stored-XSS---Languages-Backend
|
|
CVE-2023-43352 - https://github.com/sromanhu/CMSmadesimple-SSTI--Content
|
|
CVE-2023-43352 - https://github.com/sromanhu/CVE-2023-43352-CMSmadesimple-SSTI--Content
|
|
CVE-2023-43353 - https://github.com/sromanhu/CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra
|
|
CVE-2023-43354 - https://github.com/sromanhu/CVE-2023-43354-CMSmadesimple-Stored-XSS---MicroTIny-extension
|
|
CVE-2023-43355 - https://github.com/sromanhu/CMSmadesimple-Reflected-XSS---Add-user
|
|
CVE-2023-43355 - https://github.com/sromanhu/CVE-2023-43355-CMSmadesimple-Reflected-XSS---Add-user
|
|
CVE-2023-43356 - https://github.com/sromanhu/CVE-2023-43356-CMSmadesimple-Stored-XSS---Global-Settings
|
|
CVE-2023-43357 - https://github.com/sromanhu/CVE-2023-43357-CMSmadesimple-Stored-XSS---Shortcut
|
|
CVE-2023-43358 - https://github.com/sromanhu/CMSmadesimple-Stored-XSS---News
|
|
CVE-2023-43358 - https://github.com/sromanhu/CVE-2023-43358-CMSmadesimple-Stored-XSS---News
|
|
CVE-2023-43359 - https://github.com/sromanhu/CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager
|
|
CVE-2023-43360 - https://github.com/sromanhu/CMSmadesimple-Stored-XSS---File-Picker-extension
|
|
CVE-2023-43360 - https://github.com/sromanhu/CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension
|
|
CVE-2023-43361 - https://github.com/xiph/vorbis-tools/issues/41
|
|
CVE-2023-43364 - https://github.com/advisories/GHSA-66m2-493m-crh2
|
|
CVE-2023-43364 - https://github.com/nexis-nexis/Searchor-2.4.0-POC-Exploit-
|
|
CVE-2023-43364 - https://github.com/nikn0laty/Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection
|
|
CVE-2023-4347 - https://huntr.dev/bounties/1f78c6e1-2923-46c5-9376-4cc5a8f1152f
|
|
CVE-2023-43470 - https://github.com/ae6e361b/Online-Voting-System
|
|
CVE-2023-43477 - https://www.tenable.com/security/research/tra-2023-19
|
|
CVE-2023-43478 - https://www.tenable.com/security/research/tra-2023-19
|
|
CVE-2023-43481 - https://github.com/actuator/com.tcl.browser/blob/main/CWE-94.md
|
|
CVE-2023-4352 - http://packetstormsecurity.com/files/174669/Chrome-Read-Only-Property-Overwrite.html
|
|
CVE-2023-4354 - http://packetstormsecurity.com/files/174949/Chrome-SKIA-Integer-Overflow.html
|
|
CVE-2023-4355 - http://packetstormsecurity.com/files/174950/Chrome-Dangling-FixedArray-Pointers-Memory-Corruption.html
|
|
CVE-2023-43567 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43568 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43569 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43570 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43571 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43572 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43573 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43574 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43575 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43576 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43577 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43578 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43579 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43580 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43581 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-43608 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1845
|
|
CVE-2023-43628 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1860
|
|
CVE-2023-43641 - http://packetstormsecurity.com/files/176128/libcue-2.2.1-Out-Of-Bounds-Access.html
|
|
CVE-2023-43641 - https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/
|
|
CVE-2023-43641 - https://github.com/lipnitsk/libcue/security/advisories/GHSA-5982-x7hv-r9cj
|
|
CVE-2023-43642 - https://github.com/xerial/snappy-java/security/advisories/GHSA-55g7-9cwv-5qfv
|
|
CVE-2023-43646 - https://github.com/chaijs/get-func-name/security/advisories/GHSA-4q6p-r6v2-jvc5
|
|
CVE-2023-43654 - http://packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html
|
|
CVE-2023-43661 - https://github.com/cachethq/cachet/security/advisories/GHSA-hv79-p62r-wg3p
|
|
CVE-2023-43741 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0003.md
|
|
CVE-2023-43787 - https://jfrog.com/blog/xorg-libx11-vulns-cve-2023-43786-cve-2023-43787-part-two/
|
|
CVE-2023-43791 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-f475-x83m-rx5m
|
|
CVE-2023-43809 - https://github.com/charmbracelet/soft-serve/issues/389
|
|
CVE-2023-4381 - https://huntr.dev/bounties/666c2617-e3e9-4955-9c97-2f8ed5262cc3
|
|
CVE-2023-43810 - https://github.com/open-telemetry/opentelemetry-python-contrib/security/advisories/GHSA-5rv5-6h4r-h22v
|
|
CVE-2023-4382 - http://packetstormsecurity.com/files/174212/Hyip-Rio-2.1-Cross-Site-Scripting-File-Upload.html
|
|
CVE-2023-43828 - https://github.com/al3zx/xss_languages_subrion_4.2.1
|
|
CVE-2023-4383 - https://gist.github.com/dmknght/ac489cf3605ded09b3925521afee3003
|
|
CVE-2023-43830 - https://github.com/al3zx/xss_financial_subrion_4.2.1
|
|
CVE-2023-43835 - https://packetstormsecurity.com/files/174756/Super-Store-Finder-3.7-Remote-Command-Execution.html
|
|
CVE-2023-43860 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
|
CVE-2023-43861 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
|
CVE-2023-43862 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
|
CVE-2023-43863 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
|
CVE-2023-43864 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
|
CVE-2023-43865 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
|
CVE-2023-43866 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
|
CVE-2023-43867 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
|
CVE-2023-43868 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
|
CVE-2023-43869 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
|
CVE-2023-43871 - https://github.com/sromanhu/CVE-2023-43871-WBCE-Arbitrary-File-Upload--XSS---Media/blob/main/README.md
|
|
CVE-2023-43871 - https://github.com/sromanhu/WBCE-File-Upload--XSS---Media/blob/main/README.md
|
|
CVE-2023-43872 - https://github.com/sromanhu/CMSmadesimple-File-Upload--XSS---File-Manager
|
|
CVE-2023-43873 - https://github.com/sromanhu/e107-CMS-Stored-XSS---Manage/blob/main/README.md
|
|
CVE-2023-43874 - https://github.com/sromanhu/e107-CMS-Stored-XSS---MetaCustomTags/blob/main/README.md
|
|
CVE-2023-43875 - https://github.com/sromanhu/CVE-2023-43875-Subrion-CMS-Reflected-XSS---Installation/blob/main/README.md
|
|
CVE-2023-43875 - https://github.com/sromanhu/Subrion-CMS-Reflected-XSS---Installation/blob/main/README.md
|
|
CVE-2023-43876 - https://github.com/sromanhu/October-CMS-Reflected-XSS---Installation/blob/main/README.md
|
|
CVE-2023-43877 - https://github.com/sromanhu/CVE-2023-43878-RiteCMS-Stored-XSS---MainMenu/blob/main/README.md
|
|
CVE-2023-43877 - https://github.com/sromanhu/RiteCMS-Stored-XSS---Home
|
|
CVE-2023-43878 - https://github.com/sromanhu/RiteCMS-Stored-XSS---MainMenu/blob/main/README.md
|
|
CVE-2023-43879 - https://github.com/sromanhu/RiteCMS-Stored-XSS---GlobalContent/tree/main
|
|
CVE-2023-43884 - https://github.com/dpuenteramirez/XSS-ReferenceID-Subrion_4.2.1
|
|
CVE-2023-43887 - https://github.com/strukturag/libde265/issues/418
|
|
CVE-2023-43890 - https://github.com/adhikara13/CVE/blob/main/netis_N3/command%20injection%20bypass%20filter.md
|
|
CVE-2023-43891 - https://github.com/adhikara13/CVE/blob/main/netis_N3/command%20injection%20in%20changing%20password%20feature.md
|
|
CVE-2023-43892 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20hostname%20parameter%20in%20wan%20settings.md
|
|
CVE-2023-43893 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20wake%20on%20lan%20functionality%20in%20wakeup_mac%20parameter.md
|
|
CVE-2023-43906 - https://github.com/Playful-CR/CVE-paddle-/blob/main/CVE-2023-43906
|
|
CVE-2023-43907 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/optipng-global-buffer-overflow1/optipng-global-buffer-overflow1.md
|
|
CVE-2023-4395 - https://huntr.dev/bounties/60e38563-7ac8-4a13-ac04-2980cc48b0da
|
|
CVE-2023-43955 - https://github.com/actuator/com.phlox.tvwebbrowser
|
|
CVE-2023-43955 - https://github.com/actuator/com.phlox.tvwebbrowser/blob/main/CWE-94.md
|
|
CVE-2023-43955 - https://github.com/actuator/com.phlox.tvwebbrowser/blob/main/poc.apk
|
|
CVE-2023-43959 - https://hackmd.io/@tahaafarooq/auth_rce_voip
|
|
CVE-2023-43959 - https://www.exploit-db.com/exploits/50509
|
|
CVE-2023-43960 - https://hackmd.io/@tahaafarooq/dlink-dph-400se-cwe-200
|
|
CVE-2023-43960 - https://www.exploit-db.com/exploits/51709
|
|
CVE-2023-44008 - https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44008
|
|
CVE-2023-44013 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/0/0.md
|
|
CVE-2023-44014 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/1/0.md
|
|
CVE-2023-44015 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/8/0.md
|
|
CVE-2023-44016 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/7/0.md
|
|
CVE-2023-44017 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/6/0.md
|
|
CVE-2023-44018 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/10/0.md
|
|
CVE-2023-44019 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/5/0.md
|
|
CVE-2023-44020 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/9/0.md
|
|
CVE-2023-44021 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/2/0.md
|
|
CVE-2023-44022 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/3/0.md
|
|
CVE-2023-44023 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/4/0.md
|
|
CVE-2023-44031 - http://seclists.org/fulldisclosure/2024/Jan/43
|
|
CVE-2023-44031 - https://packetstormsecurity.com/files/176841/Reprise-License-Manager-15.1-Privilege-Escalation-File-Write.html
|
|
CVE-2023-44042 - https://github.com/Gi0rgi0R/xss_frontend_settings_blackcat_cms_1.4.1
|
|
CVE-2023-44043 - https://github.com/Gi0rgi0R/xss_installation_blackcat_cms_1.4.1
|
|
CVE-2023-44044 - https://github.com/TishaManandhar/Superstore-sql-poc/blob/main/SQL
|
|
CVE-2023-44047 - https://github.com/xcodeOn1/SQLI-TollTax/blob/main/README.md
|
|
CVE-2023-44047 - https://github.com/xcodeOn1/xcode0x-CVEs/blob/main/CVE/CVE-2023-44047.md
|
|
CVE-2023-44048 - https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App/tree/main
|
|
CVE-2023-44048 - https://github.com/xcodeOn1/xcode0x-CVEs/blob/main/CVE/CVE-2023-44048.md
|
|
CVE-2023-44061 - https://github.com/soundarkutty/File-upload-Restriction-bypass/blob/main/poc.md
|
|
CVE-2023-4407 - http://packetstormsecurity.com/files/174244/Credit-Lite-1.5.4-SQL-Injection.html
|
|
CVE-2023-4409 - https://vuldb.com/?id.237512
|
|
CVE-2023-44216 - https://arstechnica.com/security/2023/09/gpus-from-all-major-suppliers-are-vulnerable-to-new-pixel-stealing-attack/
|
|
CVE-2023-44216 - https://github.com/UT-Security/gpu-zip
|
|
CVE-2023-44216 - https://news.ycombinator.com/item?id=37663159
|
|
CVE-2023-44216 - https://www.bleepingcomputer.com/news/security/modern-gpus-vulnerable-to-new-gpuzip-side-channel-attack/
|
|
CVE-2023-44216 - https://www.hertzbleed.com/gpu.zip/
|
|
CVE-2023-44216 - https://www.hertzbleed.com/gpu.zip/GPU-zip.pdf
|
|
CVE-2023-4422 - https://huntr.dev/bounties/2e12b773-b6a2-48da-a4bb-55d5d1307d2e
|
|
CVE-2023-44249 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-x8rp-jfwc-gqqj
|
|
CVE-2023-44256 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-2hc5-p5mc-8vrh
|
|
CVE-2023-4427 - http://packetstormsecurity.com/files/174951/Chrome-ReduceJSLoadPropertyWithEnumeratedKey-Out-Of-Bounds-Access.html
|
|
CVE-2023-44275 - https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense
|
|
CVE-2023-44276 - https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense
|
|
CVE-2023-4432 - https://huntr.dev/bounties/69684663-6822-41ff-aa05-afbdb8f5268f
|
|
CVE-2023-4433 - https://huntr.dev/bounties/64f3253d-6852-4b9f-b870-85e896007b1a
|
|
CVE-2023-4434 - https://huntr.dev/bounties/19e68377-e071-4a8e-aa4c-cd84a426602e
|
|
CVE-2023-4435 - https://huntr.dev/bounties/1875ee85-4b92-4aa4-861e-094137a29276
|
|
CVE-2023-4437 - https://vuldb.com/?id.237558
|
|
CVE-2023-44372 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1842
|
|
CVE-2023-4439 - https://vuldb.com/?id.237560
|
|
CVE-2023-44393 - https://github.com/Piwigo/Piwigo/security/advisories/GHSA-qg85-957m-7vgg
|
|
CVE-2023-44398 - https://github.com/Exiv2/exiv2/commit/e884a0955359107f4031c74a07406df7e99929a5
|
|
CVE-2023-44400 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-g9v2-wqcj-j99g
|
|
CVE-2023-4441 - https://vuldb.com/?id.237562
|
|
CVE-2023-44466 - https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph
|
|
CVE-2023-44467 - https://github.com/langchain-ai/langchain/commit/4c97a10bd0d9385cfee234a63b5bd826a295e483
|
|
CVE-2023-44469 - https://security.lauritz-holtmann.de/post/sso-security-ssrf/
|
|
CVE-2023-4448 - https://vuldb.com/?id.237569
|
|
CVE-2023-44487 - https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/
|
|
CVE-2023-44487 - https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/
|
|
CVE-2023-44487 - https://github.com/Azure/AKS/issues/3947
|
|
CVE-2023-44487 - https://github.com/advisories/GHSA-qppj-fm5r-hxr3
|
|
CVE-2023-44487 - https://github.com/akka/akka-http/issues/4323
|
|
CVE-2023-44487 - https://github.com/alibaba/tengine/issues/1872
|
|
CVE-2023-44487 - https://github.com/apache/apisix/issues/10320
|
|
CVE-2023-44487 - https://github.com/apache/httpd-site/pull/10
|
|
CVE-2023-44487 - https://github.com/apache/trafficserver/pull/10564
|
|
CVE-2023-44487 - https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487
|
|
CVE-2023-44487 - https://github.com/caddyserver/caddy/issues/5877
|
|
CVE-2023-44487 - https://github.com/eclipse/jetty.project/issues/10679
|
|
CVE-2023-44487 - https://github.com/envoyproxy/envoy/pull/30055
|
|
CVE-2023-44487 - https://github.com/etcd-io/etcd/issues/16740
|
|
CVE-2023-44487 - https://github.com/facebook/proxygen/pull/466
|
|
CVE-2023-44487 - https://github.com/golang/go/issues/63417
|
|
CVE-2023-44487 - https://github.com/grpc/grpc-go/pull/6703
|
|
CVE-2023-44487 - https://github.com/h2o/h2o/pull/3291
|
|
CVE-2023-44487 - https://github.com/haproxy/haproxy/issues/2312
|
|
CVE-2023-44487 - https://github.com/kazu-yamamoto/http2/issues/93
|
|
CVE-2023-44487 - https://github.com/kubernetes/kubernetes/pull/121120
|
|
CVE-2023-44487 - https://github.com/line/armeria/pull/5232
|
|
CVE-2023-44487 - https://github.com/micrictor/http2-rst-stream
|
|
CVE-2023-44487 - https://github.com/microsoft/CBL-Mariner/pull/6381
|
|
CVE-2023-44487 - https://github.com/nghttp2/nghttp2/pull/1961
|
|
CVE-2023-44487 - https://github.com/ninenines/cowboy/issues/1615
|
|
CVE-2023-44487 - https://github.com/nodejs/node/pull/50121
|
|
CVE-2023-44487 - https://github.com/openresty/openresty/issues/930
|
|
CVE-2023-44487 - https://github.com/opensearch-project/data-prepper/issues/3474
|
|
CVE-2023-44487 - https://github.com/projectcontour/contour/pull/5826
|
|
CVE-2023-44487 - https://github.com/tempesta-tech/tempesta/issues/1986
|
|
CVE-2023-44487 - https://github.com/varnishcache/varnish-cache/issues/3996
|
|
CVE-2023-44487 - https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event
|
|
CVE-2023-4451 - https://huntr.dev/bounties/4e111c3e-6cf3-4b4c-b3c1-a540bf30f8fa
|
|
CVE-2023-4453 - https://huntr.dev/bounties/245a8785-0fc0-4561-b181-fa20f869d993
|
|
CVE-2023-4454 - https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299
|
|
CVE-2023-4455 - https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a
|
|
CVE-2023-4462 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
|
|
CVE-2023-4463 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
|
|
CVE-2023-4464 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
|
|
CVE-2023-4465 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
|
|
CVE-2023-4466 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
|
|
CVE-2023-4466 - https://vuldb.com/?id.249259
|
|
CVE-2023-4467 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
|
|
CVE-2023-4468 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
|
|
CVE-2023-44694 - https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_rce_%20mailrecvview.md
|
|
CVE-2023-44709 - https://github.com/sammycage/plutosvg/issues/7
|
|
CVE-2023-4473 - https://bugprove.com/knowledge-hub/cve-2023-4473-and-cve-2023-4474-authentication-bypass-and-multiple-blind-os-command-injection-vulnerabilities-in-zyxel-s-nas-326-devices/
|
|
CVE-2023-4474 - https://bugprove.com/knowledge-hub/cve-2023-4473-and-cve-2023-4474-authentication-bypass-and-multiple-blind-os-command-injection-vulnerabilities-in-zyxel-s-nas-326-devices/
|
|
CVE-2023-44758 - https://github.com/sromanhu/GDidees-CMS-Stored-XSS---Title/tree/main
|
|
CVE-2023-44760 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---TrackingCodes
|
|
CVE-2023-44761 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Forms
|
|
CVE-2023-44762 - https://github.com/sromanhu/ConcreteCMS-Reflected-XSS---Tags
|
|
CVE-2023-44763 - https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail
|
|
CVE-2023-44764 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Site_Installation
|
|
CVE-2023-44765 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Associations
|
|
CVE-2023-44766 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---SEO
|
|
CVE-2023-44767 - https://github.com/sromanhu/RiteCMS-File-Upload--XSS---Filemanager/blob/main/README.md
|
|
CVE-2023-44769 - https://github.com/sromanhu/CVE-2023-44769_ZenarioCMS--Reflected-XSS---Alias/tree/main
|
|
CVE-2023-44769 - https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Alias/tree/main
|
|
CVE-2023-44770 - https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Organizer-Alias/blob/main/README.md
|
|
CVE-2023-44771 - https://github.com/sromanhu/ZenarioCMS--Stored-XSS---Page-Layout
|
|
CVE-2023-44796 - https://github.com/Hebing123/CVE-2023-44796/issues/1
|
|
CVE-2023-44796 - https://github.com/Hebing123/cve/issues/4
|
|
CVE-2023-44807 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug2.md
|
|
CVE-2023-44808 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug3.md
|
|
CVE-2023-44809 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug1.md
|
|
CVE-2023-44811 - https://github.com/ahrixia/CVE-2023-44811
|
|
CVE-2023-44812 - https://github.com/ahrixia/CVE-2023-44812
|
|
CVE-2023-44813 - https://github.com/ahrixia/CVE-2023-44813
|
|
CVE-2023-44821 - https://github.com/kohler/gifsicle/issues/195
|
|
CVE-2023-44821 - https://github.com/kohler/gifsicle/issues/65
|
|
CVE-2023-44846 - https://blog.csdn.net/2301_79997870/article/details/133365547?spm=1001.2014.3001.5501
|
|
CVE-2023-44846 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502
|
|
CVE-2023-44847 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502
|
|
CVE-2023-44848 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502
|
|
CVE-2023-44860 - https://github.com/adhikara13/CVE/blob/main/netis_N3/Improper%20Authentication%20Mechanism%20Leading%20to%20Denial-of-Service%20(DoS).md
|
|
CVE-2023-44954 - https://github.com/Ciber-Mike/BigTree_CMS-Stored_XSS-Developer_Settings/blob/main/README.md
|
|
CVE-2023-44961 - https://github.com/ggb0n/CVE-2023-44961
|
|
CVE-2023-44962 - https://github.com/ggb0n/CVE-2023-44962
|
|
CVE-2023-4504 - https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h
|
|
CVE-2023-4504 - https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6
|
|
CVE-2023-4504 - https://takeonme.org/cves/CVE-2023-4504.html
|
|
CVE-2023-4505 - https://medium.com/%40cybertrinchera/cve-2023-4506-cve-2023-4505-ldap-passback-on-miniorange-plugins-ca7328c84313
|
|
CVE-2023-4506 - https://medium.com/%40cybertrinchera/cve-2023-4506-cve-2023-4505-ldap-passback-on-miniorange-plugins-ca7328c84313
|
|
CVE-2023-45075 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-45076 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-45077 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-45078 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-45079 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-4508 - https://github.com/gerbv/gerbv/commit/5517e22250e935dc7f86f64ad414aeae3dbcb36a
|
|
CVE-2023-4508 - https://github.com/gerbv/gerbv/commit/dfb5aac533a3f9e8ccd93ca217a753258cba4fe5
|
|
CVE-2023-4508 - https://github.com/gerbv/gerbv/issues/191
|
|
CVE-2023-4511 - https://gitlab.com/wireshark/wireshark/-/issues/19258
|
|
CVE-2023-4512 - https://gitlab.com/wireshark/wireshark/-/issues/19144
|
|
CVE-2023-4513 - https://gitlab.com/wireshark/wireshark/-/issues/19259
|
|
CVE-2023-45139 - https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5
|
|
CVE-2023-45142 - https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr
|
|
CVE-2023-45146 - https://securitylab.github.com/advisories/GHSL-2023-052_XXL-RPC/
|
|
CVE-2023-45152 - https://github.com/engelsystem/engelsystem/security/advisories/GHSA-jj9g-75wf-6ppf
|
|
CVE-2023-45160 - https://www.1e.com/vulnerability-disclosure-policy/
|
|
CVE-2023-4517 - https://huntr.dev/bounties/508d1d21-c45d-47ff-833f-50c671882e51
|
|
CVE-2023-45208 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-006/-d-link-dap-x1860-remote-command-injection
|
|
CVE-2023-45228 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08
|
|
CVE-2023-45228 - https://www.sielco.org/en/contacts
|
|
CVE-2023-45229 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
|
|
CVE-2023-4523 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01
|
|
CVE-2023-45230 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
|
|
CVE-2023-45231 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
|
|
CVE-2023-45232 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
|
|
CVE-2023-45233 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
|
|
CVE-2023-45234 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
|
|
CVE-2023-45235 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
|
|
CVE-2023-45252 - https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/
|
|
CVE-2023-45253 - https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/
|
|
CVE-2023-45277 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies
|
|
CVE-2023-45278 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies
|
|
CVE-2023-45279 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies
|
|
CVE-2023-45280 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies
|
|
CVE-2023-45281 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies
|
|
CVE-2023-45303 - https://herolab.usd.de/security-advisories/usd-2023-0010/
|
|
CVE-2023-45312 - https://medium.com/@_sadshade/almost-2000-telegram-proxy-servers-are-potentially-vulnerable-to-rce-since-2018-742a455be16b
|
|
CVE-2023-45317 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08
|
|
CVE-2023-45317 - https://www.sielco.org/en/contacts
|
|
CVE-2023-45318 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1843
|
|
CVE-2023-45318 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1843
|
|
CVE-2023-4532 - https://gitlab.com/gitlab-org/gitlab/-/issues/423357
|
|
CVE-2023-4534 - https://vuldb.com/?id.238026
|
|
CVE-2023-4535 - https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651
|
|
CVE-2023-45357 - https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617
|
|
CVE-2023-45358 - https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617
|
|
CVE-2023-45375 - https://security.friendsofpresta.org/modules/2023/10/12/pireospay.html
|
|
CVE-2023-45376 - https://security.friendsofpresta.org/modules/2023/10/19/hicarouselspack.html
|
|
CVE-2023-45386 - https://security.friendsofpresta.org/modules/2023/10/12/extratabspro.html
|
|
CVE-2023-45396 - https://github.com/strik3r0x1/Vulns/blob/main/(IDOR)%20leads%20to%20events%20profiles%20access%20-%20Elenos.md
|
|
CVE-2023-4542 - https://github.com/PumpkinBridge/cve/blob/main/rce.md
|
|
CVE-2023-4544 - https://vuldb.com/?id.238049
|
|
CVE-2023-45463 - https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20hostname%20parameter%20leads%20to%20DOS.md
|
|
CVE-2023-45464 - https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20servDomain%20parameter%20leads%20to%20DOS.md
|
|
CVE-2023-45465 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ddnsDomainName%20parameter%20in%20Dynamic%20DNS%20setting.md
|
|
CVE-2023-45466 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20pin_host%20parameter%20in%20wps%20setting.md
|
|
CVE-2023-45467 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ntpServIP%20parameter%20in%20Time%20Settings%20.md
|
|
CVE-2023-45468 - https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20pingWdogIp%20parameter%20leads%20to%20DOS.md
|
|
CVE-2023-4547 - http://packetstormsecurity.com/files/174343/SPA-Cart-eCommerce-CMS-1.9.0.3-Cross-Site-Scripting.html
|
|
CVE-2023-45471 - https://github.com/itsAptx/CVE-2023-45471
|
|
CVE-2023-45479 - https://github.com/l3m0nade/IOTvul/blob/master/sub_49E098.md
|
|
CVE-2023-4548 - http://packetstormsecurity.com/files/174344/SPA-Cart-eCommerce-CMS-1.9.0.3-SQL-Injection.html
|
|
CVE-2023-45480 - https://github.com/l3m0nade/IOTvul/blob/master/sub_47D878.md
|
|
CVE-2023-45481 - https://github.com/l3m0nade/IOTvul/blob/master/SetFirewallCfg.md
|
|
CVE-2023-45482 - https://github.com/l3m0nade/IOTvul/blob/master/get_parentControl_list_Info.md
|
|
CVE-2023-45483 - https://github.com/l3m0nade/IOTvul/blob/master/compare_parentcontrol_time.md
|
|
CVE-2023-45484 - https://github.com/l3m0nade/IOTvul/blob/master/fromSetWifiGusetBasic.md
|
|
CVE-2023-45498 - http://packetstormsecurity.com/files/175397/VinChin-VMWare-Backup-7.0-Hardcoded-Credential-Remote-Code-Execution.html
|
|
CVE-2023-45498 - http://packetstormsecurity.com/files/176289/Vinchin-Backup-And-Recovery-Command-Injection.html
|
|
CVE-2023-45498 - http://seclists.org/fulldisclosure/2023/Oct/31
|
|
CVE-2023-45498 - https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/
|
|
CVE-2023-45499 - http://packetstormsecurity.com/files/175397/VinChin-VMWare-Backup-7.0-Hardcoded-Credential-Remote-Code-Execution.html
|
|
CVE-2023-45499 - http://packetstormsecurity.com/files/176289/Vinchin-Backup-And-Recovery-Command-Injection.html
|
|
CVE-2023-45499 - http://seclists.org/fulldisclosure/2023/Oct/31
|
|
CVE-2023-45499 - https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/
|
|
CVE-2023-45510 - https://github.com/justdan96/tsMuxer/issues/778
|
|
CVE-2023-45511 - https://github.com/justdan96/tsMuxer/issues/780
|
|
CVE-2023-45540 - https://github.com/soundarkutty/HTML-Injection/blob/main/POC.md
|
|
CVE-2023-45542 - https://github.com/ahrixia/CVE-2023-45542
|
|
CVE-2023-45554 - https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md
|
|
CVE-2023-45555 - https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md
|
|
CVE-2023-4560 - https://huntr.dev/bounties/86f06e28-ed8d-4f96-b4ad-e47f2fe94ba6
|
|
CVE-2023-4561 - https://huntr.dev/bounties/d4302a0d-db62-4d76-93dd-e6e6473e057a
|
|
CVE-2023-45659 - https://github.com/engelsystem/engelsystem/security/advisories/GHSA-f6mm-3v2h-jm6x
|
|
CVE-2023-45670 - https://about.gitlab.com/blog/2021/09/07/why-are-developers-vulnerable-to-driveby-attacks/
|
|
CVE-2023-45670 - https://github.com/blakeblackshear/frigate/security/advisories/GHSA-xq49-hv88-jr6h
|
|
CVE-2023-45670 - https://securitylab.github.com/advisories/GHSL-2023-190_Frigate/
|
|
CVE-2023-45671 - https://securitylab.github.com/advisories/GHSL-2023-190_Frigate/
|
|
CVE-2023-45672 - https://github.com/blakeblackshear/frigate/security/advisories/GHSA-qp3h-4q62-p428
|
|
CVE-2023-45672 - https://securitylab.github.com/advisories/GHSL-2023-190_Frigate/
|
|
CVE-2023-4568 - https://www.tenable.com/security/research/tra-2023-31
|
|
CVE-2023-45685 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
|
|
CVE-2023-45686 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
|
|
CVE-2023-45687 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
|
|
CVE-2023-45688 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
|
|
CVE-2023-45689 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
|
|
CVE-2023-45690 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
|
|
CVE-2023-45779 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-wmcc-g67r-9962
|
|
CVE-2023-45779 - https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html
|
|
CVE-2023-45805 - https://github.com/pdm-project/pdm/security/advisories/GHSA-j44v-mmf2-xvm9
|
|
CVE-2023-45805 - https://peps.python.org/pep-0440/#post-release-spelling
|
|
CVE-2023-45811 - https://github.com/relative/synchrony/security/advisories/GHSA-jg82-xh3w-rhxx
|
|
CVE-2023-45813 - https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff
|
|
CVE-2023-4582 - https://bugzilla.mozilla.org/show_bug.cgi?id=1773874
|
|
CVE-2023-45820 - https://github.com/directus/directus/security/advisories/GHSA-hmgw-9jrg-hf2m
|
|
CVE-2023-45827 - https://github.com/clickbar/dot-diver/security/advisories/GHSA-9w5f-mw3p-pj47
|
|
CVE-2023-45838 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844
|
|
CVE-2023-45839 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844
|
|
CVE-2023-45840 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844
|
|
CVE-2023-45841 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844
|
|
CVE-2023-45842 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844
|
|
CVE-2023-45852 - https://github.com/Push3AX/vul/blob/main/viessmann/Vitogate300_RCE.md
|
|
CVE-2023-45862 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.5
|
|
CVE-2023-45863 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3
|
|
CVE-2023-45866 - https://github.com/skysafe/reblog/tree/main/cve-2023-45866
|
|
CVE-2023-45867 - https://rehmeinfosec.de/labor/cve-2023-45867
|
|
CVE-2023-45868 - https://rehmeinfosec.de/labor/cve-2023-45867
|
|
CVE-2023-45869 - https://rehmeinfosec.de/labor/cve-2023-45869
|
|
CVE-2023-45878 - https://herolab.usd.de/security-advisories/usd-2023-0025/
|
|
CVE-2023-45879 - https://herolab.usd.de/security-advisories/usd-2023-0019/
|
|
CVE-2023-45880 - https://herolab.usd.de/security-advisories/usd-2023-0022/
|
|
CVE-2023-45881 - https://herolab.usd.de/security-advisories/usd-2023-0024/
|
|
CVE-2023-45887 - http://packetstormsecurity.com/files/177135/DS-Wireless-Communication-Code-Execution.html
|
|
CVE-2023-45889 - https://blog.zerdle.net/classlink/
|
|
CVE-2023-45889 - https://blog.zerdle.net/classlink2/
|
|
CVE-2023-45892 - https://github.com/Oracle-Security/CVEs/blob/main/FloorsightSoftware/CVE-2023-45892.md
|
|
CVE-2023-45893 - https://github.com/Oracle-Security/CVEs/blob/main/FloorsightSoftware/CVE-2023-45893.md
|
|
CVE-2023-45897 - https://dfir.ru/2023/11/01/cve-2023-45897-a-vulnerability-in-the-linux-exfat-userspace-tools/
|
|
CVE-2023-45898 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.4
|
|
CVE-2023-4596 - https://www.exploit-db.com/exploits/51664
|
|
CVE-2023-4597 - http://packetstormsecurity.com/files/174604/WordPress-Slimstat-Analytics-5.0.9-Cross-Site-Scripting-SQL-Injection.html
|
|
CVE-2023-45990 - https://github.com/PwnCYN/Wenwenai/issues/2
|
|
CVE-2023-45992 - https://github.com/harry935/CVE-2023-45992
|
|
CVE-2023-46001 - https://github.com/gpac/gpac/issues/2629
|
|
CVE-2023-46004 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/Arbitrary-File-Upload-Vulnerability.md
|
|
CVE-2023-46005 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability.md
|
|
CVE-2023-46006 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability-2.md
|
|
CVE-2023-46007 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability-3.md
|
|
CVE-2023-46009 - https://github.com/kohler/gifsicle/issues/196
|
|
CVE-2023-46010 - https://blog.csdn.net/DGS666/article/details/133795200?spm=1001.2014.3001.5501
|
|
CVE-2023-46014 - https://github.com/ersinerenler/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
|
|
CVE-2023-46015 - https://github.com/ersinerenler/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability
|
|
CVE-2023-46016 - https://github.com/ersinerenler/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability
|
|
CVE-2023-46017 - https://github.com/ersinerenler/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
|
|
CVE-2023-46018 - https://github.com/ersinerenler/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
|
|
CVE-2023-46019 - https://github.com/ersinerenler/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability
|
|
CVE-2023-46020 - https://github.com/ersinerenler/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability
|
|
CVE-2023-46021 - https://github.com/ersinerenler/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
|
|
CVE-2023-46022 - https://github.com/ersinerenler/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability
|
|
CVE-2023-46023 - https://github.com/ersinerenler/Code-Projects-Simple-Task-List-1.0/blob/main/CVE-2023-46023-Code-Projects-Simple-Task-List-1.0-SQL-Injection-Vulnerability.md
|
|
CVE-2023-46024 - https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46024-phpgurukul-Teacher-Subject-Allocation-Management-System-1.0-SQL-Injection-Vulnerability.md
|
|
CVE-2023-46025 - https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46025-phpgurukul-Teacher-Subject-Allocation-Management-System-1.0-SQL-Injection-Vulnerability.md
|
|
CVE-2023-46026 - https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46026-PHPGurukul-Teacher-Subject-Allocation-Management-System-1.0-Stored-Cross-Site-Scripting-Vulnerability.md
|
|
CVE-2023-46055 - https://gist.github.com/GroundCTL2MajorTom/eef0d55f5df77cc911d84392acdbf625
|
|
CVE-2023-46058 - https://github.com/CrownZTX/vulnerabilities/blob/main/geeklog/Stored_XSS_in_group.php.md
|
|
CVE-2023-46059 - https://github.com/CrownZTX/vulnerabilities/blob/main/geeklog/reflected_XSS_in_editservice.md
|
|
CVE-2023-46116 - https://github.com/tutao/tutanota/security/advisories/GHSA-mxgj-pq62-f644
|
|
CVE-2023-46118 - https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-w6cq-9cf4-gqpg
|
|
CVE-2023-46120 - https://github.com/rabbitmq/rabbitmq-java-client/issues/1062
|
|
CVE-2023-46120 - https://github.com/rabbitmq/rabbitmq-java-client/security/advisories/GHSA-mm8h-8587-p46h
|
|
CVE-2023-46132 - https://github.com/hyperledger/fabric/security/advisories/GHSA-v9w2-543f-h69m
|
|
CVE-2023-46139 - https://github.com/tiann/KernelSU/security/advisories/GHSA-86cp-3prf-pwqq
|
|
CVE-2023-4620 - https://wpscan.com/vulnerability/084e9494-2f9e-4420-9bf7-78a1a41433d7
|
|
CVE-2023-4622 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
|
CVE-2023-4623 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
|
CVE-2023-4624 - https://huntr.dev/bounties/9ce5cef6-e546-44e7-addf-a2726fa4e60c
|
|
CVE-2023-46245 - https://github.com/kimai/kimai/security/advisories/GHSA-fjhg-96cp-6fcw
|
|
CVE-2023-46246 - https://github.com/vim/vim/security/advisories/GHSA-q22m-h7m2-9mgm
|
|
CVE-2023-46256 - https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-5hvv-q2r5-rppw
|
|
CVE-2023-46277 - https://github.com/rustsec/advisory-db/pull/1798
|
|
CVE-2023-46316 - http://packetstormsecurity.com/files/176660/Traceroute-2.1.2-Privilege-Escalation.html
|
|
CVE-2023-46324 - https://www.gsma.com/security/wp-content/uploads/2023/10/0073-invalid_curve.pdf
|
|
CVE-2023-46331 - https://github.com/WebAssembly/wabt/issues/2310
|
|
CVE-2023-46332 - https://github.com/WebAssembly/wabt/issues/2311
|
|
CVE-2023-4634 - https://packetstormsecurity.com/files/174508/wpmla309-lfiexec.tgz
|
|
CVE-2023-4634 - https://patrowl.io/blog-wordpress-media-library-rce-cve-2023-4634/
|
|
CVE-2023-46344 - https://github.com/vinnie1717/CVE-2023-46344/blob/main/Solar-Log%20XSS
|
|
CVE-2023-46346 - https://security.friendsofpresta.org/modules/2023/10/24/exportproducts.html
|
|
CVE-2023-46347 - https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html
|
|
CVE-2023-46356 - https://security.friendsofpresta.org/modules/2023/10/26/csvfeeds-89.html
|
|
CVE-2023-46358 - https://security.friendsofpresta.org/modules/2023/10/24/referralbyphone.html
|
|
CVE-2023-46361 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/jbig2dec-SEGV/jbig2dec-SEGV.md
|
|
CVE-2023-46362 - https://github.com/agl/jbig2enc/issues/84
|
|
CVE-2023-46363 - https://github.com/agl/jbig2enc/issues/85
|
|
CVE-2023-46380 - http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html
|
|
CVE-2023-46381 - http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html
|
|
CVE-2023-46382 - http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html
|
|
CVE-2023-46383 - https://packetstormsecurity.com/files/175951/Loytec-LINX-Configurator-7.4.10-Insecure-Transit-Cleartext-Secrets.html
|
|
CVE-2023-46384 - https://packetstormsecurity.com/files/175951/Loytec-LINX-Configurator-7.4.10-Insecure-Transit-Cleartext-Secrets.html
|
|
CVE-2023-46385 - https://packetstormsecurity.com/files/175951/Loytec-LINX-Configurator-7.4.10-Insecure-Transit-Cleartext-Secrets.html
|
|
CVE-2023-46386 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html
|
|
CVE-2023-46387 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html
|
|
CVE-2023-46388 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html
|
|
CVE-2023-46389 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html
|
|
CVE-2023-46402 - https://gist.github.com/6en6ar/7c2424c93e7fbf2b6fc44e7fb9acb95d
|
|
CVE-2023-46404 - https://github.com/windecks/CVE-2023-46404
|
|
CVE-2023-46445 - http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
|
|
CVE-2023-46445 - https://github.com/advisories/GHSA-cfc2-wr2v-gxm5
|
|
CVE-2023-46445 - https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
|
|
CVE-2023-46445 - https://github.com/ronf/asyncssh/security/advisories/GHSA-cfc2-wr2v-gxm5
|
|
CVE-2023-46446 - http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
|
|
CVE-2023-46446 - https://github.com/advisories/GHSA-c35q-ffpf-5qpm
|
|
CVE-2023-46446 - https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
|
|
CVE-2023-46446 - https://github.com/ronf/asyncssh/security/advisories/GHSA-c35q-ffpf-5qpm
|
|
CVE-2023-46448 - https://blog.0xzon.dev/2023-10-15-Mejiro-Reflected-XSS-Via-Remote-File-Inclusion-CVE-2023-46448/
|
|
CVE-2023-46449 - https://github.com/sajaljat/CVE-2023-46449/tree/main
|
|
CVE-2023-46449 - https://www.youtube.com/watch?v=H5QnsOKjs3s
|
|
CVE-2023-46450 - https://github.com/yte121/-CVE-2023-46450/
|
|
CVE-2023-46450 - https://youtu.be/LQy0_xIK2q0
|
|
CVE-2023-46451 - https://github.com/sajaljat/CVE-2023-46451
|
|
CVE-2023-46451 - https://youtu.be/f8B3_m5YfqI
|
|
CVE-2023-46468 - https://www.sumor.top/index.php/archives/875/
|
|
CVE-2023-46475 - https://github.com/elementalSec/CVE-Disclosures/blob/main/ZentaoPMS/CVE-2023-46475/CVE-2023-46475%20-%20Cross-Site%20Scripting%20(Stored).md
|
|
CVE-2023-46478 - https://github.com/mr-xmen786/CVE-2023-46478/tree/main
|
|
CVE-2023-46480 - https://github.com/shahzaibak96/CVE-2023-46480
|
|
CVE-2023-46484 - https://815yang.github.io/2023/10/29/x6000r/setLedCfg/TOTOlink%20X6000R%20setLedCfg%20e/
|
|
CVE-2023-46485 - https://815yang.github.io/2023/10/29/x6000r/TOTOlink%20X6000R%20V9.1.0cu.2350_B20230313-rsetTracerouteCfg/
|
|
CVE-2023-4649 - https://huntr.dev/bounties/069bb1f3-0805-480d-a6e1-b3345cdc60f3
|
|
CVE-2023-46490 - https://gist.github.com/ISHGARD-2/a95632111138fcd7ccf7432ccb145b53
|
|
CVE-2023-4650 - https://huntr.dev/bounties/d92e8985-9d9d-4a62-92e8-ada014ee3b17
|
|
CVE-2023-4651 - https://huntr.dev/bounties/beba9b98-2a5c-4629-987d-b67f47ba9437
|
|
CVE-2023-4652 - https://huntr.dev/bounties/7869e4af-fad9-48c3-9e4f-c949e54cbb41
|
|
CVE-2023-4653 - https://huntr.dev/bounties/e0bf7e95-fc8c-4fd4-8575-8b46b9431c6d
|
|
CVE-2023-4654 - https://huntr.dev/bounties/56432a75-af43-4b1a-9307-bd8de568351b
|
|
CVE-2023-4655 - https://huntr.dev/bounties/e2189ad5-b665-4ba5-b6c4-112e58ae9a97
|
|
CVE-2023-46569 - https://gist.github.com/gandalf4a/afeaf8cc958f95876f0ee245b8a002e8
|
|
CVE-2023-46569 - https://github.com/radareorg/radare2/issues/22334
|
|
CVE-2023-46570 - https://gist.github.com/gandalf4a/d7fa58f1b3418ef08ad244acccc10ba6
|
|
CVE-2023-46570 - https://github.com/radareorg/radare2/issues/22333
|
|
CVE-2023-46574 - https://github.com/OraclePi/repo/blob/main/totolink%20A3700R/1/A3700R%20%20V9.1.2u.6165_20211012%20vuln.md
|
|
CVE-2023-4658 - https://gitlab.com/gitlab-org/gitlab/-/issues/423835
|
|
CVE-2023-46580 - https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46580-Code-Projects-Inventory-Management-1.0-Stored-Cross-Site-Scripting-Vulnerability.md
|
|
CVE-2023-46581 - https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46581-Code-Projects-Inventory-Management-1.0-SQL-Injection-Vulnerability.md
|
|
CVE-2023-46582 - https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46582-Code-Projects-Inventory-Management-1.0-SQL-Injection-Vulnerability.md
|
|
CVE-2023-46587 - https://github.com/nasroabd/vulns/tree/main/XnView/2.51.5
|
|
CVE-2023-46602 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53
|
|
CVE-2023-46603 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53
|
|
CVE-2023-46604 - http://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2023-46604 - https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2023-46661 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
|
|
CVE-2023-46662 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
|
|
CVE-2023-46663 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
|
|
CVE-2023-46664 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
|
|
CVE-2023-46665 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
|
|
CVE-2023-46666 - https://www.elastic.co/community/security
|
|
CVE-2023-46667 - https://www.elastic.co/community/security
|
|
CVE-2023-46668 - https://www.elastic.co/community/security
|
|
CVE-2023-46672 - https://www.elastic.co/community/security
|
|
CVE-2023-46673 - https://www.elastic.co/community/security
|
|
CVE-2023-46722 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-jfxw-6c5v-c42f
|
|
CVE-2023-46730 - https://github.com/Intermesh/groupoffice/security/advisories/GHSA-vw6c-h82w-mvfv
|
|
CVE-2023-46736 - https://github.com/espocrm/espocrm/security/advisories/GHSA-g955-rwxx-jvf6
|
|
CVE-2023-46744 - https://github.com/Squidex/squidex/security/advisories/GHSA-xfr4-qg2v-7v5m
|
|
CVE-2023-46745 - https://github.com/librenms/librenms/security/advisories/GHSA-rq42-58qf-v3qx
|
|
CVE-2023-46747 - http://packetstormsecurity.com/files/175673/F5-BIG-IP-TMUI-AJP-Smuggling-Remote-Command-Execution.html
|
|
CVE-2023-4678 - https://huntr.dev/bounties/688a4a01-8c18-469d-8cbe-a2e79e80c877
|
|
CVE-2023-46805 - http://packetstormsecurity.com/files/176668/Ivanti-Connect-Secure-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2023-4681 - https://huntr.dev/bounties/d67c5619-ab36-41cc-93b7-04828e25f60e
|
|
CVE-2023-46813 - https://bugzilla.suse.com/show_bug.cgi?id=1212649
|
|
CVE-2023-46817 - http://seclists.org/fulldisclosure/2023/Oct/30
|
|
CVE-2023-46817 - https://karmainsecurity.com/KIS-2023-12
|
|
CVE-2023-46817 - https://karmainsecurity.com/pocs/CVE-2023-46817.php
|
|
CVE-2023-46818 - http://packetstormsecurity.com/files/176126/ISPConfig-3.2.11-PHP-Code-Injection.html
|
|
CVE-2023-46818 - http://seclists.org/fulldisclosure/2023/Dec/2
|
|
CVE-2023-4682 - https://huntr.dev/bounties/15232a74-e3b8-43f0-ae8a-4e89d56c474c
|
|
CVE-2023-4683 - https://huntr.dev/bounties/7852e4d2-af4e-4421-a39e-db23e0549922
|
|
CVE-2023-46857 - https://census-labs.com/news/2023/11/08/weak-svg-asset-filtering-mechanism-in-squidex-cms/
|
|
CVE-2023-46858 - https://packetstormsecurity.com/files/175277/Moodle-4.3-Cross-Site-Scripting.html
|
|
CVE-2023-46864 - https://github.com/Peppermint-Lab/peppermint/issues/171
|
|
CVE-2023-46865 - https://github.com/asylumdx/Crater-CVE-2023-46865-RCE
|
|
CVE-2023-46865 - https://github.com/crater-invoice/crater/issues/1267
|
|
CVE-2023-46865 - https://notes.netbytesec.com/2023/11/post-auth-rce-in-crater-invoice.html
|
|
CVE-2023-46866 - https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54
|
|
CVE-2023-46866 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53
|
|
CVE-2023-46867 - https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54
|
|
CVE-2023-46867 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53
|
|
CVE-2023-46871 - https://gist.github.com/ReturnHere/d0899bb03b8f5e8fae118f2b76888486
|
|
CVE-2023-46871 - https://github.com/gpac/gpac/issues/2658
|
|
CVE-2023-46889 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219
|
|
CVE-2023-46892 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219
|
|
CVE-2023-46916 - http://packetstormsecurity.com/files/175660
|
|
CVE-2023-46927 - https://github.com/gpac/gpac/issues/2657
|
|
CVE-2023-46928 - https://github.com/gpac/gpac/issues/2661
|
|
CVE-2023-46929 - https://github.com/gpac/gpac/issues/2662
|
|
CVE-2023-46930 - https://github.com/gpac/gpac/issues/2666
|
|
CVE-2023-46931 - https://github.com/gpac/gpac/issues/2664
|
|
CVE-2023-46932 - https://github.com/gpac/gpac/issues/2669
|
|
CVE-2023-46935 - https://github.com/weng-xianhu/eyoucms/issues/55
|
|
CVE-2023-4696 - https://huntr.dev/bounties/4747a485-77c3-4bb5-aab0-21253ef303ca
|
|
CVE-2023-4697 - https://huntr.dev/bounties/3ff3325a-1dcb-4da7-894d-81a9cf726d81
|
|
CVE-2023-46974 - https://github.com/yte121/CVE-2023-46974/
|
|
CVE-2023-46974 - https://youtu.be/5oVfJHT_-Ys
|
|
CVE-2023-46976 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20A3300R/1/README.md
|
|
CVE-2023-46977 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20LR1200GB/1/README.md
|
|
CVE-2023-46978 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20X6000R/1/README.md
|
|
CVE-2023-46979 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20X6000R/2/README.md
|
|
CVE-2023-4698 - https://huntr.dev/bounties/e1107d79-1d63-4238-90b7-5cc150512654
|
|
CVE-2023-46980 - https://github.com/sajaljat/CVE-2023-46980/tree/main
|
|
CVE-2023-46980 - https://youtu.be/3Mz2lSElg7Y
|
|
CVE-2023-46981 - https://github.com/JunFengDeng/Cve-List/blob/main/novel-plus/20231027/vuln/readme.md
|
|
CVE-2023-46987 - https://blog.csdn.net/weixin_72610998/article/details/133420747?spm=1001.2014.3001.5501
|
|
CVE-2023-46992 - https://github.com/AuroraHaaash/vul_report/blob/main/TOTOLINK%20A3300R/readme.md
|
|
CVE-2023-46993 - https://github.com/AuroraHaaash/vul_report/blob/main/TOTOLINK%20A3300R-Command%20Injection/readme.md
|
|
CVE-2023-46998 - https://github.com/soy-oreocato/CVE-2023-46998/
|
|
CVE-2023-47004 - https://github.com/RedisGraph/RedisGraph/issues/3178
|
|
CVE-2023-47014 - https://github.com/emirhanerdogu/CVE-2023-47014-Sticky-Notes-App-Using-PHP-with-Source-Code-v1.0-CSRF-to-CORS/blob/main/README.md
|
|
CVE-2023-47016 - https://gist.github.com/gandalf4a/65705be4f84269cb7cd725a1d4ab2ffa
|
|
CVE-2023-47016 - https://github.com/radareorg/radare2/issues/22349
|
|
CVE-2023-47025 - https://github.com/free5gc/free5gc/issues/501
|
|
CVE-2023-4704 - https://huntr.dev/bounties/4a54134d-df1f-43d4-9b14-45f023cd654a
|
|
CVE-2023-4707 - http://packetstormsecurity.com/files/174444/Clcknshop-1.0.0-Cross-Site-Scripting.html
|
|
CVE-2023-4708 - http://packetstormsecurity.com/files/174445/Clcknshop-1.0.0-SQL-Injection.html
|
|
CVE-2023-47091 - https://advisories.stormshield.eu/2023-024/
|
|
CVE-2023-47102 - https://quantiano.github.io/cve-2023-47102/
|
|
CVE-2023-47106 - https://github.com/traefik/traefik/security/advisories/GHSA-fvhj-4qfh-q2hm
|
|
CVE-2023-47108 - https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-8pgv-569h-w5rw
|
|
CVE-2023-47115 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-q68h-xwq5-mm7x
|
|
CVE-2023-47116 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-p59w-9gqw-wj8r
|
|
CVE-2023-47117 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6hjj-gq77-j4qw
|
|
CVE-2023-4712 - https://github.com/wpay65249519/cve/blob/main/SQL_injection.md
|
|
CVE-2023-47128 - https://github.com/piccolo-orm/piccolo/security/advisories/GHSA-xq59-7jf3-rjc6
|
|
CVE-2023-47130 - https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection
|
|
CVE-2023-4714 - http://packetstormsecurity.com/files/174446/PlayTube-3.0.1-Information-Disclosure.html
|
|
CVE-2023-47171 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1869
|
|
CVE-2023-4720 - https://huntr.dev/bounties/1dc2954c-8497-49fa-b2af-113e1e9381ad
|
|
CVE-2023-4721 - https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc
|
|
CVE-2023-47218 - https://www.rapid7.com/blog/post/2024/02/13/cve-2023-47218-qnap-qts-and-quts-hero-unauthenticated-command-injection-fixed/
|
|
CVE-2023-4722 - https://huntr.dev/bounties/ddfdb41d-e708-4fec-afe5-68ff1f88f830
|
|
CVE-2023-47249 - https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54
|
|
CVE-2023-47250 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html
|
|
CVE-2023-47250 - http://seclists.org/fulldisclosure/2023/Nov/13
|
|
CVE-2023-47250 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/
|
|
CVE-2023-47251 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html
|
|
CVE-2023-47251 - http://seclists.org/fulldisclosure/2023/Nov/13
|
|
CVE-2023-47251 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/
|
|
CVE-2023-47254 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-023.txt
|
|
CVE-2023-47254 - https://www.syss.de/pentest-blog/command-injection-via-cli-des-draytek-vigor167-syss-2023-023
|
|
CVE-2023-47256 - https://web.archive.org/web/20240208140218/https://gotham-security.com/screenconnect-cve-2023-47256
|
|
CVE-2023-47257 - https://web.archive.org/web/20240208140218/https://gotham-security.com/screenconnect-cve-2023-47256
|
|
CVE-2023-47271 - http://packetstormsecurity.com/files/176255/PKP-WAL-3.4.0-3-Remote-Code-Execution.html
|
|
CVE-2023-47271 - http://seclists.org/fulldisclosure/2023/Dec/23
|
|
CVE-2023-47308 - https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2023-11-09-newsletterpop.md
|
|
CVE-2023-47320 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47320
|
|
CVE-2023-47321 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47321
|
|
CVE-2023-47322 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47322
|
|
CVE-2023-47323 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47323
|
|
CVE-2023-47324 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47324
|
|
CVE-2023-47325 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47325
|
|
CVE-2023-47326 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47326
|
|
CVE-2023-47327 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47327
|
|
CVE-2023-4733 - https://github.com/vim/vim/commit/e1dc9a627536304bc4f738c21e909ad9fcf3974c
|
|
CVE-2023-4733 - https://huntr.dev/bounties/1ce1fd8c-050a-4373-8004-b35b61590217
|
|
CVE-2023-4734 - https://huntr.dev/bounties/688e4382-d2b6-439a-a54e-484780f82217
|
|
CVE-2023-47345 - https://github.com/free5gc/free5gc/issues/483
|
|
CVE-2023-47346 - https://github.com/free5gc/free5gc/issues/482
|
|
CVE-2023-47347 - https://github.com/free5gc/free5gc/issues/496
|
|
CVE-2023-4735 - https://huntr.dev/bounties/fc83bde3-f621-42bd-aecb-8c1ae44cba51
|
|
CVE-2023-47350 - https://mechaneus.github.io/CVE-2023-47350.html
|
|
CVE-2023-47353 - https://github.com/actuator/imou/blob/main/com.dahua.imou.go-V1.0.11.md
|
|
CVE-2023-47354 - https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md
|
|
CVE-2023-47355 - https://github.com/actuator/com.eypcnnapps.quickreboot/blob/main/CWE-925.md
|
|
CVE-2023-4736 - https://huntr.dev/bounties/e1ce0995-4df4-4dec-9cd7-3136ac3e8e71
|
|
CVE-2023-4738 - https://github.com/vim/vim/commit/ced2c7394aafdc90fb7845e09b3a3fee23d48cb1
|
|
CVE-2023-4738 - https://huntr.dev/bounties/9fc7dced-a7bb-4479-9718-f956df20f612
|
|
CVE-2023-47384 - https://github.com/gpac/gpac/issues/2672
|
|
CVE-2023-4739 - https://github.com/Meizhi-hua/cve/blob/main/upload_file.md
|
|
CVE-2023-47397 - https://liotree.github.io/2023/webid.html
|
|
CVE-2023-4740 - https://vuldb.com/?id.238629
|
|
CVE-2023-4744 - https://github.com/GleamingEyes/vul/blob/main/tenda_ac8/ac8_1.md
|
|
CVE-2023-47444 - https://0xbro.red/disclosures/disclosed-vulnerabilities/opencart-cve-2023-47444/
|
|
CVE-2023-47445 - https://github.com/termanix/PHPGrukul-Pre-School-Enrollment-System-v1.0/blob/main/CVE-2023-47445%20PHPGurukul-Pre-School-Enrollment-System-v1.0%20SQL%20Injection.md
|
|
CVE-2023-47446 - https://github.com/termanix/PHPGrukul-Pre-School-Enrollment-System-v1.0/blob/main/CVE-2023-47446%20PHPGurukul-Pre-School-Enrollment-System-v1.0%20Stored%20XSS%20Vulnerability.md
|
|
CVE-2023-4745 - https://github.com/Jacky-Y/vuls/blob/main/vul6.md
|
|
CVE-2023-47452 - https://github.com/xieqiang11/poc-1/tree/main
|
|
CVE-2023-47453 - https://github.com/xieqiang11/poc-2/tree/main
|
|
CVE-2023-47454 - https://github.com/xieqiang11/poc-3/tree/main
|
|
CVE-2023-47455 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1806/setSchedWifi.md
|
|
CVE-2023-47456 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1806/fromSetWirelessRepeat.md
|
|
CVE-2023-47462 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary%20File%20Read%20through%20file%20share.md
|
|
CVE-2023-47464 - https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Arbitrary%20File%20Creation%20Through%20API%20upload.md
|
|
CVE-2023-47465 - https://github.com/gpac/gpac/issues/2652
|
|
CVE-2023-47470 - https://github.com/FFmpeg/FFmpeg/commit/4565747056a11356210ed8edcecb920105e40b60
|
|
CVE-2023-47470 - https://patchwork.ffmpeg.org/project/ffmpeg/patch/20230915131147.5945-2-michael@niedermayer.cc/
|
|
CVE-2023-47471 - https://github.com/strukturag/libde265/issues/426
|
|
CVE-2023-47473 - https://github.com/THMOAS0/SSR123/blob/main/%E4%BC%81%E8%AF%ADiFair%20Any%20file%20read.pdf
|
|
CVE-2023-47488 - https://bugplorer.github.io/cve-xss-itop/
|
|
CVE-2023-47488 - https://nitipoom-jar.github.io/CVE-2023-47488/
|
|
CVE-2023-47489 - https://bugplorer.github.io/cve-csv-itop/
|
|
CVE-2023-47489 - https://nitipoom-jar.github.io/CVE-2023-47489/
|
|
CVE-2023-4749 - https://skypoc.wordpress.com/2023/09/03/%e3%80%90code-audit%e3%80%91open-source-ample-inventory-management-system-v1-0-by-mayuri_k-has-a-file-inclusion-vulnerability/
|
|
CVE-2023-4750 - https://github.com/vim/vim/commit/fc68299d436cf87453e432daa77b6d545df4d7ed
|
|
CVE-2023-4750 - https://huntr.dev/bounties/1ab3ebdf-fe7d-4436-b483-9a586e03b0ea
|
|
CVE-2023-4751 - https://huntr.dev/bounties/db7be8d6-6cb7-4ae5-9c4e-805423afa378
|
|
CVE-2023-4752 - https://github.com/vim/vim/commit/ee9166eb3b41846661a39b662dc7ebe8b5e15139
|
|
CVE-2023-4752 - https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757
|
|
CVE-2023-4754 - https://huntr.dev/bounties/b7ed24ad-7d0b-40b7-8f4d-3c18a906620c
|
|
CVE-2023-4755 - https://huntr.dev/bounties/463474b7-a4e8-42b6-8b30-e648a77ee6b3
|
|
CVE-2023-4756 - https://huntr.dev/bounties/2342da0e-f097-4ce7-bfdc-3ec0ba446e05
|
|
CVE-2023-4758 - https://huntr.dev/bounties/2f496261-1090-45ac-bc89-cc93c82090d6
|
|
CVE-2023-4759 - https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/11
|
|
CVE-2023-47619 - https://securitylab.github.com/advisories/GHSL-2023-203_GHSL-2023-204_audiobookshelf/
|
|
CVE-2023-47620 - https://securitylab.github.com/advisories/GHSL-2023-218_GHSL-2023-219_scrypted/
|
|
CVE-2023-47623 - https://securitylab.github.com/advisories/GHSL-2023-218_GHSL-2023-219_scrypted/
|
|
CVE-2023-47624 - https://securitylab.github.com/advisories/GHSL-2023-203_GHSL-2023-204_audiobookshelf/
|
|
CVE-2023-47625 - https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-qpw7-65ww-wj82
|
|
CVE-2023-47627 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-gfw2-4jvh-wgfg
|
|
CVE-2023-47628 - https://github.com/datahub-project/datahub/security/advisories/GHSA-75p8-rgh2-r9mx
|
|
CVE-2023-47629 - https://github.com/datahub-project/datahub/security/advisories/GHSA-vj59-23ww-p6c8
|
|
CVE-2023-47633 - https://github.com/traefik/traefik/security/advisories/GHSA-6fwg-jrfw-ff7p
|
|
CVE-2023-47637 - https://github.com/pimcore/pimcore/security/advisories/GHSA-72hh-xf79-429p
|
|
CVE-2023-47640 - https://github.com/datahub-project/datahub/security/advisories/GHSA-fg9x-wvqw-6gmw
|
|
CVE-2023-47641 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-xx9p-xxvh-7g8j
|
|
CVE-2023-47643 - https://github.com/salesagility/SuiteCRM-Core/security/advisories/GHSA-fxww-jqfv-9rrr
|
|
CVE-2023-4777 - https://www.qualys.com/security-advisories/
|
|
CVE-2023-4778 - https://huntr.dev/bounties/abb450fb-4ab2-49b0-90da-3d878eea5397
|
|
CVE-2023-47800 - https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2023-006.txt
|
|
CVE-2023-47804 - https://www.openoffice.org/security/cves/CVE-2023-47804.html
|
|
CVE-2023-4781 - https://github.com/vim/vim/commit/f6d28fe2c95c678cc3202cc5dc825a3fcc709e93
|
|
CVE-2023-4781 - https://huntr.dev/bounties/c867eb0a-aa8b-4946-a621-510350673883
|
|
CVE-2023-47861 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1884
|
|
CVE-2023-47861 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1884
|
|
CVE-2023-47882 - https://github.com/actuator/yi/blob/main/CWE-319.md
|
|
CVE-2023-47883 - https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/AFC-POC.apk
|
|
CVE-2023-47883 - https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/CWE-94.md
|
|
CVE-2023-47883 - https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/TVBrowserDemo.gif
|
|
CVE-2023-47889 - https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md
|
|
CVE-2023-47890 - https://github.com/pyload/pyload/security/advisories/GHSA-h73m-pcfw-25h2
|
|
CVE-2023-47992 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47992
|
|
CVE-2023-47993 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47993
|
|
CVE-2023-47994 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47994
|
|
CVE-2023-47995 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47995
|
|
CVE-2023-47996 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47996
|
|
CVE-2023-47997 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47997
|
|
CVE-2023-48003 - https://docs.unsafe-inline.com/0day/asp.net-zero-v12.3.0-html-injection-leads-to-open-redirect-via-websockets-cve-2023-48003
|
|
CVE-2023-48003 - https://github.com/passtheticket/vulnerability-research/blob/main/aspnetzero_html_injection_via_websockets_messages.md
|
|
CVE-2023-48011 - https://github.com/gpac/gpac/issues/2611
|
|
CVE-2023-48013 - https://github.com/gpac/gpac/issues/2612
|
|
CVE-2023-48014 - https://github.com/gpac/gpac/issues/2613
|
|
CVE-2023-48016 - https://github.com/Serhatcck/cves/blob/main/CVE-2023-48016-restaurant-table-booking-system-SQLInjection.md
|
|
CVE-2023-48028 - https://nitipoom-jar.github.io/CVE-2023-48028/
|
|
CVE-2023-48029 - https://nitipoom-jar.github.io/CVE-2023-48029/
|
|
CVE-2023-48031 - https://nitipoom-jar.github.io/CVE-2023-48031/
|
|
CVE-2023-48039 - https://github.com/gpac/gpac/issues/2679
|
|
CVE-2023-48049 - https://github.com/luvsn/OdZoo/tree/main/exploits/website_search_blog
|
|
CVE-2023-48050 - https://github.com/luvsn/OdZoo/tree/main/exploits/odoo-biometric-attendance
|
|
CVE-2023-48058 - https://github.com/CP1379767017/cms/blob/main/CSRF%20exists%20at%20the%20task%20management%20execution%20task%20location.md
|
|
CVE-2023-48060 - https://github.com/CP1379767017/cms/blob/main/CSRF%20exists%20at%20the%20location%20where%20task%20management%20adds%20tasks.md
|
|
CVE-2023-48063 - https://github.com/CP1379767017/cms/blob/dreamcms_vul/There%20is%20a%20CSRF%20vulnerability%20at%20th%20menu%20management%20location.md
|
|
CVE-2023-48068 - https://github.com/CP1379767017/cms/blob/dreamcms_vul/dedevCMS/dedeCMS_XSS.md
|
|
CVE-2023-48078 - https://github.com/esasadam06/Simple-CRUD-Functionality-SQLi-POC
|
|
CVE-2023-48090 - https://github.com/gpac/gpac/issues/2680
|
|
CVE-2023-4810 - https://portswigger.net/web-security/cross-site-scripting/stored
|
|
CVE-2023-48104 - https://github.com/E1tex/CVE-2023-48104
|
|
CVE-2023-48105 - https://github.com/bytecodealliance/wasm-micro-runtime/issues/2726
|
|
CVE-2023-48106 - https://github.com/zlib-ng/minizip-ng/issues/740
|
|
CVE-2023-48107 - https://github.com/zlib-ng/minizip-ng/issues/739
|
|
CVE-2023-48118 - https://github.com/el-dud3rino/CVE-Disclosures/blob/main/Quest%20Analytics%20IQCRM/Proof%20of%20Concept
|
|
CVE-2023-48121 - https://joerngermany.github.io/ezviz_vulnerability/
|
|
CVE-2023-48122 - https://github.com/microweber/microweber/issues/1042
|
|
CVE-2023-4814 - https://kcm.trellix.com/corporate/index?page=content&id=SB10407
|
|
CVE-2023-4815 - https://huntr.dev/bounties/4cd3eeb4-57c9-4af2-ad19-2166c9e0fd2c
|
|
CVE-2023-4816 - https://images.go.hitachienergy.com/Web/ABBEnterpriseSoftware/%7B70b3d323-4866-42e1-8a75-58996729c1d4%7D_8DBD000172-VU-2023-23_Asset_Suite_Tagout_vulnerability_Rev1.pdf
|
|
CVE-2023-48161 - https://github.com/tacetool/TACE#cve-2023-48161
|
|
CVE-2023-48161 - https://sourceforge.net/p/giflib/bugs/167/
|
|
CVE-2023-48172 - http://packetstormsecurity.com/files/175800
|
|
CVE-2023-4818 - https://blog.stmcyber.com/pax-pos-cves-2023/
|
|
CVE-2023-48192 - https://github.com/zxsssd/TotoLink-
|
|
CVE-2023-48197 - https://nitipoom-jar.github.io/CVE-2023-48197/
|
|
CVE-2023-48198 - https://nitipoom-jar.github.io/CVE-2023-48198
|
|
CVE-2023-48199 - https://nitipoom-jar.github.io/CVE-2023-48199/
|
|
CVE-2023-48200 - https://nitipoom-jar.github.io/CVE-2023-48200/
|
|
CVE-2023-48201 - https://mechaneus.github.io/CVE-2023-48201.html
|
|
CVE-2023-48202 - https://mechaneus.github.io/CVE-2023-48202.html
|
|
CVE-2023-48205 - http://packetstormsecurity.com/files/175802
|
|
CVE-2023-48206 - http://packetstormsecurity.com/files/175803
|
|
CVE-2023-48207 - http://packetstormsecurity.com/files/175804
|
|
CVE-2023-48208 - http://packetstormsecurity.com/files/175805
|
|
CVE-2023-48223 - https://github.com/nearform/fast-jwt/security/advisories/GHSA-c2ff-88x2-x9pg
|
|
CVE-2023-48225 - https://github.com/labring/laf/security/advisories/GHSA-hv2g-gxx4-fwxp
|
|
CVE-2023-48226 - https://bugcrowd.com/vulnerability-rating-taxonomy
|
|
CVE-2023-48226 - https://github.com/openreplay/openreplay/security/advisories/GHSA-xpfv-454c-3fj4
|
|
CVE-2023-48238 - https://github.com/joaquimserafim/json-web-token/security/advisories/GHSA-4xw9-cx39-r355
|
|
CVE-2023-4829 - https://huntr.dev/bounties/babd73ca-6c80-4145-8c7d-33a883fe606b
|
|
CVE-2023-48294 - https://github.com/librenms/librenms/security/advisories/GHSA-fpq5-4vwm-78x4
|
|
CVE-2023-48295 - https://github.com/librenms/librenms/security/advisories/GHSA-8phr-637g-pxrg
|
|
CVE-2023-48300 - https://github.com/epiphyt/embed-privacy/security/advisories/GHSA-3wv9-4rvf-w37g
|
|
CVE-2023-48310 - https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-9fhc-f3mr-w6h6
|
|
CVE-2023-48310 - https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-mmpf-rw6c-67mm
|
|
CVE-2023-48312 - https://github.com/projectcapsule/capsule-proxy/security/advisories/GHSA-fpvw-6m5v-hqfp
|
|
CVE-2023-4836 - https://research.cleantalk.org/cve-2023-4836-user-private-files-idor-to-sensitive-data-and-private-files-exposure-leak-of-info-poc
|
|
CVE-2023-48418 - http://packetstormsecurity.com/files/176446/Android-DeviceVersionFragment.java-Privilege-Escalation.html
|
|
CVE-2023-4847 - https://skypoc.wordpress.com/2023/09/04/sourcecodester-simple-book-catalog-app-v1-0-has-multiple-vulnerabilities/
|
|
CVE-2023-4848 - https://skypoc.wordpress.com/2023/09/04/sourcecodester-simple-book-catalog-app-v1-0-has-multiple-vulnerabilities/
|
|
CVE-2023-4850 - https://vuldb.com/?id.239259
|
|
CVE-2023-4858 - https://github.com/nightcloudos/bug_report/blob/main/vendors/poc2.md
|
|
CVE-2023-4863 - https://blog.isosceles.com/the-webp-0day/
|
|
CVE-2023-4863 - https://bugzilla.suse.com/show_bug.cgi?id=1215231
|
|
CVE-2023-4863 - https://news.ycombinator.com/item?id=37478403
|
|
CVE-2023-4863 - https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/
|
|
CVE-2023-4864 - https://skypoc.wordpress.com/2023/09/05/sourcecodester-take-note-app-v1-0-has-multiple-vulnerabilities/
|
|
CVE-2023-4865 - https://skypoc.wordpress.com/2023/09/05/sourcecodester-take-note-app-v1-0-has-multiple-vulnerabilities/
|
|
CVE-2023-4865 - https://vuldb.com/?id.239350
|
|
CVE-2023-48654 - https://sec-consult.com/vulnerability-lab/advisory/kiosk-escape-privilege-escalation-one-identity-password-manager-secure-password-extension/
|
|
CVE-2023-4868 - https://skypoc.wordpress.com/2023/09/05/vuln1/
|
|
CVE-2023-4869 - https://skypoc.wordpress.com/2023/09/05/vuln1/
|
|
CVE-2023-4870 - https://skypoc.wordpress.com/2023/09/05/vuln1/
|
|
CVE-2023-48702 - https://securitylab.github.com/advisories/GHSL-2023-028_jellyfin/
|
|
CVE-2023-48706 - https://github.com/vim/vim/security/advisories/GHSA-c8qm-x72m-q53q
|
|
CVE-2023-4871 - https://skypoc.wordpress.com/2023/09/05/vuln1/
|
|
CVE-2023-48711 - https://github.com/cjvnjde/google-translate-api-browser/security/advisories/GHSA-4233-7q5q-m7p6
|
|
CVE-2023-48712 - https://github.com/warp-tech/warpgate/security/advisories/GHSA-c94j-vqr5-3mxr
|
|
CVE-2023-4872 - https://skypoc.wordpress.com/2023/09/05/vuln1/
|
|
CVE-2023-48728 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1883
|
|
CVE-2023-48728 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1883
|
|
CVE-2023-4873 - https://github.com/cugerQDHJ/cve/blob/main/rce.md
|
|
CVE-2023-48730 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1882
|
|
CVE-2023-48730 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1882
|
|
CVE-2023-48733 - https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137
|
|
CVE-2023-48733 - https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139
|
|
CVE-2023-48733 - https://www.openwall.com/lists/oss-security/2024/02/14/4
|
|
CVE-2023-48736 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/58
|
|
CVE-2023-4876 - https://huntr.dev/bounties/f729d2c8-a62e-4f30-ac24-e187b0a7892a
|
|
CVE-2023-4877 - https://huntr.dev/bounties/168e9299-f8ff-40d6-9def-d097b38bad84
|
|
CVE-2023-4878 - https://huntr.dev/bounties/655c4f77-04b2-4220-bfaf-a4d99fe86703
|
|
CVE-2023-4879 - https://huntr.dev/bounties/7df6b167-3c39-4563-9b8a-33613e25cf27
|
|
CVE-2023-48795 - http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
|
|
CVE-2023-48795 - https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
|
|
CVE-2023-48795 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
|
|
CVE-2023-48795 - https://www.paramiko.org/changelog.html
|
|
CVE-2023-48795 - https://www.theregister.com/2023/12/20/terrapin_attack_ssh
|
|
CVE-2023-48813 - https://github.com/slims/slims9_bulian/issues/217
|
|
CVE-2023-48823 - http://packetstormsecurity.com/files/176030
|
|
CVE-2023-48824 - http://packetstormsecurity.com/files/176031
|
|
CVE-2023-48825 - http://packetstormsecurity.com/files/176033
|
|
CVE-2023-48826 - http://packetstormsecurity.com/files/176034
|
|
CVE-2023-48827 - http://packetstormsecurity.com/files/176036
|
|
CVE-2023-48828 - http://packetstormsecurity.com/files/176037
|
|
CVE-2023-48830 - http://packetstormsecurity.com/files/176038
|
|
CVE-2023-48831 - http://packetstormsecurity.com/files/176039
|
|
CVE-2023-48833 - http://packetstormsecurity.com/files/176042
|
|
CVE-2023-48834 - http://packetstormsecurity.com/files/176043
|
|
CVE-2023-48835 - http://packetstormsecurity.com/files/176045
|
|
CVE-2023-48836 - http://packetstormsecurity.com/files/176046
|
|
CVE-2023-48837 - http://packetstormsecurity.com/files/176048
|
|
CVE-2023-48838 - http://packetstormsecurity.com/files/176054
|
|
CVE-2023-48839 - http://packetstormsecurity.com/files/176055
|
|
CVE-2023-48840 - http://packetstormsecurity.com/files/176056
|
|
CVE-2023-48841 - http://packetstormsecurity.com/files/176058
|
|
CVE-2023-48849 - https://github.com/delsploit/CVE-2023-48849
|
|
CVE-2023-48858 - https://github.com/Shumerez/CVE-2023-48858
|
|
CVE-2023-48861 - https://github.com/xieqiang11/POC4/blob/main/README.md
|
|
CVE-2023-48866 - https://nitipoom-jar.github.io/CVE-2023-48866/
|
|
CVE-2023-48886 - https://github.com/luxiaoxun/NettyRpc/issues/53
|
|
CVE-2023-48887 - https://github.com/fengjiachun/Jupiter/issues/115
|
|
CVE-2023-48893 - https://github.com/slims/slims9_bulian/issues/209
|
|
CVE-2023-48894 - https://github.com/jishenghua/jshERP/issues/98
|
|
CVE-2023-48910 - https://gist.github.com/b33t1e/2a2dc17cf36cd741b2c99425c892d826
|
|
CVE-2023-48912 - https://github.com/Tiamat-ron/cms/blob/main/There%20is%20a%20csrf%20in%20the%20article%20management%20modification%20section.md
|
|
CVE-2023-48913 - https://github.com/Tiamat-ron/cms/blob/main/The%20deletion%20function%20of%20the%20Article%20Management%20Office%20exists%20in%20CSRF.md
|
|
CVE-2023-48914 - https://github.com/Tiamat-ron/cms/blob/main/There%20is%20a%20csrf%20in%20the%20newly%20added%20section%20of%20article%20management.md
|
|
CVE-2023-48925 - https://security.friendsofpresta.org/modules/2023/12/07/bavideotab.html
|
|
CVE-2023-48928 - https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48928
|
|
CVE-2023-48929 - https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48929
|
|
CVE-2023-48945 - https://github.com/openlink/virtuoso-opensource/issues/1172
|
|
CVE-2023-48946 - https://github.com/openlink/virtuoso-opensource/issues/1178
|
|
CVE-2023-48947 - https://github.com/openlink/virtuoso-opensource/issues/1179
|
|
CVE-2023-48948 - https://github.com/openlink/virtuoso-opensource/issues/1176
|
|
CVE-2023-48949 - https://github.com/openlink/virtuoso-opensource/issues/1173
|
|
CVE-2023-48950 - https://github.com/openlink/virtuoso-opensource/issues/1174
|
|
CVE-2023-48951 - https://github.com/openlink/virtuoso-opensource/issues/1177
|
|
CVE-2023-48952 - https://github.com/openlink/virtuoso-opensource/issues/1175
|
|
CVE-2023-48958 - https://github.com/gpac/gpac/issues/2689
|
|
CVE-2023-48963 - https://github.com/daodaoshao/vul_tenda_i6_1
|
|
CVE-2023-48964 - https://github.com/daodaoshao/vul_tenda_i6_2
|
|
CVE-2023-48967 - https://github.com/noear/solon/issues/226
|
|
CVE-2023-4897 - https://huntr.dev/bounties/0631af48-84a3-4019-85db-f0f8b12cb0ab
|
|
CVE-2023-4898 - https://huntr.dev/bounties/a3dda692-7e8a-44a9-bd96-24cfd3f721d2
|
|
CVE-2023-4899 - https://huntr.dev/bounties/70a2fb18-f030-4abb-9ddc-13f94107ac9d
|
|
CVE-2023-49000 - https://github.com/actuator/com.artis.browser/blob/main/CWE-94.md
|
|
CVE-2023-49001 - https://github.com/actuator/com.gurry.kvbrowser/blob/main/CWE-94.md
|
|
CVE-2023-49002 - https://github.com/actuator/com.sinous.voice.dialer/blob/main/CWE-928.md
|
|
CVE-2023-49003 - https://github.com/actuator/com.simplemobiletools.dialer/blob/main/CWE-928.md
|
|
CVE-2023-49006 - https://github.com/Hebing123/cve/issues/5
|
|
CVE-2023-49006 - https://huntr.com/bounties/ca6d669f-fd82-4188-aae2-69e08740d982/
|
|
CVE-2023-49032 - https://github.com/ltb-project/self-service-password/issues/816
|
|
CVE-2023-49040 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/form_fast_setting_internet_set.md
|
|
CVE-2023-49042 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/setSchedWifi.md
|
|
CVE-2023-49043 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/fromSetWirelessRepeat.md
|
|
CVE-2023-49044 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/form_fast_setting_wifi_set.md
|
|
CVE-2023-49046 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formAddMacfilterRule.md
|
|
CVE-2023-49047 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formSetDeviceName.md
|
|
CVE-2023-49052 - https://github.com/Cyber-Wo0dy/CVE-2023-49052
|
|
CVE-2023-49052 - https://github.com/Cyber-Wo0dy/report/blob/main/microweber/v2.0.4/microweber_unrestricted_upload
|
|
CVE-2023-49070 - http://packetstormsecurity.com/files/176323/Apache-OFBiz-18.12.09-Remote-Code-Execution.html
|
|
CVE-2023-49076 - https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-xx63-4jr8-9ghc
|
|
CVE-2023-49078 - https://github.com/zediious/raptor-web/security/advisories/GHSA-8r6g-fhh4-xhmq
|
|
CVE-2023-49079 - https://github.com/misskey-dev/misskey/security/advisories/GHSA-3f39-6537-3cgc
|
|
CVE-2023-49081 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-q3qx-c6g2-7pw2
|
|
CVE-2023-49082 - https://gist.github.com/jnovikov/7f411ae9fe6a9a7804cf162a3bdbb44b
|
|
CVE-2023-49082 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-qvrw-v9rv-5rjx
|
|
CVE-2023-49083 - http://www.openwall.com/lists/oss-security/2023/11/29/2
|
|
CVE-2023-49083 - https://github.com/pyca/cryptography/security/advisories/GHSA-jfhm-5ghh-2f97
|
|
CVE-2023-49084 - http://packetstormsecurity.com/files/176995/Cacti-pollers.php-SQL-Injection-Remote-Code-Execution.html
|
|
CVE-2023-49085 - http://packetstormsecurity.com/files/176995/Cacti-pollers.php-SQL-Injection-Remote-Code-Execution.html
|
|
CVE-2023-49086 - https://github.com/Cacti/cacti/security/advisories/GHSA-wc73-r2vw-59pr
|
|
CVE-2023-49088 - https://github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h
|
|
CVE-2023-49088 - https://github.com/Cacti/cacti/security/advisories/GHSA-q7g7-gcf6-wh4x
|
|
CVE-2023-49091 - https://github.com/azukaar/Cosmos-Server/security/advisories/GHSA-hpvm-x7m8-3c6x
|
|
CVE-2023-49093 - https://github.com/HtmlUnit/htmlunit/security/advisories/GHSA-37vq-hr2f-g7h7
|
|
CVE-2023-49100 - https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-11.html
|
|
CVE-2023-4911 - http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html
|
|
CVE-2023-4911 - http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation.html
|
|
CVE-2023-4911 - http://seclists.org/fulldisclosure/2023/Oct/11
|
|
CVE-2023-4911 - http://www.openwall.com/lists/oss-security/2023/10/03/2
|
|
CVE-2023-4911 - https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
|
|
CVE-2023-49114 - http://seclists.org/fulldisclosure/2024/Mar/10
|
|
CVE-2023-49114 - https://r.sec-consult.com/qognify
|
|
CVE-2023-4912 - https://gitlab.com/gitlab-org/gitlab/-/issues/424882
|
|
CVE-2023-4913 - https://huntr.dev/bounties/d2a9ec4d-1b4b-470b-87da-ec069f5925ae
|
|
CVE-2023-4914 - https://huntr.dev/bounties/cdd995b2-c983-428b-a73a-827b61b7c06b
|
|
CVE-2023-49147 - http://packetstormsecurity.com/files/176206/PDF24-Creator-11.15.1-Local-Privilege-Escalation.html
|
|
CVE-2023-49147 - http://seclists.org/fulldisclosure/2023/Dec/18
|
|
CVE-2023-49147 - https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalation-via-msi-installer-in-pdf24-creator-geek-software-gmbh/
|
|
CVE-2023-49210 - https://gist.github.com/mcoimbra/b05a55a5760172dccaa0a827647ad63e
|
|
CVE-2023-49276 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-v4v2-8h88-65qj
|
|
CVE-2023-4928 - https://huntr.dev/bounties/cb72cc17-5a0d-4392-9a5f-a13aa773de9e
|
|
CVE-2023-49287 - http://packetstormsecurity.com/files/176060/TinyDir-1.2.5-Buffer-Overflow.html
|
|
CVE-2023-49287 - https://github.com/cxong/tinydir/security/advisories/GHSA-jf5r-wgf4-qhxf
|
|
CVE-2023-49290 - https://github.com/lestrrat-go/jwx/security/advisories/GHSA-7f9x-gw85-8grf
|
|
CVE-2023-49291 - https://securitylab.github.com/research/github-actions-untrusted-input
|
|
CVE-2023-49293 - https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97
|
|
CVE-2023-49294 - https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f
|
|
CVE-2023-49297 - https://github.com/iterative/PyDrive2/security/advisories/GHSA-v5f6-hjmf-9mc5
|
|
CVE-2023-49298 - https://www.theregister.com/2023/12/04/two_new_versions_of_openzfs/
|
|
CVE-2023-49313 - https://github.com/louiselalanne/CVE-2023-49313
|
|
CVE-2023-49314 - https://asana.com/pt/download
|
|
CVE-2023-49328 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2023-4933 - https://wpscan.com/vulnerability/882f6c36-44c6-4273-81cd-2eaaf5e81fa7
|
|
CVE-2023-49355 - https://github.com/linzc21/bug-reports/blob/main/reports/jq/1.7-37-g88f01a7/heap-buffer-overflow/CVE-2023-49355.md
|
|
CVE-2023-49356 - https://github.com/linzc21/bug-reports/blob/main/reports/mp3gain/1.6.2/stack-buffer-overflow/CVE-2023-49356.md
|
|
CVE-2023-49371 - https://github.com/Maverickfir/RuoYi-v4.6-vulnerability/blob/main/Ruoyiv4.6.md
|
|
CVE-2023-49372 - https://github.com/li-yu320/cms/blob/main/There%20is%20a%20CSRF%20present%20at%20the%20new%20location%20of%20the%20rotation%20image.md
|
|
CVE-2023-49373 - https://github.com/li-yu320/cms/blob/main/There%20is%20a%20CSRF%20at%20the%20deletion%20point%20of%20the%20broadcast%20image.md
|
|
CVE-2023-49374 - https://github.com/li-yu320/cms/blob/main/There%20is%20CSRF%20in%20the%20rotation%20image%20editing%20section.md
|
|
CVE-2023-49375 - https://github.com/cui2shark/cms/blob/main/There%20is%20CSRF%20in%20the%20modification%20of%20the%20friendship%20link.md
|
|
CVE-2023-49376 - https://github.com/cui2shark/cms/blob/main/Delete%20existing%20CSRF%20in%20label%20management.md
|
|
CVE-2023-49377 - https://github.com/cui2shark/cms/blob/main/Modification%20of%20CSRF%20in%20Label%20Management.md
|
|
CVE-2023-49378 - https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20creation%20location%20of%20the%20custom%20table.md
|
|
CVE-2023-49379 - https://github.com/cui2shark/cms/blob/main/There%20is%20a%20CSRF%20in%20the%20new%20location%20of%20the%20friendship%20link.md
|
|
CVE-2023-49380 - https://github.com/cui2shark/cms/blob/main/There%20is%20a%20CSRF%20at%20the%20deletion%20point%20of%20the%20friendship%20link.md
|
|
CVE-2023-49381 - https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20modification%20point%20of%20the%20custom%20table.md
|
|
CVE-2023-49382 - https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20the%20custom%20table.md
|
|
CVE-2023-49383 - https://github.com/cui2shark/cms/blob/main/Added%20CSRF%20in%20Label%20Management.md
|
|
CVE-2023-49391 - https://github.com/free5gc/free5gc/issues/497
|
|
CVE-2023-49395 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20in%20the%20column%20management%20modification%20section.md
|
|
CVE-2023-49396 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20newly%20added%20section%20of%20column%20management.md
|
|
CVE-2023-49397 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20change%20of%20column%20management%20status.md
|
|
CVE-2023-49398 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20column%20management.md
|
|
CVE-2023-49402 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_localMsg/w30e_localMsg.md
|
|
CVE-2023-49403 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setFixTools/w30e_setFixTools.md
|
|
CVE-2023-49404 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setAdvancedSetList/w30e_setAdvancedSetList.md
|
|
CVE-2023-49405 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_UploadCfg/w30e_UploadCfg.md
|
|
CVE-2023-49406 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_telnet/w30e_telnet.md
|
|
CVE-2023-49408 - https://github.com/GD008/TENDA/blob/main/AX3/tenda_AX3_setBlackRule/AX3-setBlackRule.md
|
|
CVE-2023-49409 - https://github.com/GD008/TENDA/blob/main/AX3/tenda_AX3_telnet/AX3_telnet.md
|
|
CVE-2023-49410 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setIPv6Status/w30e_setIPv6Status.md
|
|
CVE-2023-49411 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_deleteMesh/w30e_deleteMesh.md
|
|
CVE-2023-49417 - https://github.com/cnitlrt/iot_vuln/tree/master/totolink/A7000R/setOpModeCfg
|
|
CVE-2023-49418 - https://github.com/cnitlrt/iot_vuln/tree/master/totolink/A7000R/setIpPortFilterRules
|
|
CVE-2023-49424 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetVirtualServerCfg.md
|
|
CVE-2023-49425 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/setMacFilterCfg.md
|
|
CVE-2023-49426 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetStaticRouteCfg.md
|
|
CVE-2023-49428 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetOnlineDevName.md
|
|
CVE-2023-49431 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetOnlineDevName.md
|
|
CVE-2023-49432 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/setMacFilterCfg.md
|
|
CVE-2023-49433 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetVirtualServerCfg.md
|
|
CVE-2023-49435 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList-3.md
|
|
CVE-2023-49436 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList-2.md
|
|
CVE-2023-49437 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetNetControlList-3.md
|
|
CVE-2023-49438 - https://github.com/brandon-t-elliott/CVE-2023-49438
|
|
CVE-2023-49446 - https://github.com/ysuzhangbin/cms/blob/main/There%20is%20a%20CSRF%20in%20the%20newly%20added%20navigation%20management%20area.md
|
|
CVE-2023-49447 - https://github.com/ysuzhangbin/cms/blob/main/CSRF%20exists%20at%20the%20navigation%20management%20modification%20location.md
|
|
CVE-2023-49448 - https://github.com/ysuzhangbin/cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20navigation%20management.md
|
|
CVE-2023-49460 - https://github.com/strukturag/libheif/issues/1046
|
|
CVE-2023-49462 - https://github.com/strukturag/libheif/issues/1043
|
|
CVE-2023-49463 - https://github.com/strukturag/libheif/issues/1042
|
|
CVE-2023-49464 - https://github.com/strukturag/libheif/issues/1044
|
|
CVE-2023-49465 - https://github.com/strukturag/libde265/issues/435
|
|
CVE-2023-49467 - https://github.com/strukturag/libde265/issues/434
|
|
CVE-2023-49468 - https://github.com/strukturag/libde265/issues/432
|
|
CVE-2023-49471 - https://github.com/zunak/CVE-2023-49471
|
|
CVE-2023-49492 - https://github.com/Hebing123/cve/issues/2
|
|
CVE-2023-49493 - https://github.com/Hebing123/cve/issues/2
|
|
CVE-2023-49494 - https://github.com/Hebing123/cve/issues/3
|
|
CVE-2023-49544 - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion
|
|
CVE-2023-49549 - https://github.com/cesanta/mjs/issues/251
|
|
CVE-2023-49551 - https://github.com/cesanta/mjs/issues/257
|
|
CVE-2023-49553 - https://github.com/cesanta/mjs/issues/253
|
|
CVE-2023-49554 - https://github.com/yasm/yasm/issues/249
|
|
CVE-2023-49555 - https://github.com/yasm/yasm/issues/248
|
|
CVE-2023-49556 - https://github.com/yasm/yasm/issues/250
|
|
CVE-2023-49557 - https://github.com/yasm/yasm/issues/253
|
|
CVE-2023-49558 - https://github.com/yasm/yasm/issues/252
|
|
CVE-2023-49563 - https://gist.github.com/ph4nt0mbyt3/b237bfb06b2bff405ab47e4ea52c0bd2
|
|
CVE-2023-4965 - https://github.com/ctflearner/Vulnerability/blob/main/PHPIPAM/Open_Redirect.md
|
|
CVE-2023-4966 - http://packetstormsecurity.com/files/175323/Citrix-Bleed-Session-Token-Leakage-Proof-Of-Concept.html
|
|
CVE-2023-4969 - https://blog.trailofbits.com
|
|
CVE-2023-4969 - https://kb.cert.org/vuls/id/446598
|
|
CVE-2023-4969 - https://www.kb.cert.org/vuls/id/446598
|
|
CVE-2023-49693 - https://kb.netgear.com/000065886/Security-Advisory-for-Sensitive-Information-Disclosure-on-the-NMS300-PSV-2023-0126
|
|
CVE-2023-49693 - https://www.tenable.com/security/research/tra-2023-39
|
|
CVE-2023-49694 - https://www.tenable.com/security/research/tra-2023-39
|
|
CVE-2023-49721 - https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137
|
|
CVE-2023-49721 - https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139
|
|
CVE-2023-49721 - https://www.openwall.com/lists/oss-security/2024/02/14/4
|
|
CVE-2023-4973 - http://packetstormsecurity.com/files/174680/Academy-LMS-6.2-Cross-Site-Scripting.html
|
|
CVE-2023-4974 - http://packetstormsecurity.com/files/174681/Academy-LMS-6.2-SQL-Injection.html
|
|
CVE-2023-4977 - https://huntr.dev/bounties/3db8a1a4-ca2d-45df-be18-a959ebf82fbc
|
|
CVE-2023-4978 - https://huntr.dev/bounties/cefd9295-2053-4e6e-a130-7e1f845728f4
|
|
CVE-2023-49786 - http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html
|
|
CVE-2023-49786 - http://seclists.org/fulldisclosure/2023/Dec/24
|
|
CVE-2023-4979 - https://huntr.dev/bounties/e67f8f5d-4048-404f-9b86-cb6b8719b77f
|
|
CVE-2023-49799 - https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-3wfp-253j-5jxv
|
|
CVE-2023-4980 - https://huntr.dev/bounties/470b9b13-b7fe-4b3f-a186-fdc5dc193976
|
|
CVE-2023-49800 - https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-q6hx-3m4p-749h
|
|
CVE-2023-49804 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-88j4-pcx8-q4q3
|
|
CVE-2023-49804 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-g9v2-wqcj-j99g
|
|
CVE-2023-49805 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-mj22-23ff-2hrr
|
|
CVE-2023-4981 - https://huntr.dev/bounties/1f014494-49a9-4bf0-8d43-a675498b9609
|
|
CVE-2023-49810 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1898
|
|
CVE-2023-4982 - https://huntr.dev/bounties/d3c2dd8a-883c-400e-a1a7-326c3fd37b9e
|
|
CVE-2023-4987 - http://packetstormsecurity.com/files/174760/Taskhub-2.8.7-SQL-Injection.html
|
|
CVE-2023-49923 - https://www.elastic.co/community/security
|
|
CVE-2023-49950 - https://github.com/shrikeinfosec/cve-2023-49950/blob/main/cve-2023-49950.md
|
|
CVE-2023-49964 - https://github.com/mbadanoiu/CVE-2023-49964
|
|
CVE-2023-49967 - https://github.com/typecho/typecho/issues/1648
|
|
CVE-2023-49991 - https://github.com/espeak-ng/espeak-ng/issues/1825
|
|
CVE-2023-49992 - https://github.com/espeak-ng/espeak-ng/issues/1827
|
|
CVE-2023-49993 - https://github.com/espeak-ng/espeak-ng/issues/1826
|
|
CVE-2023-49994 - https://github.com/espeak-ng/espeak-ng/issues/1823
|
|
CVE-2023-49999 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setUmountUSBPartition/w30e_setUmountUSBPartition.md
|
|
CVE-2023-50000 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_resetMesh/w30e_resetMesh.md
|
|
CVE-2023-50001 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_upgradeMeshOnline/w30e_upgradeMeshOnline.md
|
|
CVE-2023-50002 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_rebootMesh/w30e_rebootMesh.md
|
|
CVE-2023-50011 - https://packetstormsecurity.com/files/175924/PopojiCMS-2.0.1-Remote-Command-Execution.html
|
|
CVE-2023-50017 - https://github.com/849200701/cms/blob/main/CSRF%20exists%20in%20the%20backup%20and%20restore%20location.md
|
|
CVE-2023-50027 - https://security.friendsofpresta.org/modules/2023/12/19/baproductzoommagnifier.html
|
|
CVE-2023-50030 - https://security.friendsofpresta.org/modules/2024/01/16/jmssetting.html
|
|
CVE-2023-50061 - https://security.friendsofpresta.org/modules/2024/02/08/oparteasyredirect.html
|
|
CVE-2023-50069 - https://github.com/holomekc/wiremock/issues/51
|
|
CVE-2023-50072 - https://github.com/ahrixia/CVE-2023-50072
|
|
CVE-2023-50089 - https://github.com/NoneShell/Vulnerabilities/blob/main/NETGEAR/WNR2000v4-1.0.0.70-Authorized-Command-Injection.md
|
|
CVE-2023-50094 - https://www.mattz.io/posts/cve-2023-50094/
|
|
CVE-2023-50096 - https://github.com/elttam/publications/blob/master/writeups/CVE-2023-50096.md
|
|
CVE-2023-50110 - https://github.com/TestLinkOpenSourceTRMS/testlink-code/pull/357
|
|
CVE-2023-50120 - https://github.com/gpac/gpac/issues/2698
|
|
CVE-2023-50123 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
|
CVE-2023-50124 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
|
CVE-2023-50125 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
|
CVE-2023-50126 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
|
CVE-2023-50127 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
|
CVE-2023-50128 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
|
CVE-2023-50129 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
|
CVE-2023-50164 - http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html
|
|
CVE-2023-50172 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1897
|
|
CVE-2023-5024 - https://youtu.be/evdhcUlD1EQ
|
|
CVE-2023-50245 - https://github.com/afichet/openexr-viewer/security/advisories/GHSA-99jg-r3f4-rpxj
|
|
CVE-2023-50246 - https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc
|
|
CVE-2023-50250 - https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73
|
|
CVE-2023-50251 - https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-ff5x-7qg5-vwf2
|
|
CVE-2023-50252 - https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-jq98-9543-m4cr
|
|
CVE-2023-50253 - https://github.com/labring/laf/security/advisories/GHSA-g9c8-wh35-g75f
|
|
CVE-2023-50254 - https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-q9jr-726g-9495
|
|
CVE-2023-50255 - https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2
|
|
CVE-2023-50257 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-v5r6-8mvh-cp98
|
|
CVE-2023-50258 - https://github.com/pymedusa/Medusa/security/advisories/GHSA-3hph-6586-qv9g
|
|
CVE-2023-50258 - https://securitylab.github.com/advisories/GHSL-2023-201_GHSL-2023-202_Medusa/
|
|
CVE-2023-50259 - https://github.com/pymedusa/Medusa/security/advisories/GHSA-8mcr-vffr-jwxv
|
|
CVE-2023-50259 - https://securitylab.github.com/advisories/GHSL-2023-201_GHSL-2023-202_Medusa/
|
|
CVE-2023-50262 - https://github.com/dompdf/dompdf/security/advisories/GHSA-3qx2-6f78-w2j2
|
|
CVE-2023-50264 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/
|
|
CVE-2023-50265 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/
|
|
CVE-2023-50266 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/
|
|
CVE-2023-5027 - https://vuldb.com/?id.239869
|
|
CVE-2023-5028 - https://vuldb.com/?id.239870
|
|
CVE-2023-5033 - https://vuldb.com/?id.239877
|
|
CVE-2023-50358 - https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941-1032
|
|
CVE-2023-5036 - https://huntr.dev/bounties/46881df7-eb41-4ce2-a78f-82de9bc4fc2d
|
|
CVE-2023-5041 - https://wpscan.com/vulnerability/45194442-6eea-4e07-85a5-4a1e2fde3523
|
|
CVE-2023-50429 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-mc3w-rv8p-f9xf
|
|
CVE-2023-50445 - http://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html
|
|
CVE-2023-50446 - https://github.com/mullvad/mullvadvpn-app/pull/5398
|
|
CVE-2023-50447 - https://duartecsantos.github.io/2023-01-02-CVE-2023-50447/
|
|
CVE-2023-50449 - https://gitee.com/heyewei/JFinalcms/issues/I7WGC6
|
|
CVE-2023-50465 - https://github.com/Crypt0Cr33py/monicahqvuln
|
|
CVE-2023-50470 - https://blog.csdn.net/weixin_72610998/article/details/134784075?spm=1001.2014.3001.5502
|
|
CVE-2023-50471 - https://github.com/DaveGamble/cJSON/issues/802
|
|
CVE-2023-50472 - https://github.com/DaveGamble/cJSON/issues/803
|
|
CVE-2023-50488 - https://github.com/roman-mueller/PoC/tree/master/CVE-2023-50488
|
|
CVE-2023-50488 - https://infosec.rm-it.de/2024/02/01/blurams-lumi-security-camera-analysis/
|
|
CVE-2023-50495 - https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
|
|
CVE-2023-50559 - https://github.com/OpenXiangShan/XiangShan/issues/2534
|
|
CVE-2023-50569 - https://gist.github.com/ISHGARD-2/a6b57de899f977e2af41780e7428b4bf
|
|
CVE-2023-50569 - https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73
|
|
CVE-2023-50585 - https://github.com/LaPhilosophie/IoT-vulnerable/blob/main/Tenda/A18/formSetDeviceName.md
|
|
CVE-2023-50589 - https://github.com/VauP/CVE-IDs/blob/main/proof_of_concept.md
|
|
CVE-2023-5060 - https://huntr.dev/bounties/01b0917d-f92f-4903-9eca-bcfc46e847e3
|
|
CVE-2023-50612 - https://github.com/yaowenxiao721/CloudExplorer-Lite-v1.4.1-vulnerability-BOPLA
|
|
CVE-2023-50628 - https://github.com/libming/libming/issues/289
|
|
CVE-2023-50630 - https://github.com/xiweicheng/tms/issues/19
|
|
CVE-2023-50693 - https://github.com/dom96/jester/issues/326
|
|
CVE-2023-50694 - https://github.com/dom96/httpbeast/issues/95
|
|
CVE-2023-50715 - https://github.com/home-assistant/core/security/advisories/GHSA-jqpc-rc7g-vf83
|
|
CVE-2023-5072 - https://github.com/stleary/JSON-java/issues/758
|
|
CVE-2023-50720 - https://jira.xwiki.org/browse/XWIKI-20371
|
|
CVE-2023-50731 - https://securitylab.github.com/advisories/GHSL-2023-182_GHSL-2023-184_mindsdb_mindsdb/
|
|
CVE-2023-5074 - https://www.tenable.com/security/research/tra-2023-32
|
|
CVE-2023-5075 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-5078 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
|
CVE-2023-5084 - https://huntr.dev/bounties/f3340570-6e59-4c72-a7d1-d4b829b4fb45
|
|
CVE-2023-50916 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/
|
|
CVE-2023-50916 - https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-001_kyocera-v2.txt
|
|
CVE-2023-50917 - http://packetstormsecurity.com/files/176273/MajorDoMo-Remote-Code-Execution.html
|
|
CVE-2023-50917 - http://packetstormsecurity.com/files/176669/MajorDoMo-Command-Injection.html
|
|
CVE-2023-50919 - http://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html
|
|
CVE-2023-50965 - https://github.com/starnight/MicroHttpServer/issues/5
|
|
CVE-2023-50980 - https://github.com/weidai11/cryptopp/issues/1248
|
|
CVE-2023-50982 - https://rehmeinfosec.de/labor/cve-2023-50982
|
|
CVE-2023-51010 - https://github.com/firmianay/security-issues/tree/main/app/com.sdjictec.qdmetro
|
|
CVE-2023-51011 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanPriDns/
|
|
CVE-2023-51012 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanGateway/
|
|
CVE-2023-51013 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanNetmask/
|
|
CVE-2023-51014 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig_lanSecDns/
|
|
CVE-2023-51015 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setDmzCfg/
|
|
CVE-2023-51016 - https://815yang.github.io/2023/12/10/EX1800T/TOTOlink%20EX1800T_V9.1.0cu.2112_B20220316(setRebootScheCfg)/
|
|
CVE-2023-51017 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanIp/
|
|
CVE-2023-51018 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setWiFiApConfig-opmode/
|
|
CVE-2023-51019 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-key5g/
|
|
CVE-2023-51020 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setLanguageCfg-langType/
|
|
CVE-2023-51021 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setRptWizardCfg-merge/
|
|
CVE-2023-51022 - https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setLanguageCfg-langFlag/
|
|
CVE-2023-51023 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031NTPSyncWithHost-host_time/
|
|
CVE-2023-51024 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setNtpCfg-tz/
|
|
CVE-2023-51025 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setPasswordCfg-admuser/
|
|
CVE-2023-51026 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setRebootScheCfg-hour/
|
|
CVE-2023-51027 - https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-apcliAuthMode/
|
|
CVE-2023-51028 - https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-apcliChannel/
|
|
CVE-2023-51033 - https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_setOpModeCfg/
|
|
CVE-2023-51034 - https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_UploadFirmwareFile/
|
|
CVE-2023-51035 - https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_NTPSyncWithHost/
|
|
CVE-2023-5104 - https://huntr.dev/bounties/1b5c6d9f-941e-4dd7-a964-42b53d6826b0
|
|
CVE-2023-51042 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12
|
|
CVE-2023-51063 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51063.md
|
|
CVE-2023-51066 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51066.md
|
|
CVE-2023-51068 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51068.md
|
|
CVE-2023-51070 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51070.md
|
|
CVE-2023-51074 - https://github.com/json-path/JsonPath/issues/973
|
|
CVE-2023-51075 - https://github.com/dromara/hutool/issues/3421
|
|
CVE-2023-51079 - https://github.com/mvel/mvel/issues/348
|
|
CVE-2023-51079 - https://github.com/mvel/mvel/issues/348#issuecomment-1874047271
|
|
CVE-2023-51084 - https://github.com/PoppingSnack/VulReport/issues/12
|
|
CVE-2023-51091 - https://github.com/GD008/TENDA/blob/main/M3/cookie/M3_cookie.md
|
|
CVE-2023-51093 - https://github.com/GD008/TENDA/blob/main/M3/setVlanInfo/M3_setVlanInfo.md
|
|
CVE-2023-51094 - https://github.com/GD008/TENDA/blob/main/M3/telnet/M3_telnet.md
|
|
CVE-2023-51095 - https://github.com/GD008/TENDA/blob/main/M3/delWlPolicyData/M3_delWlPolicyData.md
|
|
CVE-2023-51097 - https://github.com/GD008/TENDA/blob/main/W9/W9_setAutoPing/W9_setAutoPing.md
|
|
CVE-2023-51098 - https://github.com/GD008/TENDA/blob/main/W9/W9_setDiagnoseInfo/W9_setDiagnoseInfo.md
|
|
CVE-2023-51102 - https://github.com/GD008/TENDA/blob/main/W9/W9_WifiMacFilterSet/W9_WifiMacFilterSet.md
|
|
CVE-2023-51123 - https://github.com/WhereisRain/dir-815
|
|
CVE-2023-51123 - https://github.com/WhereisRain/dir-815/blob/main/README.md
|
|
CVE-2023-51210 - https://medium.com/@nasir.synack/uncovering-critical-vulnerability-cve-2023-51210-in-prestashop-plugin-bundle-product-pack-ad7fb08bdc91
|
|
CVE-2023-51252 - https://github.com/sanluan/PublicCMS/issues/79
|
|
CVE-2023-51257 - https://github.com/jasper-software/jasper/issues/367
|
|
CVE-2023-51277 - https://www.youtube.com/watch?v=c0nawqA_bdI
|
|
CVE-2023-51385 - https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html
|
|
CVE-2023-5139 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
|
CVE-2023-5139 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rhrc-pcxp-4453
|
|
CVE-2023-5142 - https://vuldb.com/?id.240238
|
|
CVE-2023-51442 - https://github.com/navidrome/navidrome/security/advisories/GHSA-wq59-4q6r-635r
|
|
CVE-2023-51443 - http://packetstormsecurity.com/files/176393/FreeSWITCH-Denial-Of-Service.html
|
|
CVE-2023-5152 - https://github.com/llixixi/cve/blob/main/D-LINK-DAR-8000-10_sql_%20importexport.md
|
|
CVE-2023-5153 - https://vuldb.com/?id.240249
|
|
CVE-2023-51661 - https://github.com/wasmerio/wasmer/security/advisories/GHSA-4mq4-7rw3-vm5j
|
|
CVE-2023-51664 - https://github.com/tj-actions/changed-files/security/advisories/GHSA-mcph-m25j-8j63
|
|
CVE-2023-5167 - https://wpscan.com/vulnerability/78ea6fe0-5fac-4923-949c-023c85fe2437
|
|
CVE-2023-51717 - https://dataiku.com
|
|
CVE-2023-5173 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823172
|
|
CVE-2023-5174 - https://bugzilla.mozilla.org/show_bug.cgi?id=1848454
|
|
CVE-2023-51747 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
|
|
CVE-2023-5175 - https://bugzilla.mozilla.org/show_bug.cgi?id=1849704
|
|
CVE-2023-51764 - https://github.com/duy-31/CVE-2023-51764
|
|
CVE-2023-51764 - https://github.com/eeenvik1/CVE-2023-51764
|
|
CVE-2023-51764 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
|
|
CVE-2023-51765 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
|
|
CVE-2023-51766 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
|
|
CVE-2023-51771 - https://github.com/starnight/MicroHttpServer/issues/8
|
|
CVE-2023-51772 - https://sec-consult.com/vulnerability-lab/advisory/kiosk-escape-privilege-escalation-one-identity-password-manager-secure-password-extension/
|
|
CVE-2023-51775 - https://bitbucket.org/b_c/jose4j/issues/212
|
|
CVE-2023-51806 - https://github.com/ujcms/ujcms/issues/8
|
|
CVE-2023-51820 - https://infosec.rm-it.de/2024/02/01/blurams-lumi-security-camera-analysis/
|
|
CVE-2023-51828 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html
|
|
CVE-2023-5184 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
|
CVE-2023-5184 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8x3p-q3r5-xh9g
|
|
CVE-2023-5192 - https://huntr.dev/bounties/65c954f2-79c3-4672-8846-a3035e7a1db7
|
|
CVE-2023-51939 - https://github.com/liang-junkai/Relic-bbs-fault-injection
|
|
CVE-2023-51939 - https://github.com/relic-toolkit/relic/issues/284
|
|
CVE-2023-51949 - https://github.com/cui2shark/security/blob/main/Added%20CSRF%20in%20Role%20Controller.md
|
|
CVE-2023-51951 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2023-004
|
|
CVE-2023-5197 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
|
CVE-2023-5198 - https://gitlab.com/gitlab-org/gitlab/-/issues/416957
|
|
CVE-2023-51987 - https://github.com/funny-mud-peee/IoT-vuls/tree/main/dir822%2B/2
|
|
CVE-2023-51989 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/dir822+/2/readme.md
|
|
CVE-2023-52026 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setTelnetCfg/
|
|
CVE-2023-52027 - https://815yang.github.io/2023/12/23/a3700r/TOTOLINKA3700R_NTPSyncWithHost/
|
|
CVE-2023-52028 - https://815yang.github.io/2023/12/04/a3700r/TOTOlink%20A3700R_setTracerouteCfg/
|
|
CVE-2023-5203 - https://wpscan.com/vulnerability/7f4f505b-2667-4e0f-9841-9c1cd0831932
|
|
CVE-2023-52031 - https://815yang.github.io/2023/12/04/a3700r/TOTOlink%20A3700R_UploadFirmwareFile/
|
|
CVE-2023-52032 - https://815yang.github.io/2023/12/24/cve6/EX1200T_V4.1.2cu.5232_B20210713_downloadFlile/
|
|
CVE-2023-5204 - http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html
|
|
CVE-2023-52041 - https://kee02p.github.io/2024/01/13/CVE-2023-52041/
|
|
CVE-2023-52042 - https://kee02p.github.io/2024/01/13/CVE-2023-52042/
|
|
CVE-2023-52047 - https://github.com/chongfujun/test/blob/main/2023-52047.docx
|
|
CVE-2023-52059 - https://github.com/Tanguy-Boisset/CVE/blob/master/CVE-2023-52059/README.md
|
|
CVE-2023-52060 - https://github.com/Tanguy-Boisset/CVE/blob/master/CVE-2023-52060/README.md
|
|
CVE-2023-52064 - https://github.com/wuzhicms/wuzhicms/issues/208
|
|
CVE-2023-52072 - https://github.com/zouyang0714/cms/blob/main/2.md
|
|
CVE-2023-52073 - https://github.com/zouyang0714/cms/blob/main/3.md
|
|
CVE-2023-52074 - https://github.com/zouyang0714/cms/blob/main/1.md
|
|
CVE-2023-52075 - https://github.com/ReVanced/revanced-api/security/advisories/GHSA-852x-grxp-8p3q
|
|
CVE-2023-52076 - https://github.com/mate-desktop/atril/security/advisories/GHSA-6mf6-mxpc-jc37
|
|
CVE-2023-5212 - http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html
|
|
CVE-2023-52137 - https://github.com/tj-actions/verify-changed-files/security/advisories/GHSA-ghm2-rq8q-wrhc
|
|
CVE-2023-52138 - https://github.com/mate-desktop/engrampa/security/advisories/GHSA-c98h-v39w-3r7v
|
|
CVE-2023-52139 - https://github.com/misskey-dev/misskey/security/advisories/GHSA-7pxq-6xx9-xpgm
|
|
CVE-2023-52153 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html
|
|
CVE-2023-52154 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html
|
|
CVE-2023-52155 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html
|
|
CVE-2023-5221 - https://vuldb.com/?id.240363
|
|
CVE-2023-5222 - https://github.com/Push3AX/vul/blob/main/viessmann/Vitogate300_HardcodedPassword.md
|
|
CVE-2023-52240 - https://kantega-sso.atlassian.net/wiki/spaces/KSE/pages/1226473473/Security+Vulnerability+HTML+injection+Cross-site+scripting+in+SAML+POST+binding+Kantega+SSO+Enterprise
|
|
CVE-2023-52251 - http://packetstormsecurity.com/files/177214/Kafka-UI-0.7.1-Command-Injection.html
|
|
CVE-2023-52251 - https://github.com/BobTheShoplifter/CVE-2023-52251-POC
|
|
CVE-2023-52252 - https://harkenzo.tlstickle.com/2023-03-17-UR-Web-Triggerable-RCE/
|
|
CVE-2023-52252 - https://www.exploit-db.com/exploits/51309
|
|
CVE-2023-52257 - https://packetstormsecurity.com/files/174815
|
|
CVE-2023-52265 - https://github.com/wbowm15/jubilant-enigma/blob/main/writeup.md
|
|
CVE-2023-52266 - https://github.com/hongliuliao/ehttp/commit/17405b975948abc216f6a085d2d027ec1cfd5766
|
|
CVE-2023-52266 - https://github.com/hongliuliao/ehttp/issues/38
|
|
CVE-2023-52267 - https://github.com/hongliuliao/ehttp/commit/17405b975948abc216f6a085d2d027ec1cfd5766
|
|
CVE-2023-52267 - https://github.com/hongliuliao/ehttp/issues/38
|
|
CVE-2023-52269 - https://github.com/vipercalling/XSSsecurityGateway/blob/main/finding
|
|
CVE-2023-5227 - https://huntr.dev/bounties/a335c013-db75-4120-872c-42059c7100e8
|
|
CVE-2023-52277 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5788.php
|
|
CVE-2023-52302 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-011.md
|
|
CVE-2023-52303 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-012.md
|
|
CVE-2023-52304 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-013.md
|
|
CVE-2023-52305 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-014.md
|
|
CVE-2023-52306 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-015.md
|
|
CVE-2023-52307 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-016.md
|
|
CVE-2023-52308 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-017.md
|
|
CVE-2023-52309 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-018.md
|
|
CVE-2023-52310 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-019.md
|
|
CVE-2023-52311 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-020.md
|
|
CVE-2023-52312 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-021.md
|
|
CVE-2023-52313 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-022.md
|
|
CVE-2023-52314 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-023.md
|
|
CVE-2023-52339 - https://github.com/Matroska-Org/libebml/issues/147
|
|
CVE-2023-52355 - https://gitlab.com/libtiff/libtiff/-/issues/621
|
|
CVE-2023-52356 - https://gitlab.com/libtiff/libtiff/-/issues/622
|
|
CVE-2023-5237 - https://research.cleantalk.org/cve-2023-5237-memberlite-shortcodes-stored-xss-via-shortcode
|
|
CVE-2023-5241 - http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html
|
|
CVE-2023-52430 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
|
CVE-2023-5244 - https://huntr.dev/bounties/a3bd58ba-ca59-4cba-85d1-799f73a76470
|
|
CVE-2023-5245 - https://github.com/combust/mleap/pull/866#issuecomment-1738032225
|
|
CVE-2023-5245 - https://research.jfrog.com/vulnerabilities/mleap-path-traversal-rce-xray-532656/
|
|
CVE-2023-52555 - https://github.com/mongo-express/mongo-express/issues/1338
|
|
CVE-2023-5259 - https://github.com/RCEraser/cve/blob/main/ForU-CMS.md
|
|
CVE-2023-5264 - https://github.com/yhy217/huakecms-vul/issues/1
|
|
CVE-2023-5284 - https://vuldb.com/?id.240912
|
|
CVE-2023-5286 - https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App
|
|
CVE-2023-5287 - https://vuldb.com/?id.240915
|
|
CVE-2023-5289 - https://huntr.dev/bounties/8d0e0804-d3fd-49fe-bfa4-7a91135767ce
|
|
CVE-2023-5297 - https://vuldb.com/?id.240927
|
|
CVE-2023-5302 - https://github.com/rohit0x5/poc/blob/main/cve_2
|
|
CVE-2023-5307 - https://research.cleantalk.org/cve-2023-5307-photos-and-files-contest-gallery-contact-form-21-2-8-1-unauthenticated-stored-xss-via-http-headers
|
|
CVE-2023-5311 - https://giongfnef.gitbook.io/giongfnef/cve/cve-2023-5311
|
|
CVE-2023-5313 - https://github.com/tht1997/WhiteBox/blob/main/PHPKOBO/ajax_pool_script.md
|
|
CVE-2023-5316 - https://huntr.dev/bounties/f877e65a-e647-457b-b105-7e5c9f58fb43
|
|
CVE-2023-5317 - https://huntr.dev/bounties/5e146e7c-60c7-498b-9ffe-fd4cb4ca8c54
|
|
CVE-2023-5318 - https://huntr.dev/bounties/17826bdd-8136-48ae-afb9-af627cb6fd5d
|
|
CVE-2023-5319 - https://huntr.dev/bounties/e2542cbe-41ab-4a90-b6a4-191884c1834d
|
|
CVE-2023-5320 - https://huntr.dev/bounties/3a2bc18b-5932-4fb5-a01e-24b2b0443b67
|
|
CVE-2023-5321 - https://huntr.dev/bounties/b1becc68-e738-458f-bd99-06ee77580d3a
|
|
CVE-2023-5322 - https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5:sysmanage:edit_manageadmin.php.md
|
|
CVE-2023-5323 - https://huntr.dev/bounties/7a048bb7-bfdd-4299-931e-9bc283e92bc8
|
|
CVE-2023-5341 - https://github.com/ImageMagick/ImageMagick/commit/aa673b2e4defc7cad5bec16c4fc8324f71e531f1
|
|
CVE-2023-5344 - https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04
|
|
CVE-2023-5344 - https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf
|
|
CVE-2023-5345 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
|
|
CVE-2023-5347 - http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html
|
|
CVE-2023-5347 - http://seclists.org/fulldisclosure/2024/Jan/11
|
|
CVE-2023-5347 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/
|
|
CVE-2023-5350 - https://huntr.dev/bounties/c56563cb-b74e-4174-a09a-cd07689d6736
|
|
CVE-2023-5351 - https://huntr.dev/bounties/f7c7fcbc-5421-4a29-9385-346a1caa485b
|
|
CVE-2023-5353 - https://huntr.dev/bounties/3b3bb4f1-1aea-4134-99eb-157f245fa752
|
|
CVE-2023-5360 - http://packetstormsecurity.com/files/175992/WordPress-Royal-Elementor-Addons-And-Templates-Remote-Shell-Upload.html
|
|
CVE-2023-5375 - https://huntr.dev/bounties/3fa2abde-cb58-45a3-a115-1727ece9acb9
|
|
CVE-2023-5376 - http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html
|
|
CVE-2023-5376 - http://seclists.org/fulldisclosure/2024/Jan/11
|
|
CVE-2023-5376 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/
|
|
CVE-2023-5377 - https://huntr.dev/bounties/fe778df4-3867-41d6-954b-211c81bccbbf
|
|
CVE-2023-5389 - https://www.honeywell.com/us/en/product-security
|
|
CVE-2023-5390 - https://www.honeywell.com/us/en/product-security
|
|
CVE-2023-5427 - http://packetstormsecurity.com/files/176029/ARM-Mali-r44p0-Use-After-Free.html
|
|
CVE-2023-5441 - https://huntr.dev/bounties/b54cbdf5-3e85-458d-bb38-9ea2c0b669f2
|
|
CVE-2023-5448 - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca564941-4780-4da2-b937-c9bd45966d81?source=cve
|
|
CVE-2023-5452 - https://huntr.dev/bounties/d6ed5ac1-2ad6-45fd-9492-979820bf60c8
|
|
CVE-2023-5463 - https://drive.google.com/drive/folders/1mpRxWOPjxVS980r0qu1IY_Hf0irKO-cu
|
|
CVE-2023-5471 - https://vuldb.com/?id.241608
|
|
CVE-2023-5488 - https://vuldb.com/?id.241640
|
|
CVE-2023-5492 - https://vuldb.com/?id.241644
|
|
CVE-2023-5495 - http://packetstormsecurity.com/files/175071/Smart-School-6.4.1-SQL-Injection.html
|
|
CVE-2023-5496 - https://vuldb.com/?id.241649
|
|
CVE-2023-5498 - https://huntr.dev/bounties/ec367b1d-5ec4-4ab2-881a-caf82e4877d9
|
|
CVE-2023-5511 - https://huntr.dev/bounties/43206801-9862-48da-b379-e55e341d78bf
|
|
CVE-2023-5512 - https://gitlab.com/gitlab-org/gitlab/-/issues/427827
|
|
CVE-2023-5520 - https://huntr.dev/bounties/681e42d0-18d4-4ebc-aba0-c5b0f77ac74a
|
|
CVE-2023-5521 - https://huntr.dev/bounties/d438eff7-4e24-45e0-bc75-d3a5b3ab2ea1
|
|
CVE-2023-5535 - https://github.com/vim/vim/commit/41e6f7d6ba67b61d911f9b1d76325cd79224753d
|
|
CVE-2023-5535 - https://huntr.dev/bounties/2c2d85a7-1171-4014-bf7f-a2451745861f
|
|
CVE-2023-5536 - https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1829071
|
|
CVE-2023-5538 - https://github.com/juweihuitao/MpOperationLogs/
|
|
CVE-2023-5555 - https://huntr.dev/bounties/f6d688ee-b049-4f85-ac3e-f4d3e29e7b9f
|
|
CVE-2023-5556 - https://huntr.dev/bounties/a3ee0f98-6898-41ae-b1bd-242a03a73d1b
|
|
CVE-2023-5563 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-98mc-rj7w-7rpv
|
|
CVE-2023-5564 - https://huntr.dev/bounties/9254d8f3-a847-4ae8-8477-d2ce027cff5c
|
|
CVE-2023-5571 - https://huntr.dev/bounties/926ca25f-dd4a-40cf-8e6b-9d7b5938e95a
|
|
CVE-2023-5572 - https://huntr.dev/bounties/db649f1b-8578-4ef0-8df3-d320ab33f1be
|
|
CVE-2023-5573 - https://huntr.dev/bounties/46a2bb2c-712a-4008-a147-b862e3af7d72
|
|
CVE-2023-5586 - https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740
|
|
CVE-2023-5590 - https://huntr.dev/bounties/e268cd68-4f34-49bd-878b-82b96dcc0c99
|
|
CVE-2023-5591 - https://huntr.dev/bounties/54813d42-5b93-440e-b9b1-c179d2cbf090
|
|
CVE-2023-5595 - https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e
|
|
CVE-2023-5607 - https://kcm.trellix.com/corporate/index?page=content&id=SB10411
|
|
CVE-2023-5618 - https://www.wordfence.com/threat-intel/vulnerabilities/id/c20c674f-54b5-470f-b470-07a63501eb4d?source=cve
|
|
CVE-2023-5626 - https://huntr.dev/bounties/c99279c1-709a-4e7b-a042-010c2bb44d6b
|
|
CVE-2023-5640 - https://devl00p.github.io/posts/Injection-SQL-dans-le-plugin-Wordpress-Article-Analytics/
|
|
CVE-2023-5642 - https://tenable.com/security/research/tra-2023-33
|
|
CVE-2023-5654 - https://gist.github.com/CalumHutton/1fb89b64409570a43f89d1fd3274b231
|
|
CVE-2023-5674 - https://wpscan.com/vulnerability/32a23d0d-7ece-4870-a99d-f3f344be2d67
|
|
CVE-2023-5681 - https://github.com/Wsecpro/cve1/blob/main/NS-ASG-sql-list_addr_fwresource_ip.md
|
|
CVE-2023-5684 - https://github.com/Chef003/cve/blob/main/rce.md
|
|
CVE-2023-5686 - https://huntr.com/bounties/bbfe1f76-8fa1-4a8c-909d-65b16e970be0
|
|
CVE-2023-5687 - https://huntr.com/bounties/33f95510-cdee-460e-8e61-107874962f2d
|
|
CVE-2023-5688 - https://huntr.com/bounties/0ceb10e4-952b-4ca4-baf8-5b6f12e3a8a7
|
|
CVE-2023-5689 - https://huntr.com/bounties/24835833-3421-412b-bafb-1b7ea3cf60e6
|
|
CVE-2023-5690 - https://huntr.com/bounties/980c75a5-d978-4b0e-9bcc-2b2682c97e01
|
|
CVE-2023-5708 - https://www.wordfence.com/threat-intel/vulnerabilities/id/d96e5986-8c89-4e7e-aa63-f41aa13eeff4?source=cve
|
|
CVE-2023-5718 - https://gist.github.com/CalumHutton/bdb97077a66021ed455f87823cd7c7cb
|
|
CVE-2023-5732 - https://bugzilla.mozilla.org/show_bug.cgi?id=1690979
|
|
CVE-2023-5753 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
|
CVE-2023-5753 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hmpr-px56-rvww
|
|
CVE-2023-5754 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
|
|
CVE-2023-5760 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
|
CVE-2023-5762 - https://wpscan.com/vulnerability/6ad99725-eccc-4b61-bce2-668b62619deb
|
|
CVE-2023-5772 - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e539549-1125-4b0e-aa3c-c8844041c23a?source=cve
|
|
CVE-2023-5774 - https://drive.google.com/file/d/1zXWW545ktCznO36k90AN0APhTz8ky-gG/view?usp=sharing
|
|
CVE-2023-5774 - https://www.wordfence.com/threat-intel/vulnerabilities/id/33c2756d-c300-479f-b3aa-8f22c3a70278?source=cve
|
|
CVE-2023-5784 - https://github.com/gb111d/ns-asg_poc/
|
|
CVE-2023-5784 - https://vuldb.com/?id.243590
|
|
CVE-2023-5785 - https://github.com/ggg48966/cve/blob/main/NS-ASG-sql-addaddress_interpret.md
|
|
CVE-2023-5796 - https://vuldb.com/?id.243602
|
|
CVE-2023-5817 - https://drive.google.com/file/d/125xS3GVMr7_qo5HjWvXaXixuE_R-q_u3/view?usp=sharing
|
|
CVE-2023-5826 - https://github.com/Cubi123123123/cve/blob/main/NS-ASG-sql-list_onlineuser.md
|
|
CVE-2023-5826 - https://vuldb.com/?id.243716
|
|
CVE-2023-5832 - https://huntr.com/bounties/afee3726-571f-416e-bba5-0828c815f5df
|
|
CVE-2023-5838 - https://huntr.com/bounties/8f6feca3-386d-4897-801c-39b9e3e5eb03
|
|
CVE-2023-5839 - https://huntr.com/bounties/21125f12-64a0-42a3-b218-26b9945a5bc0
|
|
CVE-2023-5840 - https://huntr.com/bounties/8042d8c3-650e-4c0d-9146-d9ccf6082b30
|
|
CVE-2023-5841 - https://takeonme.org/cves/CVE-2023-5841.html
|
|
CVE-2023-5842 - https://huntr.com/bounties/aed81114-5952-46f5-ae3a-e66518e98ba3
|
|
CVE-2023-5844 - https://huntr.com/bounties/b031199d-192a-46e5-8c02-f7284ad74021
|
|
CVE-2023-5846 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-04
|
|
CVE-2023-5847 - https://www.tenable.com/security/tns-2023-37
|
|
CVE-2023-5861 - https://huntr.com/bounties/7baecef8-6c59-42fc-bced-886c4929e220
|
|
CVE-2023-5862 - https://huntr.com/bounties/0e517db6-d8ba-4cb9-9339-7991dda52e6d
|
|
CVE-2023-5863 - https://huntr.com/bounties/fbfd4e84-61fb-4063-8f11-15877b8c1f6f
|
|
CVE-2023-5864 - https://huntr.com/bounties/e4b0e8f4-5e06-49d1-832f-5756573623ad
|
|
CVE-2023-5865 - https://huntr.com/bounties/4c4b7395-d9fd-4ca0-98d7-2e20c1249aff
|
|
CVE-2023-5866 - https://huntr.com/bounties/ec44bcba-ae7f-497a-851e-8165ecf56945
|
|
CVE-2023-5873 - https://huntr.com/bounties/701cfc30-22a1-4c4b-9b2f-885c77c290ce
|
|
CVE-2023-5889 - https://huntr.com/bounties/fba2991a-1b8a-4c89-9689-d708526928e1
|
|
CVE-2023-5890 - https://huntr.com/bounties/b60e6e1f-e44d-4b11-acf8-b0548b915686
|
|
CVE-2023-5891 - https://huntr.com/bounties/ce4956e4-9ef5-4e0e-bfb2-481ec5cfb0a5
|
|
CVE-2023-5892 - https://huntr.com/bounties/16719252-d88d-43cc-853a-24ff75a067d8
|
|
CVE-2023-5893 - https://huntr.com/bounties/a965aa16-79ce-4185-8f58-3d3b0d74a71e
|
|
CVE-2023-5894 - https://huntr.com/bounties/aba3ba5b-aa6b-4076-b663-4237b4a0761d
|
|
CVE-2023-5895 - https://huntr.com/bounties/2cc80417-32b2-4024-bbcd-d95a039c11ae
|
|
CVE-2023-5898 - https://huntr.com/bounties/19801d12-b8ad-45e7-86e1-8f0230667c9e
|
|
CVE-2023-5899 - https://huntr.com/bounties/0c7f1981-3bba-4508-a07e-4cb9a2553216
|
|
CVE-2023-5900 - https://huntr.com/bounties/c3f011d4-9f76-4b2b-b3d4-a5e2ecd2e354
|
|
CVE-2023-5901 - https://huntr.com/bounties/8fb9b06b-cadd-469e-862d-5ce026019597
|
|
CVE-2023-5948 - https://huntr.com/bounties/ac1363b5-207b-40d9-aac5-e66d6213f692
|
|
CVE-2023-5995 - https://gitlab.com/gitlab-org/gitlab/-/issues/425361
|
|
CVE-2023-5998 - https://huntr.com/bounties/ea02a231-b688-422b-a881-ef415bcf6113
|
|
CVE-2023-6006 - https://www.papercut.com/kb/Main/CommonSecurityQuestions/
|
|
CVE-2023-6007 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
|
CVE-2023-6008 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
|
CVE-2023-6009 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html
|
|
CVE-2023-6009 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
|
CVE-2023-6013 - https://huntr.com/bounties/9881569f-dc2a-437e-86b0-20d4b70ae7af
|
|
CVE-2023-6014 - https://huntr.com/bounties/3e64df69-ddc2-463e-9809-d07c24dc1de4
|
|
CVE-2023-6015 - https://huntr.com/bounties/43e6fb72-676e-4670-a225-15d6836f65d3
|
|
CVE-2023-6016 - https://huntr.com/bounties/83dd17ec-053e-453c-befb-7d6736bf1836
|
|
CVE-2023-6017 - https://huntr.com/bounties/6a69952f-a1ba-4dee-9d8c-e87f52508b58
|
|
CVE-2023-6019 - https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe
|
|
CVE-2023-6020 - https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6
|
|
CVE-2023-6021 - https://huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8
|
|
CVE-2023-6022 - https://huntr.com/bounties/dab47d99-551c-4355-9ab1-c99cb90235af
|
|
CVE-2023-6023 - https://huntr.com/bounties/644ab868-db6d-4685-ab35-1a897632d2ca
|
|
CVE-2023-6038 - https://huntr.com/bounties/380fce33-fec5-49d9-a101-12c972125d8c
|
|
CVE-2023-6040 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
|
|
CVE-2023-6051 - https://gitlab.com/gitlab-org/gitlab/-/issues/431345
|
|
CVE-2023-6052 - https://vuldb.com/?id.244872
|
|
CVE-2023-6053 - https://vuldb.com/?id.244874
|
|
CVE-2023-6054 - https://vuldb.com/?id.244875
|
|
CVE-2023-6065 - https://drive.google.com/file/d/1w83xWsVLS_gCpQy4LDwbjNK9JaB87EEf/view?usp=sharing
|
|
CVE-2023-6070 - https://kcm.trellix.com/corporate/index?page=content&id=SB10413
|
|
CVE-2023-6071 - https://kcm.trellix.com/corporate/index?page=content&id=SB10413
|
|
CVE-2023-6084 - https://vuldb.com/?id.244994
|
|
CVE-2023-6099 - https://github.com/gatsby2003/Shenzhen-Youkate-Industrial-Co.-Ltd/blob/main/Shenzhen%20Youkate%20Industrial%20Co.%2C%20Ltd.md
|
|
CVE-2023-6099 - https://vuldb.com/?id.245061
|
|
CVE-2023-6103 - https://vuldb.com/?id.245065
|
|
CVE-2023-6105 - https://www.tenable.com/security/research/tra-2023-35
|
|
CVE-2023-6112 - http://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html
|
|
CVE-2023-6113 - https://research.cleantalk.org/cve-2023-6113-wp-staging-unauth-sensitive-data-exposure-to-account-takeover-poc-exploit/
|
|
CVE-2023-6114 - https://drive.google.com/file/d/1mpapFCqfZLv__EAM7uivrrl2h55rpi1V/view?usp=sharing
|
|
CVE-2023-6119 - https://kcm.trellix.com/corporate/index?page=content&id=SB10412
|
|
CVE-2023-6124 - https://huntr.com/bounties/aed4d8f3-ab9a-42fd-afea-b3ec288a148e
|
|
CVE-2023-6125 - https://huntr.com/bounties/a9462f1e-9746-4380-8228-533ff2f64691
|
|
CVE-2023-6127 - https://huntr.com/bounties/bf10c72b-5d2e-4c9a-9bd6-d77bdf31027d
|
|
CVE-2023-6132 - https://www.aveva.com/en/support-and-success/cyber-security-updates/
|
|
CVE-2023-6146 - https://www.qualys.com/security-advisories/
|
|
CVE-2023-6147 - https://www.qualys.com/security-advisories/
|
|
CVE-2023-6148 - https://www.qualys.com/security-advisories/
|
|
CVE-2023-6149 - https://www.qualys.com/security-advisories/
|
|
CVE-2023-6152 - https://github.com/grafana/bugbounty/security/advisories/GHSA-3hv4-r2fm-h27f
|
|
CVE-2023-6176 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
|
|
CVE-2023-6179 - https://www.honeywell.com/us/en/product-security
|
|
CVE-2023-6188 - https://vuldb.com/?id.245735
|
|
CVE-2023-6222 - https://drive.google.com/file/d/1krgHH2NvVFr93VpErLkOjDV3L6M5yIA1/view?usp=sharing
|
|
CVE-2023-6246 - http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html
|
|
CVE-2023-6246 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
|
|
CVE-2023-6246 - http://seclists.org/fulldisclosure/2024/Feb/3
|
|
CVE-2023-6246 - https://www.openwall.com/lists/oss-security/2024/01/30/6
|
|
CVE-2023-6246 - https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
|
|
CVE-2023-6253 - http://packetstormsecurity.com/files/175956/Fortra-Digital-Guardian-Agent-Uninstaller-Cross-Site-Scripting-UninstallKey-Cached.html
|
|
CVE-2023-6253 - http://seclists.org/fulldisclosure/2023/Nov/14
|
|
CVE-2023-6253 - https://r.sec-consult.com/fortra
|
|
CVE-2023-6263 - https://networkoptix.atlassian.net/wiki/spaces/CHS/blog/2023/09/22/3074195467/vulnerability+2023-09-21+-+Server+Spoofing
|
|
CVE-2023-6265 - https://github.com/xxy1126/Vuln/blob/main/Draytek/4.md
|
|
CVE-2023-6269 - http://packetstormsecurity.com/files/176194/Atos-Unify-OpenScape-Authentication-Bypass-Remote-Code-Execution.html
|
|
CVE-2023-6269 - http://seclists.org/fulldisclosure/2023/Dec/16
|
|
CVE-2023-6269 - https://r.sec-consult.com/unifyroot
|
|
CVE-2023-6271 - https://research.cleantalk.org/cve-2023-6271-backup-migration-unauth-sensitive-data-exposure-to-full-control-of-the-site-poc-exploit
|
|
CVE-2023-6274 - https://github.com/Carol7S/cve/blob/main/rce.md
|
|
CVE-2023-6274 - https://vuldb.com/?id.246103
|
|
CVE-2023-6277 - https://gitlab.com/libtiff/libtiff/-/issues/614
|
|
CVE-2023-6292 - https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/
|
|
CVE-2023-6293 - https://huntr.com/bounties/36a7ecbf-4d3d-462e-86a3-cda7b1ec64e2
|
|
CVE-2023-6296 - http://packetstormsecurity.com/files/175925/osCommerce-4-Cross-Site-Scripting.html
|
|
CVE-2023-6297 - https://github.com/dhabaleshwar/niv_testing_rxss/blob/main/exploit.md
|
|
CVE-2023-6298 - https://vuldb.com/?id.246124
|
|
CVE-2023-6301 - https://vuldb.com/?id.246127
|
|
CVE-2023-6306 - https://vuldb.com/?id.246132
|
|
CVE-2023-6308 - https://github.com/gatsby2003/Struts2-046/blob/main/Xiamen%20Four-Faith%20Communication%20Technology%20Co.,%20Ltd.%20video%20surveillance%20management%20system%20has%20a%20command%20execution%20vulnerability.md
|
|
CVE-2023-6309 - https://github.com/moses-smt/mosesdecoder/issues/237
|
|
CVE-2023-6310 - https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20browser.md
|
|
CVE-2023-6311 - https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20deleteltype.md
|
|
CVE-2023-6311 - https://vuldb.com/?id.246137
|
|
CVE-2023-6312 - https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20deleteuser.md
|
|
CVE-2023-6313 - https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/url-shortener.md
|
|
CVE-2023-6329 - https://tenable.com/security/research/tra-2023-36
|
|
CVE-2023-6341 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
|
CVE-2023-6342 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
|
CVE-2023-6343 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
|
CVE-2023-6344 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
|
CVE-2023-6348 - http://packetstormsecurity.com/files/176368/Chrome-BindTextSuggestionHostForFrame-Type-Confusion.html
|
|
CVE-2023-6353 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
|
CVE-2023-6354 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
|
CVE-2023-6360 - https://www.tenable.com/security/research/tra-2023-40
|
|
CVE-2023-6375 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
|
CVE-2023-6376 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
|
CVE-2023-6440 - https://github.com/lscjl/lsi.webray.com.cn/blob/main/CVE-project/Book%20Borrower%20System%20Cross%20site%20scripting.md
|
|
CVE-2023-6461 - https://huntr.com/bounties/9a97d163-1738-4a09-b284-a04716e69dd0
|
|
CVE-2023-6474 - https://github.com/dhabaleshwar/niv_testing_csrf/blob/main/exploit.md
|
|
CVE-2023-6530 - https://research.cleantalk.org/cve-2023-6530-tj-shortcodes-stored-xss-poc/
|
|
CVE-2023-6553 - http://packetstormsecurity.com/files/176638/WordPress-Backup-Migration-1.3.7-Remote-Command-Execution.html
|
|
CVE-2023-6553 - https://www.synacktiv.com/en/publications/php-filters-chain-what-is-it-and-how-to-use-it
|
|
CVE-2023-6560 - http://packetstormsecurity.com/files/176405/io_uring-__io_uaddr_map-Dangerous-Multi-Page-Handling.html
|
|
CVE-2023-6562 - https://github.com/google/security-research/security/advisories/GHSA-g6qc-fhcq-vhf9
|
|
CVE-2023-6566 - https://huntr.com/bounties/cf4b68b5-8d97-4d05-9cde-e76b1a414fd6
|
|
CVE-2023-6568 - https://huntr.com/bounties/816bdaaa-8153-4732-951e-b0d92fddf709
|
|
CVE-2023-6569 - https://huntr.com/bounties/a5d003dc-c23e-4c98-8dcf-35ba9252fa3c
|
|
CVE-2023-6570 - https://huntr.com/bounties/82d6e853-013b-4029-a23f-8b50ec56602a
|
|
CVE-2023-6571 - https://huntr.com/bounties/f02781e7-2a53-4c66-aa32-babb16434632
|
|
CVE-2023-6575 - https://github.com/houhuidong/cve/blob/main/rce.md
|
|
CVE-2023-6579 - http://packetstormsecurity.com/files/176124/osCommerce-4-SQL-Injection.html
|
|
CVE-2023-6592 - https://research.cleantalk.org/cve-2023-6592-fastdup-database-users-password-leak-poc-exploit/
|
|
CVE-2023-6599 - https://huntr.com/bounties/6198785c-bf60-422e-9b80-68a6e658a10e
|
|
CVE-2023-6653 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_add_sub.md
|
|
CVE-2023-6655 - https://github.com/willchen0011/cve/blob/main/HongJing-sql.md
|
|
CVE-2023-6659 - https://github.com/Kidjing/cve/blob/main/sql1.md
|
|
CVE-2023-6730 - https://huntr.com/bounties/423611ee-7a2a-442a-babb-3ed2f8385c16
|
|
CVE-2023-6753 - https://huntr.com/bounties/b397b83a-527a-47e7-b912-a12a17a6cfb4
|
|
CVE-2023-6773 - https://drive.google.com/drive/folders/1yuc1n6tr57wD8qsT0HAFDVAuii7iibDM?usp=sharing
|
|
CVE-2023-6778 - https://huntr.com/bounties/5f3fffac-0358-48e6-a500-81bac13e0e2b
|
|
CVE-2023-6779 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
|
|
CVE-2023-6779 - http://seclists.org/fulldisclosure/2024/Feb/3
|
|
CVE-2023-6779 - https://www.openwall.com/lists/oss-security/2024/01/30/6
|
|
CVE-2023-6779 - https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
|
|
CVE-2023-6780 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
|
|
CVE-2023-6780 - http://seclists.org/fulldisclosure/2024/Feb/3
|
|
CVE-2023-6780 - https://www.openwall.com/lists/oss-security/2024/01/30/6
|
|
CVE-2023-6780 - https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
|
|
CVE-2023-6817 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
|
|
CVE-2023-6817 - http://www.openwall.com/lists/oss-security/2023/12/22/6
|
|
CVE-2023-6832 - https://huntr.com/bounties/53105a20-f4b1-45ad-a734-0349de6d7376
|
|
CVE-2023-6875 - http://packetstormsecurity.com/files/176525/WordPress-POST-SMTP-Mailer-2.8.7-Authorization-Bypass-Cross-Site-Scripting.html
|
|
CVE-2023-6888 - http://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/
|
|
CVE-2023-6889 - https://huntr.com/bounties/52897778-fad7-4169-bf04-a68a0646df0c
|
|
CVE-2023-6890 - https://huntr.com/bounties/2cf11678-8793-4fa1-b21a-f135564a105d
|
|
CVE-2023-6893 - https://github.com/willchen0011/cve/blob/main/download.md
|
|
CVE-2023-6901 - https://github.com/g1an123/POC/blob/main/README.md
|
|
CVE-2023-6902 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20upload%20getshell.md
|
|
CVE-2023-6906 - https://github.com/unpWn4bL3/iot-security/blob/main/1.md
|
|
CVE-2023-6907 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20deletion.md
|
|
CVE-2023-6927 - https://bugzilla.redhat.com/show_bug.cgi?id=2255027
|
|
CVE-2023-6928 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05
|
|
CVE-2023-6929 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05
|
|
CVE-2023-6930 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05
|
|
CVE-2023-6932 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
|
|
CVE-2023-6976 - https://huntr.com/bounties/2408a52b-f05b-4cac-9765-4f74bac3f20f
|
|
CVE-2023-6977 - https://huntr.com/bounties/fe53bf71-3687-4711-90df-c26172880aaf
|
|
CVE-2023-7018 - https://huntr.com/bounties/e1a3e548-e53a-48df-b708-9ee62140963c
|
|
CVE-2023-7026 - https://github.com/willchen0011/cve/blob/main/upload2.md
|
|
CVE-2023-7027 - http://packetstormsecurity.com/files/176525/WordPress-POST-SMTP-Mailer-2.8.7-Authorization-Bypass-Cross-Site-Scripting.html
|
|
CVE-2023-7038 - https://github.com/screetsec/VDD/tree/main/Automad%20CMS/Cross-Site%20Request%20Forgery%20(CSRF)
|
|
CVE-2023-7039 - https://github.com/Stitch3612/cve/blob/main/rce.md
|
|
CVE-2023-7040 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20read.md
|
|
CVE-2023-7041 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20overwrite.md
|
|
CVE-2023-7051 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_delete_notes.md
|
|
CVE-2023-7052 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_profile_notes.md
|
|
CVE-2023-7059 - https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/school-visitors-log-e-book.md
|
|
CVE-2023-7092 - https://drive.google.com/file/d/15Wr3EL4cpAS_H_Vp7TuIftssxAuzb4SL/view
|
|
CVE-2023-7092 - https://vuldb.com/?id.248939
|
|
CVE-2023-7095 - https://github.com/unpWn4bL3/iot-security/blob/main/2.md
|
|
CVE-2023-7100 - https://medium.com/@2839549219ljk/restaurant-table-booking-system-sql-injection-vulnerability-30708cfabe03
|
|
CVE-2023-7101 - https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md
|
|
CVE-2023-7101 - https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc
|
|
CVE-2023-7102 - https://github.com/haile01/perl_spreadsheet_excel_rce_poc
|
|
CVE-2023-7102 - https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md
|
|
CVE-2023-7105 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%201.md
|
|
CVE-2023-7106 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%202.md
|
|
CVE-2023-7107 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%203.md
|
|
CVE-2023-7108 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20Stored%20Cross-site%20Scripting.md
|
|
CVE-2023-7109 - https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-1.md
|
|
CVE-2023-7109 - https://vuldb.com/?id.249004
|
|
CVE-2023-7110 - https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-2.md
|
|
CVE-2023-7111 - https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-3.md
|
|
CVE-2023-7123 - https://medium.com/@2839549219ljk/medicine-tracking-system-sql-injection-7b0dde3a82a4
|
|
CVE-2023-7124 - https://github.com/h4md153v63n/CVEs/blob/main/E-commerce_Site/E-commerce_Site-Reflected_Cross_Site_Scripting.md
|
|
CVE-2023-7126 - https://github.com/h4md153v63n/CVEs/blob/main/Automated_Voting_System/Automated_Voting_System-SQL_Injection-1.md
|
|
CVE-2023-7126 - https://vuldb.com/?id.249129
|
|
CVE-2023-7127 - https://github.com/h4md153v63n/CVEs/blob/main/Automated_Voting_System/Automated_Voting_System-SQL_Injection-2.md
|
|
CVE-2023-7128 - https://github.com/h4md153v63n/CVEs/blob/main/Voting_System/Voting_System-SQL_Injection-1.md
|
|
CVE-2023-7129 - https://github.com/h4md153v63n/CVEs/blob/main/Voting_System/Voting_System-SQL_Injection-2.md
|
|
CVE-2023-7130 - https://github.com/h4md153v63n/CVEs/blob/main/College_Notes_Gallery/College_Notes_Gallery-SQL_Injection.md
|
|
CVE-2023-7130 - https://vuldb.com/?id.249133
|
|
CVE-2023-7131 - https://github.com/h4md153v63n/CVEs/blob/main/Intern_Membership_Management_System/Intern_Membership_Management_System-SQL-Injection.md
|
|
CVE-2023-7132 - https://github.com/h4md153v63n/CVEs/blob/main/Intern_Membership_Management_System/Intern_Membership_Management_System-Stored_Cross_site_Scripting.md
|
|
CVE-2023-7134 - https://medium.com/@2839549219ljk/medicine-tracking-system-rce-vulnerability-1f009165b915
|
|
CVE-2023-7135 - https://github.com/h4md153v63n/CVEs/blob/main/Record_Management_System/Record_Management_System-Blind_Cross_Site_Scripting-1.md
|
|
CVE-2023-7136 - https://github.com/h4md153v63n/CVEs/blob/main/Record_Management_System/Record_Management_System-Blind_Cross_Site_Scripting-2.md
|
|
CVE-2023-7137 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_1.md
|
|
CVE-2023-7138 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_2.md
|
|
CVE-2023-7139 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_3.md
|
|
CVE-2023-7140 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_4.md
|
|
CVE-2023-7141 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_5.md
|
|
CVE-2023-7142 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_6.md
|
|
CVE-2023-7143 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-Blind_Cross_Site_Scripting.md
|
|
CVE-2023-7149 - https://github.com/h4md153v63n/CVEs/blob/main/QR_Code_Generator/QR_Code_Generator-Reflected_Cross_Site_Scripting.md
|
|
CVE-2023-7150 - https://github.com/laoquanshi/Chic-Vulnerability-
|
|
CVE-2023-7155 - https://medium.com/@heishou/inventory-management-system-sql-injection-f6d67247c7ae
|
|
CVE-2023-7156 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-95b95ab64ccc
|
|
CVE-2023-7157 - https://medium.com/@heishou/inventory-management-system-sql-injection-7b955b5707eb
|
|
CVE-2023-7158 - https://github.com/micropython/micropython/issues/13007
|
|
CVE-2023-7160 - https://vuldb.com/?id.249182
|
|
CVE-2023-7161 - https://github.com/fixitc/cve/blob/main/sql.md
|
|
CVE-2023-7163 - https://tenable.com/security/research/tra-2023-43
|
|
CVE-2023-7172 - https://github.com/sharathc213/CVE-2023-7172
|
|
CVE-2023-7173 - https://github.com/sharathc213/CVE-2023-7173
|
|
CVE-2023-7175 - https://medium.com/@heishou/libsystem-sql-injection-bb74915175fe
|
|
CVE-2023-7176 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-3-d02f0ce78fe3
|
|
CVE-2023-7176 - https://vuldb.com/?id.249363
|
|
CVE-2023-7177 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-4-cadc2983eb5e
|
|
CVE-2023-7178 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-5-5a761e5b73b8
|
|
CVE-2023-7179 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-a98949964faf
|
|
CVE-2023-7181 - https://vuldb.com/?id.249368
|
|
CVE-2023-7202 - https://research.cleantalk.org/cve-2023-7202-fatal-error-notify-error-email-sending-csrf/
|
|
CVE-2023-7208 - https://github.com/unpWn4bL3/iot-security/blob/main/13.md
|
|
CVE-2023-7215 - https://github.com/Chanzhaoyu/chatgpt-web/issues/2001
|
|
CVE-2023-7215 - https://vuldb.com/?id.249779
|
|
CVE-2023-7216 - https://bugzilla.redhat.com/show_bug.cgi?id=2249901
|
|
CVE-2023-7227 - https://www.cisa.gov/news-events/ics-advisories/icsa-24-025-02
|
|
CVE-2024-0023 - https://android.googlesource.com/platform/frameworks/av/+/30b1b34cfd5abfcfee759e7d13167d368ac6c268
|
|
CVE-2024-0044 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2
|
|
CVE-2024-0044 - https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html
|
|
CVE-2024-0049 - https://android.googlesource.com/platform/frameworks/av/+/462689f06fd5e72ac63cd87b43ee52554ddf953e
|
|
CVE-2024-0051 - https://android.googlesource.com/platform/frameworks/av/+/a52c14a5b49f26efafa581dea653b4179d66909e
|
|
CVE-2024-0181 - https://vuldb.com/?id.249433
|
|
CVE-2024-0182 - https://vuldb.com/?id.249440
|
|
CVE-2024-0187 - https://wpscan.com/vulnerability/b4600411-bee1-4cc8-aee9-0a613ac9b55b/
|
|
CVE-2024-0204 - http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html
|
|
CVE-2024-0204 - http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2024-0206 - https://kcm.trellix.com/corporate/index?page=content&id=SB10415
|
|
CVE-2024-0209 - https://gitlab.com/wireshark/wireshark/-/issues/19501
|
|
CVE-2024-0210 - https://gitlab.com/wireshark/wireshark/-/issues/19504
|
|
CVE-2024-0213 - https://kcm.trellix.com/corporate/index?page=content&id=SB10416
|
|
CVE-2024-0233 - https://wpscan.com/vulnerability/04a708a0-b6f3-47d1-aac9-0bb17f57c61e/
|
|
CVE-2024-0235 - https://wpscan.com/vulnerability/e370b99a-f485-42bd-96a3-60432a15a4e9/
|
|
CVE-2024-0236 - https://wpscan.com/vulnerability/09aeb6f2-6473-4de7-8598-e417049896d7/
|
|
CVE-2024-0237 - https://wpscan.com/vulnerability/73d1b00e-1f17-4d9a-bfc8-6bc43a46b90b/
|
|
CVE-2024-0238 - https://wpscan.com/vulnerability/774655ac-b201-4d9f-8790-9eff8564bc91/
|
|
CVE-2024-0239 - https://wpscan.com/vulnerability/b9a4a3e3-7cdd-4354-8541-4219bd41c854/
|
|
CVE-2024-0243 - https://huntr.com/bounties/370904e7-10ac-40a4-a8d4-e2d16e1ca861
|
|
CVE-2024-0248 - https://wpscan.com/vulnerability/faf50bc0-64c5-4ccc-a8ac-e73ed44a74df/
|
|
CVE-2024-0250 - https://wpscan.com/vulnerability/321b07d1-692f-48e9-a8e5-a15b38efa979/
|
|
CVE-2024-0261 - https://packetstormsecurity.com/files/176342/FTPDMIN-0.96-Denial-Of-Service.html
|
|
CVE-2024-0261 - https://vuldb.com/?id.249817
|
|
CVE-2024-0261 - https://www.youtube.com/watch?v=q-CVJfYdd-g
|
|
CVE-2024-0263 - https://0day.today/exploit/description/39212
|
|
CVE-2024-0263 - https://packetstormsecurity.com/files/176333/Ultra-Mini-HTTPd-1.21-Denial-Of-Service.html
|
|
CVE-2024-0264 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/
|
|
CVE-2024-0264 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/blob/main/clinicx.py
|
|
CVE-2024-0265 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE
|
|
CVE-2024-0265 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/blob/main/clinicx.py
|
|
CVE-2024-0268 - https://vuldb.com/?id.249824
|
|
CVE-2024-0273 - https://vuldb.com/?id.249828
|
|
CVE-2024-0278 - https://vuldb.com/?id.249833
|
|
CVE-2024-0300 - https://github.com/tolkent/cve/blob/main/upload.md
|
|
CVE-2024-0310 - https://kcm.trellix.com/corporate/index?page=content&id=SB10417
|
|
CVE-2024-0311 - https://kcm.trellix.com/corporate/index?page=content&id=SB10418
|
|
CVE-2024-0312 - https://kcm.trellix.com/corporate/index?page=content&id=SB10418
|
|
CVE-2024-0313 - https://kcm.trellix.com/corporate/index?page=content&id=SB10418
|
|
CVE-2024-0321 - https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769
|
|
CVE-2024-0322 - https://huntr.com/bounties/87611fc9-ed7c-43e9-8e52-d83cd270bbec
|
|
CVE-2024-0337 - https://wpscan.com/vulnerability/2f17a274-8676-4f4e-989f-436030527890/
|
|
CVE-2024-0344 - https://vuldb.com/?id.250112
|
|
CVE-2024-0346 - https://drive.google.com/file/d/1bao4YK4GwvAvCdCrsW5UpJZdvREdc_Yj/view?usp=sharing
|
|
CVE-2024-0355 - https://medium.com/@heishou/dfsms-has-sql-injection-vulnerability-e9cfbc375be8
|
|
CVE-2024-0357 - https://vuldb.com/?id.250124
|
|
CVE-2024-0361 - https://vuldb.com/?id.250128
|
|
CVE-2024-0365 - https://wpscan.com/vulnerability/4b8b9638-d52a-40bc-b298-ae1c74788c18/
|
|
CVE-2024-0399 - https://wpscan.com/vulnerability/1550e30c-bf80-48e0-bc51-67d29ebe7272/
|
|
CVE-2024-0418 - https://cxsecurity.com/issue/WLB-2024010023
|
|
CVE-2024-0419 - https://cxsecurity.com/issue/WLB-2024010027
|
|
CVE-2024-0419 - https://www.youtube.com/watch?v=6dAWGH0-6TY
|
|
CVE-2024-0420 - https://wpscan.com/vulnerability/b6187ef8-70f4-4911-abd7-42bf6b7e54b7/
|
|
CVE-2024-0421 - https://wpscan.com/vulnerability/587acc47-1966-4baf-a380-6aa479a97c82/
|
|
CVE-2024-0425 - https://github.com/mi2acle/forucmsvuln/blob/master/passwordreset.md
|
|
CVE-2024-0426 - https://github.com/mi2acle/forucmsvuln/blob/master/sqli.md
|
|
CVE-2024-0439 - https://huntr.com/bounties/7fc1b78e-7faf-4f40-961d-61e53dac81ce
|
|
CVE-2024-0440 - https://huntr.com/bounties/263fd7eb-f9a9-4578-9655-0e28c609272f
|
|
CVE-2024-0455 - https://huntr.com/bounties/07d83b49-7ebb-40d2-83fc-78381e3c5c9c
|
|
CVE-2024-0464 - https://vuldb.com/?id.250569
|
|
CVE-2024-0480 - http://packetstormsecurity.com/files/176548/Taokeyun-SQL-Injection.html
|
|
CVE-2024-0496 - https://vuldb.com/?id.250601
|
|
CVE-2024-0500 - https://vuldb.com/?id.250608
|
|
CVE-2024-0503 - https://drive.google.com/file/d/1n9Zas-iSOfKVMN3UzPyVGgQgCmig2A5I/view?usp=sharing
|
|
CVE-2024-0510 - http://packetstormsecurity.com/files/176547/HaoKeKeJi-YiQiNiu-Server-Side-Request-Forgery.html
|
|
CVE-2024-0521 - https://huntr.com/bounties/a569c64b-1e2b-4bed-a19f-47fd5a3da453
|
|
CVE-2024-0531 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/setBlackRule.md
|
|
CVE-2024-0532 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/WifExtraSet.md
|
|
CVE-2024-0533 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/SetOnlineDevName.devname.md
|
|
CVE-2024-0534 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/SetOnlineDevName.mac.md
|
|
CVE-2024-0538 - https://vuldb.com/?id.250708
|
|
CVE-2024-0543 - https://vuldb.com/?id.250713
|
|
CVE-2024-0546 - https://packetstormsecurity.com/files/94905/EasyFTP-1.7.0.x-Denial-Of-Service.html
|
|
CVE-2024-0547 - https://packetstormsecurity.com/files/163079/Ability-FTP-Server-2.34-Denial-Of-Service.html
|
|
CVE-2024-0548 - https://packetstormsecurity.com/files/163038/FreeFloat-FTP-Server-1.0-Denial-Of-Service.html
|
|
CVE-2024-0550 - https://huntr.com/bounties/c6afeb5e-f211-4b3d-aa4b-6bad734217a6
|
|
CVE-2024-0551 - https://huntr.com/bounties/f114c787-ab5f-4f83-afa5-c000435efb78
|
|
CVE-2024-0559 - https://research.cleantalk.org/cve-2024-0559/
|
|
CVE-2024-0559 - https://wpscan.com/vulnerability/b257daf2-9540-4a0f-a560-54b47d2b913f/
|
|
CVE-2024-0561 - https://wpscan.com/vulnerability/99b6aa8b-deb9-48f8-8896-f3c8118a4f70/
|
|
CVE-2024-0566 - https://wpscan.com/vulnerability/ca83db95-4a08-4615-aa8d-016022404c32/
|
|
CVE-2024-0574 - https://vuldb.com/?id.250790
|
|
CVE-2024-0575 - https://vuldb.com/?id.250791
|
|
CVE-2024-0599 - https://vuldb.com/?id.250837
|
|
CVE-2024-0603 - https://vuldb.com/?id.250839
|
|
CVE-2024-0646 - https://access.redhat.com/errata/RHSA-2024:0850
|
|
CVE-2024-0647 - https://www.youtube.com/watch?v=KtDjoJlrpAc
|
|
CVE-2024-0670 - http://seclists.org/fulldisclosure/2024/Mar/29
|
|
CVE-2024-0670 - https://checkmk.com/werk/16361
|
|
CVE-2024-0672 - https://wpscan.com/vulnerability/eceb6585-5969-4aa6-9908-b6bfb578190a/
|
|
CVE-2024-0673 - https://wpscan.com/vulnerability/d80e725d-356a-4997-a352-33565e291fc8/
|
|
CVE-2024-0677 - https://wpscan.com/vulnerability/0f7757c9-69fa-49db-90b0-40f0ff29bee7/
|
|
CVE-2024-0684 - https://www.openwall.com/lists/oss-security/2024/01/18/2
|
|
CVE-2024-0693 - https://0day.today/exploit/description/39218
|
|
CVE-2024-0693 - https://packetstormsecurity.com/files/176377/Easy-File-Sharing-FTP-Server-2.0-Denial-Of-Service.html
|
|
CVE-2024-0693 - https://www.youtube.com/watch?v=Rcl6VWg_bPY
|
|
CVE-2024-0695 - https://packetstormsecurity.com/files/176381/Easy-Chat-Server-3.1-Denial-Of-Service.html
|
|
CVE-2024-0695 - https://vuldb.com/?id.251480
|
|
CVE-2024-0695 - https://www.exploitalert.com/view-details.html?id=40072
|
|
CVE-2024-0695 - https://www.youtube.com/watch?v=nGyS2Rp5aEo
|
|
CVE-2024-0700 - https://github.com/wTeBwAA/PoC-SimpleTweet/blob/main/POST-request
|
|
CVE-2024-0700 - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5da021c-3835-4251-a3e5-3b5aaa11ea14?source=cve
|
|
CVE-2024-0701 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
|
CVE-2024-0711 - https://wpscan.com/vulnerability/8e286c04-ef32-4af0-be78-d978999b2a90/
|
|
CVE-2024-0713 - https://drive.google.com/file/d/1C6_4A-96BtR9VTNSadUY09ErroqLEVJ4/view?usp=sharing
|
|
CVE-2024-0719 - https://wpscan.com/vulnerability/6e67bf7f-07e6-432b-a8f4-aa69299aecaf/
|
|
CVE-2024-0720 - https://drive.google.com/drive/folders/1ZFjWlD5axvhWp--I7tuiZ9uOpSBmU_f6?usp=drive_link
|
|
CVE-2024-0720 - https://github.com/beraoudabdelkhalek/research/tree/main/CVEs/CVE-2024-0720
|
|
CVE-2024-0723 - https://packetstormsecurity.com/files/176545/freeSSHd-1.0.9-Denial-Of-Service.html
|
|
CVE-2024-0725 - https://packetstormsecurity.com/files/176544/ProSSHD-1.2-20090726-Denial-Of-Service.html
|
|
CVE-2024-0731 - https://fitoxs.com/vuldb/01-PCMan%20v2.0.7-exploit.txt
|
|
CVE-2024-0732 - https://fitoxs.com/vuldb/02-PCMan%20v2.0.7-exploit.txt
|
|
CVE-2024-0736 - https://0day.today/exploit/39249
|
|
CVE-2024-0737 - https://packetstormsecurity.com/files/176553/LightFTP-1.1-Denial-Of-Service.html
|
|
CVE-2024-0741 - https://bugzilla.mozilla.org/show_bug.cgi?id=1864587
|
|
CVE-2024-0745 - https://bugzilla.mozilla.org/show_bug.cgi?id=1871838
|
|
CVE-2024-0750 - https://bugzilla.mozilla.org/show_bug.cgi?id=1863083
|
|
CVE-2024-0763 - https://huntr.com/bounties/25a2f487-5a9c-4c7f-a2d3-b0527db73ea5
|
|
CVE-2024-0765 - https://huntr.com/bounties/8978ab27-710c-44ce-bfd8-a2ea416dc786
|
|
CVE-2024-0769 - https://github.com/c2dc/cve-reported/blob/main/CVE-2024-0769/CVE-2024-0769.md
|
|
CVE-2024-0772 - https://youtu.be/WIeWeuXbkiY
|
|
CVE-2024-0773 - https://drive.google.com/drive/folders/1YjJFvxis3gLWX95990Y-nJMbWCQHB02U?usp=sharing
|
|
CVE-2024-0776 - https://vuldb.com/?id.251678
|
|
CVE-2024-0778 - https://github.com/dezhoutorizhao/cve/blob/main/rce.md
|
|
CVE-2024-0778 - https://vuldb.com/?id.251696
|
|
CVE-2024-0779 - https://wpscan.com/vulnerability/ced134cf-82c5-401b-9476-b6456e1924e2/
|
|
CVE-2024-0780 - https://wpscan.com/vulnerability/be3045b1-72e6-450a-8dd2-4702a9328447/
|
|
CVE-2024-0781 - https://drive.google.com/drive/folders/1f61RXqelSDY0T92aLjmb8BhgAHt_eeUS
|
|
CVE-2024-0782 - https://drive.google.com/drive/folders/1ecVTReqCS_G8svyq3MG79E2y59psMcPn?usp=sharing
|
|
CVE-2024-0782 - https://vuldb.com/?id.251698
|
|
CVE-2024-0783 - https://github.com/keru6k/Online-Admission-System-RCE-PoC
|
|
CVE-2024-0783 - https://github.com/keru6k/Online-Admission-System-RCE-PoC/blob/main/poc.py
|
|
CVE-2024-0784 - https://github.com/biantaibao/octopus_SQL/blob/main/report.md
|
|
CVE-2024-0784 - https://vuldb.com/?id.251700
|
|
CVE-2024-0788 - https://fluidattacks.com/advisories/brubeck/
|
|
CVE-2024-0795 - https://huntr.com/bounties/f69e3307-7b44-4776-ac60-2990990723ec
|
|
CVE-2024-0799 - https://www.tenable.com/security/research/tra-2024-07
|
|
CVE-2024-0800 - https://www.tenable.com/security/research/tra-2024-07
|
|
CVE-2024-0801 - https://www.tenable.com/security/research/tra-2024-07
|
|
CVE-2024-0811 - http://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html
|
|
CVE-2024-0815 - https://huntr.com/bounties/83bf8191-b259-4b24-8ec9-0115d7c05350
|
|
CVE-2024-0817 - https://huntr.com/bounties/44d5cbd9-a046-417b-a8d4-bea6fda9cbe3
|
|
CVE-2024-0818 - https://huntr.com/bounties/85b06a1b-ac0b-4096-a06d-330891570cd9
|
|
CVE-2024-0820 - https://wpscan.com/vulnerability/fc091bbd-7338-4bd4-add5-e46502a9a949/
|
|
CVE-2024-0855 - https://wpscan.com/vulnerability/5d5da91e-3f34-46b0-8db2-354a88bdf934/
|
|
CVE-2024-0856 - https://wpscan.com/vulnerability/eb383600-0cff-4f24-8127-1fb118f0565a/
|
|
CVE-2024-0858 - https://wpscan.com/vulnerability/f6627a35-d158-495e-9d56-69405cfca221/
|
|
CVE-2024-0861 - https://gitlab.com/gitlab-org/gitlab/-/issues/439240
|
|
CVE-2024-0868 - https://wpscan.com/vulnerability/bb7c2d2b-cdfe-433b-96cf-714e71d12b22/
|
|
CVE-2024-0879 - https://research.jfrog.com/vulnerabilities/vector-admin-filter-bypass/
|
|
CVE-2024-0880 - https://vuldb.com/?id.252032
|
|
CVE-2024-0881 - https://wpscan.com/vulnerability/e460e926-6e9b-4e9f-b908-ba5c9c7fb290/
|
|
CVE-2024-0885 - https://packetstormsecurity.com/files/176633/SpyCamLizard-1.230-Denial-Of-Service.html
|
|
CVE-2024-0886 - https://fitoxs.com/vuldb/09-exploit-perl.txt
|
|
CVE-2024-0887 - https://fitoxs.com/vuldb/18-exploit-perl.txt
|
|
CVE-2024-0889 - https://packetstormsecurity.com/files/176661/Golden-FTP-Server-2.02b-Denial-Of-Service.html
|
|
CVE-2024-0890 - https://github.com/biantaibao/octopus_SQL2/blob/main/report.md
|
|
CVE-2024-0891 - https://github.com/biantaibao/octopus_XSS/blob/main/report.md
|
|
CVE-2024-0891 - https://vuldb.com/?id.252043
|
|
CVE-2024-0902 - https://wpscan.com/vulnerability/fd53e40a-516b-47b9-b495-321774432367/
|
|
CVE-2024-0904 - https://wpscan.com/vulnerability/baf4afc9-c20e-47d6-a798-75e15652d1e3/
|
|
CVE-2024-0905 - https://wpscan.com/vulnerability/3b9eba0d-29aa-47e4-b17f-4cf4bbf8b690/
|
|
CVE-2024-0911 - https://lists.gnu.org/archive/html/bug-indent/2024-01/msg00000.html
|
|
CVE-2024-0917 - https://huntr.com/bounties/2d840735-e255-4700-9709-6f7361829119
|
|
CVE-2024-0921 - https://github.com/xiyuanhuaigu/cve/blob/main/rce.md
|
|
CVE-2024-0922 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formQuickIndex.md
|
|
CVE-2024-0923 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetDeviceName.md
|
|
CVE-2024-0924 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetPPTPServer.md
|
|
CVE-2024-0925 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetVirtualSer.md
|
|
CVE-2024-0926 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formWifiWpsOOB.md
|
|
CVE-2024-0927 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromAddressNat_1.md
|
|
CVE-2024-0928 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromDhcpListClient_1.md
|
|
CVE-2024-0929 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromNatStaticSetting.md
|
|
CVE-2024-0930 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromSetWirelessRepeat.md
|
|
CVE-2024-0930 - https://vuldb.com/?id.252135
|
|
CVE-2024-0931 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/saveParentControlInfo_1.md
|
|
CVE-2024-0931 - https://vuldb.com/?id.252136
|
|
CVE-2024-0932 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/setSmartPowerManagement.md
|
|
CVE-2024-0936 - https://github.com/bayuncao/vul-cve-5
|
|
CVE-2024-0936 - https://github.com/bayuncao/vul-cve-5/blob/main/poc.py
|
|
CVE-2024-0937 - https://github.com/bayuncao/vul-cve-6/blob/main/poc.py
|
|
CVE-2024-0937 - https://vuldb.com/?id.252182
|
|
CVE-2024-0939 - https://github.com/Yu1e/vuls/blob/main/an%20arbitrary%20file%20upload%20vulnerability%20in%20BaiZhuo%20Networks%20Smart%20S210%20multi-service%20security%20gateway%20intelligent%20management%20platform.md
|
|
CVE-2024-0951 - https://wpscan.com/vulnerability/88b2e479-eb15-4213-9df8-3d353074974e/
|
|
CVE-2024-0953 - https://bugzilla.mozilla.org/show_bug.cgi?id=1837916
|
|
CVE-2024-0958 - https://drive.google.com/drive/folders/17JTwjuT09q7he_oXkMtZS5jyyXw8ZIgg?usp=sharing
|
|
CVE-2024-0964 - https://huntr.com/bounties/25e25501-5918-429c-8541-88832dfd3741
|
|
CVE-2024-0968 - https://huntr.com/bounties/566033b9-df20-4928-b4aa-5cd4c3ca1561
|
|
CVE-2024-0973 - https://wpscan.com/vulnerability/798de421-4814-46a9-a055-ebb95a7218ed/
|
|
CVE-2024-0986 - https://drive.google.com/file/d/10BYLQ7Rk4oag96afLZouSvDDPvsO7SoJ/view?usp=drive_link
|
|
CVE-2024-0998 - https://vuldb.com/?id.252267
|
|
CVE-2024-1008 - https://vuldb.com/?id.252277
|
|
CVE-2024-1009 - https://youtu.be/oL98TSjy89Q?si=_T6YkJZlbn7SJ4Gn
|
|
CVE-2024-1010 - https://github.com/jomskiller/Employee-Management-System---Stored-XSS
|
|
CVE-2024-1010 - https://github.com/jomskiller/Employee-Management-System---Stored-XSS/
|
|
CVE-2024-1011 - https://github.com/jomskiller/Employee-Managemet-System---Broken-Access-Control
|
|
CVE-2024-1014 - https://www.hackplayers.com/2024/01/cve-2024-1014-and-cve-2024-1015.html
|
|
CVE-2024-1015 - https://www.hackplayers.com/2024/01/cve-2024-1014-and-cve-2024-1015.html
|
|
CVE-2024-1016 - https://packetstormsecurity.com/files/176675/Solar-FTP-Server-2.1.2-Denial-Of-Service.html
|
|
CVE-2024-1017 - https://packetstormsecurity.com/files/176714/Gabriels-FTP-Server-1.2-Denial-Of-Service.html
|
|
CVE-2024-1017 - https://www.youtube.com/watch?v=wwHuXfYS8yQ
|
|
CVE-2024-1019 - https://owasp.org/www-project-modsecurity/tab_cves#cve-2024-1019-2024-01-30
|
|
CVE-2024-1020 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/gdd3hiwz8uo6ylab
|
|
CVE-2024-1021 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/yemvnt5uo53gfem5
|
|
CVE-2024-1022 - https://drive.google.com/file/d/1lPZ1yL9UlU-uB03xz17q4OR9338X_1am/view?usp=sharing
|
|
CVE-2024-1029 - https://vuldb.com/?id.252302
|
|
CVE-2024-1030 - https://vuldb.com/?id.252303
|
|
CVE-2024-1061 - https://www.tenable.com/security/research/tra-2024-02
|
|
CVE-2024-1068 - https://wpscan.com/vulnerability/25e3c1a1-3c45-41df-ae50-0e20d86c5484/
|
|
CVE-2024-1076 - https://wpscan.com/vulnerability/9c3e9c72-3d6c-4e2c-bb8a-f4efce1371d5/
|
|
CVE-2024-1086 - https://github.com/Notselwyn/CVE-2024-1086
|
|
CVE-2024-1086 - https://news.ycombinator.com/item?id=39828424
|
|
CVE-2024-1086 - https://pwning.tech/nftables/
|
|
CVE-2024-1098 - https://vuldb.com/?id.252455
|
|
CVE-2024-1098 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/ouiw375l0m8mw5ls
|
|
CVE-2024-1099 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/dcilugg0htp973nx
|
|
CVE-2024-1106 - https://wpscan.com/vulnerability/0672f8af-33e2-459c-ac8a-7351247a8a26/
|
|
CVE-2024-1142 - https://support.sonatype.com/hc/en-us/articles/27034479038739-CVE-2024-1142-Sonatype-IQ-Server-Path-Traversal-2024-03-06
|
|
CVE-2024-1163 - https://huntr.com/bounties/c1cbc18b-e4ab-4332-ad13-0033f0f976f5
|
|
CVE-2024-1184 - https://fitoxs.com/vuldb/10-exploit-perl.txt
|
|
CVE-2024-1185 - https://fitoxs.com/vuldb/11-exploit-perl.txt
|
|
CVE-2024-1186 - https://fitoxs.com/vuldb/12-exploit-perl.txt
|
|
CVE-2024-1186 - https://www.exploit-db.com/exploits/45884
|
|
CVE-2024-1187 - https://fitoxs.com/vuldb/13-exploit-perl.txt
|
|
CVE-2024-1188 - https://fitoxs.com/vuldb/14-exploit-perl.txt
|
|
CVE-2024-1189 - https://fitoxs.com/vuldb/15-exploit-perl.txt
|
|
CVE-2024-1193 - https://vuldb.com/?id.252683
|
|
CVE-2024-1195 - https://vuldb.com/?id.252685
|
|
CVE-2024-1204 - https://wpscan.com/vulnerability/03191b00-0b05-42db-9ce2-fc525981b6c9/
|
|
CVE-2024-1215 - https://github.com/PrecursorYork/crud-without-refresh-reload-Reflected_XSS-POC/blob/main/README.md
|
|
CVE-2024-1219 - https://wpscan.com/vulnerability/ce4ac9c4-d293-4464-b6a0-82ddf8d4860b/
|
|
CVE-2024-1231 - https://wpscan.com/vulnerability/7d3968d9-61ed-4c00-8764-0360cf03255e/
|
|
CVE-2024-1232 - https://wpscan.com/vulnerability/2a29b509-4cd5-43c8-84f4-f86251dd28f8/
|
|
CVE-2024-1252 - https://vuldb.com/?id.252991
|
|
CVE-2024-1253 - https://github.com/b51s77/cve/blob/main/upload.md
|
|
CVE-2024-1254 - https://github.com/rockersiyuan/CVE/blob/main/Smart%20S20.md
|
|
CVE-2024-1266 - https://drive.google.com/file/d/16a9lQqUFBICw-Hhbe9bT5sSB7qwZjMwA/view?usp=sharing
|
|
CVE-2024-1269 - https://github.com/PrecursorYork/Product-Management-System-Using-PHP-and-MySQL-Reflected-XSS-POC/blob/main/README.md
|
|
CVE-2024-1273 - https://wpscan.com/vulnerability/9784d7c8-e3aa-42af-ace8-5b2b37ebc9cb/
|
|
CVE-2024-1274 - https://wpscan.com/vulnerability/91dba45b-9930-4bfb-a7bf-903c46864e9f/
|
|
CVE-2024-1279 - https://wpscan.com/vulnerability/4c537264-0c23-428e-9a11-7a9e74fb6b69/
|
|
CVE-2024-1290 - https://wpscan.com/vulnerability/a60187d4-9491-435a-bc36-8dd348a1ffa3/
|
|
CVE-2024-1292 - https://wpscan.com/vulnerability/56d4fc48-d0dc-4ac6-93cd-f64d4c3c5c07/
|
|
CVE-2024-1306 - https://wpscan.com/vulnerability/c7ce2649-b2b0-43f4-994d-07b1023405e9/
|
|
CVE-2024-1307 - https://wpscan.com/vulnerability/bbc6cebd-e9bf-4b08-a474-f9312b3c0947/
|
|
CVE-2024-1309 - https://www.honeywell.com/us/en/product-security
|
|
CVE-2024-1309 - https://www.kb.cert.org/vuls/id/417980
|
|
CVE-2024-1310 - https://wpscan.com/vulnerability/a7735feb-876e-461c-9a56-ea6067faf277/
|
|
CVE-2024-1316 - https://wpscan.com/vulnerability/d80dfe2f-207d-4cdf-8c71-27936c6318e5/
|
|
CVE-2024-1319 - https://wpscan.com/vulnerability/5904dc7e-1058-4c40-bca3-66ba57b1414b/
|
|
CVE-2024-1331 - https://wpscan.com/vulnerability/b2bac900-3d8f-406c-b03d-c8db156acc59/
|
|
CVE-2024-1333 - https://wpscan.com/vulnerability/30546402-03b8-4e18-ad7e-04a6b556ffd7/
|
|
CVE-2024-1401 - https://wpscan.com/vulnerability/91064ba5-cf65-46e6-88df-0e4d96a3ef9f/
|
|
CVE-2024-1432 - https://github.com/bayuncao/vul-cve-12
|
|
CVE-2024-1455 - https://github.com/langchain-ai/langchain/commit/727d5023ce88e18e3074ef620a98137d26ff92a3
|
|
CVE-2024-1460 - https://fluidattacks.com/advisories/mingus/
|
|
CVE-2024-1481 - https://bugzilla.redhat.com/show_bug.cgi?id=2262169
|
|
CVE-2024-1487 - https://wpscan.com/vulnerability/c028cd73-f30a-4c8b-870f-3071055f0496/
|
|
CVE-2024-1526 - https://wpscan.com/vulnerability/1664697e-0ea3-4d09-b2fd-153a104ec255/
|
|
CVE-2024-1564 - https://wpscan.com/vulnerability/ecb1e36f-9c6e-4754-8878-03c97194644d/
|
|
CVE-2024-1588 - https://wpscan.com/vulnerability/2772c921-d977-4150-b207-ae5ba5e2a6db/
|
|
CVE-2024-1589 - https://wpscan.com/vulnerability/5cfbbddd-d941-4665-be8b-a54454527571/
|
|
CVE-2024-1638 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p6f3-f63q-5mc2
|
|
CVE-2024-1658 - https://wpscan.com/vulnerability/9489925e-5a47-4608-90a2-0139c5e1c43c/
|
|
CVE-2024-1660 - https://wpscan.com/vulnerability/5bd16f84-22bf-4170-b65c-08caf67d0005/
|
|
CVE-2024-1661 - https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-Totolink/X6000R-Hardcoded-Password.md
|
|
CVE-2024-1664 - https://wpscan.com/vulnerability/fc3beca7-af38-4ab2-b05f-13b47d042b85/
|
|
CVE-2024-1668 - https://gist.github.com/Xib3rR4dAr/91bd37338022b15379f393356d1056a1
|
|
CVE-2024-1669 - https://issues.chromium.org/issues/41495060
|
|
CVE-2024-1670 - https://issues.chromium.org/issues/41481374
|
|
CVE-2024-1671 - https://issues.chromium.org/issues/41487933
|
|
CVE-2024-1672 - https://issues.chromium.org/issues/41485789
|
|
CVE-2024-1675 - https://issues.chromium.org/issues/41486208
|
|
CVE-2024-1676 - https://issues.chromium.org/issues/40944847
|
|
CVE-2024-1700 - https://github.com/omarexala/PHP-MYSQL-User-Login-System---Stored-XSS
|
|
CVE-2024-1701 - https://github.com/omarexala/PHP-MYSQL-User-Login-System---Broken-Access-Control
|
|
CVE-2024-1702 - https://github.com/omarexala/PHP-MYSQL-User-Login-System---SQL-Injection
|
|
CVE-2024-1703 - https://vuldb.com/?id.254391
|
|
CVE-2024-1704 - https://vuldb.com/?id.254392
|
|
CVE-2024-1705 - https://vuldb.com/?id.254393
|
|
CVE-2024-1707 - https://github.com/strik3r0x1/Vulns/blob/main/GARO_GLBDCMB-T274WO_Stored_XSS.md
|
|
CVE-2024-1708 - https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass
|
|
CVE-2024-1709 - https://github.com/rapid7/metasploit-framework/pull/18870
|
|
CVE-2024-1709 - https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
|
|
CVE-2024-1709 - https://techcrunch.com/2024/02/21/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit/
|
|
CVE-2024-1709 - https://www.bleepingcomputer.com/news/security/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw/
|
|
CVE-2024-1709 - https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/
|
|
CVE-2024-1709 - https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass
|
|
CVE-2024-1709 - https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2
|
|
CVE-2024-1709 - https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8
|
|
CVE-2024-1712 - https://wpscan.com/vulnerability/23805a61-9fcd-4744-a60d-05c8cb43ee01/
|
|
CVE-2024-1713 - https://github.com/google/security-research/security/advisories/GHSA-r7m9-grw7-vcc4
|
|
CVE-2024-1743 - https://wpscan.com/vulnerability/3cb1f707-6093-42a7-a778-2b296bdf1735/
|
|
CVE-2024-1745 - https://wpscan.com/vulnerability/b63bbfeb-d6f7-4c33-8824-b86d64d3f598/
|
|
CVE-2024-1746 - https://wpscan.com/vulnerability/5f35572a-4129-4fe0-a465-d25f4c3b4419/
|
|
CVE-2024-1750 - https://vuldb.com/?id.254532
|
|
CVE-2024-1752 - https://wpscan.com/vulnerability/7c87fcd2-6ffd-4285-bbf5-36efea70b620/
|
|
CVE-2024-1754 - https://wpscan.com/vulnerability/c061e792-e37a-4cf6-b46b-ff111c5a5c84/
|
|
CVE-2024-1755 - https://wpscan.com/vulnerability/481a376b-55be-4afa-94f5-c3cf8a88b8d1/
|
|
CVE-2024-1756 - https://wpscan.com/vulnerability/0baedd8d-2bbe-4091-bec4-f99e25d7290d/
|
|
CVE-2024-1781 - https://github.com/Icycu123/X6000R-AX3000-Wifi-6-Giga/blob/main/2/X6000R%20AX3000%20WiFi%206%20Giga%E7%84%A1%E7%B7%9A%E8%B7%AF%E7%94%B1%E5%99%A8%E6%9C%AA%E6%8E%88%E6%9D%83rce.md
|
|
CVE-2024-1784 - https://github.com/liyako/vulnerability/blob/main/POC/Limbas-Blind-SQL-injection.md
|
|
CVE-2024-1784 - https://vuldb.com/?id.254575
|
|
CVE-2024-1821 - https://github.com/jxp98/VulResearch/blob/main/2024/02/2Crime%20Reporting%20System%20-%20SQL%20Injection-police_add.md
|
|
CVE-2024-1824 - https://vuldb.com/?id.254612
|
|
CVE-2024-1827 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.2Library%20System%20In%20PHP%20-%20SQL%20Injection-teacher_login.md
|
|
CVE-2024-1828 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.3Library%20System%20In%20PHP%20-%20SQL%20Injection-teacher_reg.md
|
|
CVE-2024-1828 - https://vuldb.com/?id.254616
|
|
CVE-2024-1829 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.4Library%20System%20In%20PHP%20-%20SQL%20Injection-student_reg.md
|
|
CVE-2024-1830 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.5Library%20System%20In%20PHP%20-%20SQL%20Injection-student_lostpass.md
|
|
CVE-2024-1833 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/employee-management-system.md#2accountloginphp
|
|
CVE-2024-1834 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-Student-Attendance-System.md#2pageattendancexss
|
|
CVE-2024-1846 - https://wpscan.com/vulnerability/ea2a8420-4b0e-4efb-a0c6-ceea996dae5a/
|
|
CVE-2024-1849 - https://wpscan.com/vulnerability/e6d9fe28-def6-4f25-9967-a77f91899bfe/
|
|
CVE-2024-1871 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/XSS%20Vulnerability%20in%20Project%20Assignment%20Report.md
|
|
CVE-2024-1871 - https://vuldb.com/?id.254694
|
|
CVE-2024-1874 - http://www.openwall.com/lists/oss-security/2024/04/12/11
|
|
CVE-2024-1874 - https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7
|
|
CVE-2024-1876 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/Employee%20Project%20SQL%20Injection%20Update.md
|
|
CVE-2024-1877 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/Employee%20Leave%20Cancel%20SQL%20Injection.md
|
|
CVE-2024-1878 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/IDOR%20Employee%20Profile.md
|
|
CVE-2024-1892 - https://huntr.com/bounties/271f94f2-1e05-4616-ac43-41752389e26b
|
|
CVE-2024-1899 - https://www.tenable.com/security/research/tra-2024-05
|
|
CVE-2024-1905 - https://wpscan.com/vulnerability/b9a448d2-4bc2-4933-8743-58c8768a619f/
|
|
CVE-2024-1919 - https://vuldb.com/?id.254854
|
|
CVE-2024-1922 - https://vuldb.com/?id.254857
|
|
CVE-2024-1923 - https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BSimple%20Student%20Attendance%20System%20using%20PHP%20and%20MySQL%5D%20SQLi%20on%20ajax-api.php%3Faction=delete_class.md
|
|
CVE-2024-1924 - https://github.com/1testnew/CVE_Hunter/blob/main/SQLi-1.md
|
|
CVE-2024-1926 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Free%20and%20Open%20Source%20inventory%20management%20system-SQLi.md
|
|
CVE-2024-1927 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Web-Based%20Student%20Clearance%20System%20-%20SQLi.md
|
|
CVE-2024-1928 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Web-Based%20Student%20Clearance%20System%20-%20XSS.md
|
|
CVE-2024-1929 - https://www.openwall.com/lists/oss-security/2024/03/04/2
|
|
CVE-2024-1930 - https://www.openwall.com/lists/oss-security/2024/03/04/2
|
|
CVE-2024-1932 - https://huntr.com/bounties/fefd711e-3bf0-4884-9acc-167649c1f9a2
|
|
CVE-2024-1956 - https://wpscan.com/vulnerability/d7034ac2-0098-48d2-9ba9-87e09b178f7d/
|
|
CVE-2024-1958 - https://wpscan.com/vulnerability/8be4ebcf-2b42-4b88-89a0-2df6dbf00b55/
|
|
CVE-2024-1962 - https://wpscan.com/vulnerability/469486d4-7677-4d66-83c0-a6b9ac7c503b/
|
|
CVE-2024-1970 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/OnlineLearningSystemV2-XSS.md
|
|
CVE-2024-1971 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/Surya2Developer%20Online_shopping_-system/SQL%20Injection%20Auth.md
|
|
CVE-2024-1977 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2022-004
|
|
CVE-2024-1981 - https://research.hisolutions.com/2024/01/multiple-vulnerabilities-in-wordpress-plugin-wpvivid-backup-and-migration/
|
|
CVE-2024-1982 - https://research.hisolutions.com/2024/01/multiple-vulnerabilities-in-wordpress-plugin-wpvivid-backup-and-migration/
|
|
CVE-2024-1983 - https://wpscan.com/vulnerability/bf3a31de-a227-4db1-bd18-ce6a78dc96fb/
|
|
CVE-2024-2002 - https://github.com/davea42/libdwarf-code/blob/main/bugxml/data.txt
|
|
CVE-2024-2014 - https://github.com/mashroompc0527/CVE/blob/main/vul.md
|
|
CVE-2024-2018 - https://melapress.com/support/kb/wp-activity-log-plugin-changelog/
|
|
CVE-2024-2021 - https://github.com/dtxharry/cve/blob/main/cve.md
|
|
CVE-2024-20287 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-bHStWgXO
|
|
CVE-2024-20295 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-mUx4c5AJ
|
|
CVE-2024-20356 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb
|
|
CVE-2024-2044 - https://www.shielder.com/advisories/pgadmin-path-traversal_leads_to_unsafe_deserialization_and_rce/
|
|
CVE-2024-2053 - http://seclists.org/fulldisclosure/2024/Mar/11
|
|
CVE-2024-2053 - https://korelogic.com/Resources/Advisories/KL-001-2024-001.txt
|
|
CVE-2024-2054 - http://seclists.org/fulldisclosure/2024/Mar/12
|
|
CVE-2024-2054 - https://korelogic.com/Resources/Advisories/KL-001-2024-002.txt
|
|
CVE-2024-2055 - http://seclists.org/fulldisclosure/2024/Mar/13
|
|
CVE-2024-2055 - https://korelogic.com/Resources/Advisories/KL-001-2024-003.txt
|
|
CVE-2024-2056 - http://seclists.org/fulldisclosure/2024/Mar/14
|
|
CVE-2024-2056 - https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt
|
|
CVE-2024-2057 - https://github.com/bayuncao/vul-cve-16/tree/main/PoC.pkl
|
|
CVE-2024-2058 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/Unauthenticated%20Arbitrary%20File%20Upload.md
|
|
CVE-2024-2059 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/service_crud.php%20Unauthenticated%20Arbitrary%20File%20Upload.md
|
|
CVE-2024-2060 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/login_crud.php%20SQL%20Injection.md
|
|
CVE-2024-2061 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_supplier.php%20SQL%20Injection.md
|
|
CVE-2024-2062 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_categories.php%20SQL%20Injection.md
|
|
CVE-2024-2063 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/profile_crud.php%20Unauthenticated%20STORED%20XSS.md
|
|
CVE-2024-2064 - https://github.com/Andriesces/SelectCours-_Sever-side-Template-injection/blob/main/README.md
|
|
CVE-2024-2065 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Barangay%20Population%20Monitoring%20System/Stored%20XSS%20update-resident.php%20.md
|
|
CVE-2024-2066 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20add-computer.php%20.md
|
|
CVE-2024-2067 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/SQL%20Injection%20delete-computer.php%20.md
|
|
CVE-2024-2068 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20upadte-computer.php%20.md
|
|
CVE-2024-2069 - https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BFAQ%20Management%20System%20Using%20PHP%20and%20MySQL%5D%20SQLi%20on%20delete-faq.php.md
|
|
CVE-2024-2071 - https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/faq-management-system.md
|
|
CVE-2024-20729 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1890
|
|
CVE-2024-2073 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Block%20Inserter%20for%20Dynamic%20Content%20-%20Sql%20Injection.md
|
|
CVE-2024-2075 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Daily%20Habit%20Tracker.md
|
|
CVE-2024-2077 - https://github.com/yethu123/vulns-finding/blob/main/Simple%20Online%20Bidding%20System.md
|
|
CVE-2024-2093 - https://github.com/vektor-inc/vk-all-in-one-expansion-unit/pull/1072
|
|
CVE-2024-20954 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-20989 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-20990 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-20991 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-20992 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-20993 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-20994 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-20995 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-20997 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-20998 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-20999 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21000 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21001 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21002 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21003 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21004 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21005 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21006 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21007 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21008 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21009 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-2101 - https://wpscan.com/vulnerability/b3a0bb3f-50b2-4dcb-b23c-b08480363a4a/
|
|
CVE-2024-21010 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21011 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21012 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21013 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21014 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21015 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21016 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21017 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21018 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21019 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-2102 - https://wpscan.com/vulnerability/3d15f589-956c-4c71-98b1-3ba89d22262c/
|
|
CVE-2024-21020 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21021 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21022 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21023 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21024 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21025 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21026 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21027 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21028 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21029 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21030 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21031 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21032 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21033 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21034 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21035 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21036 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21037 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21038 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21039 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21040 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21041 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21042 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21043 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21044 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21045 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21046 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21047 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21048 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21049 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21050 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21051 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21052 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21053 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21054 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21055 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21056 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21057 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21058 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21059 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21060 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21061 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21062 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21063 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21064 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21065 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21066 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21067 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21068 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21069 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21070 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21071 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21072 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21073 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21074 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21075 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21076 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21077 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21078 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21079 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21080 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21081 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21082 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21083 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21084 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21085 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21086 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21087 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21088 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21089 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21090 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21091 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21092 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21093 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21094 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21095 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21096 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21097 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21098 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21099 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21100 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21101 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21102 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21103 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21104 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21105 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21106 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21107 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21108 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21109 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21110 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21111 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21112 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21113 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21114 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21115 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21116 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21117 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21118 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21119 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21120 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-21121 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
|
CVE-2024-2118 - https://wpscan.com/vulnerability/e9d53cb9-a5cb-49f5-bcba-295ae6fa44c3/
|
|
CVE-2024-21338 - https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/
|
|
CVE-2024-21413 - https://research.checkpoint.com/2024/the-risks-of-the-monikerlink-bug-in-microsoft-outlook-and-the-big-picture/
|
|
CVE-2024-2145 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Mobile%20Management%20Store.md
|
|
CVE-2024-2146 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Reflected%20XSS%20in%20Mobile%20Management%20Store.md
|
|
CVE-2024-2147 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Sql%20Injection%20Authentication%20Bypass%20in%20Mobile%20Management%20Store.md
|
|
CVE-2024-2148 - https://github.com/vanitashtml/CVE-Dumps/blob/main/RCE%20via%20Arbitrary%20File%20Upload%20in%20Mobile%20Management%20Store.md
|
|
CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6070734
|
|
CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-6070733
|
|
CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732
|
|
CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-6070731
|
|
CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-JS-DASHCORECOMPONENTS-6183084
|
|
CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-JS-DASHHTMLCOMPONENTS-6226337
|
|
CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-PYTHON-DASH-6226335
|
|
CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-PYTHON-DASHCORECOMPONENTS-6226334
|
|
CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-PYTHON-DASHHTMLCOMPONENTS-6226336
|
|
CVE-2024-21488 - https://gist.github.com/icemonster/282ab98fb68fc22aac7c576538f6369c
|
|
CVE-2024-21488 - https://security.snyk.io/vuln/SNYK-JS-NETWORK-6184371
|
|
CVE-2024-2149 - https://github.com/JiaDongGao1/CVE_Hunter/blob/main/SQLi-2.md
|
|
CVE-2024-21490 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746
|
|
CVE-2024-21490 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747
|
|
CVE-2024-21490 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113
|
|
CVE-2024-21492 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
|
CVE-2024-21493 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
|
CVE-2024-21493 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-5961078
|
|
CVE-2024-21494 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
|
CVE-2024-21494 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249859
|
|
CVE-2024-21495 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
|
CVE-2024-21495 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6248275
|
|
CVE-2024-21496 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
|
CVE-2024-21496 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249860
|
|
CVE-2024-21497 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
|
CVE-2024-21497 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249861
|
|
CVE-2024-21498 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
|
CVE-2024-21498 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249862
|
|
CVE-2024-21499 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
|
CVE-2024-21499 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249863
|
|
CVE-2024-21500 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
|
CVE-2024-21501 - https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf
|
|
CVE-2024-21501 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557
|
|
CVE-2024-21501 - https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334
|
|
CVE-2024-21502 - https://gist.github.com/keltecc/49da037072276f21b005a8337c15db26
|
|
CVE-2024-21502 - https://github.com/AntonKueltz/fastecdsa/commit/57fc5689c95d649dab7ef60cc99ac64589f01e36
|
|
CVE-2024-21502 - https://security.snyk.io/vuln/SNYK-PYTHON-FASTECDSA-6262045
|
|
CVE-2024-21503 - https://security.snyk.io/vuln/SNYK-PYTHON-BLACK-6256273
|
|
CVE-2024-21504 - https://security.snyk.io/vuln/SNYK-PHP-LIVEWIRELIVEWIRE-6446222
|
|
CVE-2024-21505 - https://security.snyk.io/vuln/SNYK-JS-WEB3UTILS-6229337
|
|
CVE-2024-21506 - https://gist.github.com/keltecc/62a7c2bf74a997d0a7b48a0ff3853a03
|
|
CVE-2024-21506 - https://security.snyk.io/vuln/SNYK-PYTHON-PYMONGO-6370597
|
|
CVE-2024-21507 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591300
|
|
CVE-2024-21508 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591085
|
|
CVE-2024-21509 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591084
|
|
CVE-2024-21511 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6670046
|
|
CVE-2024-2152 - https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20Mobile%20Management%20Store.md
|
|
CVE-2024-2153 - https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20View%20Order%20-%20Mobile%20Management%20Store.md
|
|
CVE-2024-2154 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Unauthenticated%20SQL%20Injection%20-%20Mobile%20Management%20Store.md
|
|
CVE-2024-2154 - https://vuldb.com/?id.255586
|
|
CVE-2024-2159 - https://wpscan.com/vulnerability/d7fa9849-c82a-4efd-84b6-9245053975ba/
|
|
CVE-2024-21623 - https://securitylab.github.com/research/github-actions-untrusted-input/
|
|
CVE-2024-21626 - http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html
|
|
CVE-2024-21632 - https://www.descope.com/blog/post/noauth
|
|
CVE-2024-21633 - https://github.com/iBotPeaches/Apktool/commit/d348c43b24a9de350ff6e5bd610545a10c1fc712
|
|
CVE-2024-21633 - https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-2hqv-2xv4-5h5w
|
|
CVE-2024-21640 - https://github.com/chromiumembedded/cef/security/advisories/GHSA-3h3j-38xq-v7hh
|
|
CVE-2024-21644 - https://github.com/pyload/pyload/security/advisories/GHSA-mqpq-2p68-46fv
|
|
CVE-2024-21645 - https://github.com/pyload/pyload/security/advisories/GHSA-ghmw-rwh8-6qmr
|
|
CVE-2024-21652 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-x32m-mvfj-52xv
|
|
CVE-2024-21661 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-6v85-wr92-q4p7
|
|
CVE-2024-21662 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-2vgg-9h6w-m454
|
|
CVE-2024-21663 - https://github.com/DEMON1A/Discord-Recon/issues/23
|
|
CVE-2024-21664 - https://github.com/lestrrat-go/jwx/security/advisories/GHSA-pvcr-v8j8-j5q3
|
|
CVE-2024-21665 - https://github.com/pimcore/ecommerce-framework-bundle/security/advisories/GHSA-cx99-25hr-5jxf
|
|
CVE-2024-21666 - https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-c38c-c8mh-vq68
|
|
CVE-2024-21667 - https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-g273-wppx-82w4
|
|
CVE-2024-2169 - https://kb.cert.org/vuls/id/417980
|
|
CVE-2024-2169 - https://www.kb.cert.org/vuls/id/417980
|
|
CVE-2024-21732 - https://github.com/Ghostfox2003/cms/blob/main/1.md
|
|
CVE-2024-21733 - http://packetstormsecurity.com/files/176951/Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html
|
|
CVE-2024-2180 - https://fluidattacks.com/advisories/gomez/
|
|
CVE-2024-21887 - http://packetstormsecurity.com/files/176668/Ivanti-Connect-Secure-Unauthenticated-Remote-Code-Execution.html
|
|
CVE-2024-2189 - https://wpscan.com/vulnerability/b8661fbe-78b9-4d29-90bf-5b68af468eb6/
|
|
CVE-2024-21907 - https://alephsecurity.com/vulns/aleph-2018004
|
|
CVE-2024-21907 - https://security.snyk.io/vuln/SNYK-DOTNET-NEWTONSOFTJSON-2774678
|
|
CVE-2024-2193 - https://www.vusec.net/projects/ghostrace/
|
|
CVE-2024-22049 - https://github.com/advisories/GHSA-5pq7-52mg-hr42
|
|
CVE-2024-22049 - https://github.com/jnunemaker/httparty/security/advisories/GHSA-5pq7-52mg-hr42
|
|
CVE-2024-22086 - https://github.com/hayyp/cherry/issues/1
|
|
CVE-2024-22087 - https://github.com/foxweb/pico/issues/31
|
|
CVE-2024-22088 - https://github.com/chendotjs/lotos/issues/7
|
|
CVE-2024-22107 - https://adepts.of0x.cc/gtbcc-pwned/
|
|
CVE-2024-22107 - https://x-c3ll.github.io/cves.html
|
|
CVE-2024-22108 - https://adepts.of0x.cc/gtbcc-pwned/
|
|
CVE-2024-22108 - https://x-c3ll.github.io/cves.html
|
|
CVE-2024-22120 - https://support.zabbix.com/browse/ZBX-24505
|
|
CVE-2024-22144 - https://patchstack.com/articles/critical-vulnerability-found-in-gotmls-plugin?_s_id=cve
|
|
CVE-2024-22190 - https://github.com/gitpython-developers/GitPython/pull/1792
|
|
CVE-2024-22190 - https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-2mqj-m65w-jghx
|
|
CVE-2024-22191 - https://github.com/avo-hq/avo/security/advisories/GHSA-ghjv-mh6x-7q6h
|
|
CVE-2024-22194 - https://github.com/casework/CASE-Utilities-Python/commit/db428a0745dac4fdd888ced9c52f617695519f9d
|
|
CVE-2024-22196 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h374-mm57-879c
|
|
CVE-2024-22197 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-pxmr-q2x3-9x9m
|
|
CVE-2024-22198 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-8r25-68wm-jw35
|
|
CVE-2024-2220 - https://wpscan.com/vulnerability/fe8c001e-8880-4570-b010-a41fc8ee0c58/
|
|
CVE-2024-22202 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6648-6g96-mg35
|
|
CVE-2024-22208 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-9hhf-xmcw-r3xg
|
|
CVE-2024-22211 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rjhp-44rv-7v59
|
|
CVE-2024-22318 - http://packetstormsecurity.com/files/177069/IBM-i-Access-Client-Solutions-Remote-Credential-Theft.html
|
|
CVE-2024-22318 - http://seclists.org/fulldisclosure/2024/Feb/7
|
|
CVE-2024-22368 - http://www.openwall.com/lists/oss-security/2024/01/10/2
|
|
CVE-2024-22368 - https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md
|
|
CVE-2024-22368 - https://metacpan.org/dist/Spreadsheet-ParseXLSX/changes
|
|
CVE-2024-22368 - https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html
|
|
CVE-2024-22409 - https://github.com/datahub-project/datahub/security/advisories/GHSA-x3v6-r479-m4xv
|
|
CVE-2024-22411 - https://github.com/avo-hq/avo/security/advisories/GHSA-g8vp-2v5p-9qfh
|
|
CVE-2024-22412 - https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-45h5-f7g3-gr8r
|
|
CVE-2024-22414 - https://github.com/DogukanUrker/flaskBlog/security/advisories/GHSA-mrcw-j96f-p6v6
|
|
CVE-2024-22416 - https://github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm
|
|
CVE-2024-22418 - https://github.com/Intermesh/groupoffice/security/advisories/GHSA-p7w9-h6c3-wqpp
|
|
CVE-2024-22419 - https://github.com/vyperlang/vyper/security/advisories/GHSA-2q8v-3gqq-4f8p
|
|
CVE-2024-22422 - https://github.com/Mintplex-Labs/anything-llm/security/advisories/GHSA-xmj6-g32r-fc5q
|
|
CVE-2024-22490 - https://github.com/cui2shark/security/blob/main/beetl-bbs%20-%20A%20reflected%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20the%20search%20box.md
|
|
CVE-2024-22491 - https://github.com/cui2shark/security/blob/main/A%20stored%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20beetl-bbs%20post%20save.md
|
|
CVE-2024-22496 - https://github.com/cui2shark/security/blob/main/(JFinalcms%20admin-login-username)%20.md
|
|
CVE-2024-22497 - https://github.com/cui2shark/security/blob/main/(JFinalcms%20admin-login-password)%20.md
|
|
CVE-2024-22514 - https://github.com/Orange-418/CVE-2024-22514-Remote-Code-Execution
|
|
CVE-2024-22515 - https://github.com/Orange-418/CVE-2024-22515-File-Upload-Vulnerability
|
|
CVE-2024-22526 - https://gist.github.com/GAP-dev/c33276a151c824300d68aecc317082a3
|
|
CVE-2024-22529 - https://github.com/unpWn4bL3/iot-security/blob/main/29.md
|
|
CVE-2024-22532 - https://github.com/pwndorei/CVE-2024-22532
|
|
CVE-2024-22550 - https://packetstormsecurity.com/files/176312/ShopSite-14.0-Cross-Site-Scripting.html
|
|
CVE-2024-22551 - https://packetstormsecurity.com/files/176314/WhatACart-2.0.7-Cross-Site-Scripting.html
|
|
CVE-2024-22562 - https://github.com/matthiaskramm/swftools/issues/210
|
|
CVE-2024-22563 - https://github.com/openvswitch/ovs-issues/issues/315
|
|
CVE-2024-22568 - https://github.com/kayo-zjq/myc/blob/main/1.md
|
|
CVE-2024-22569 - https://github.com/Num-Nine/CVE/issues/12
|
|
CVE-2024-22570 - https://github.com/Num-Nine/CVE/issues/11
|
|
CVE-2024-22591 - https://github.com/ysuzhangbin/cms2/blob/main/1.md
|
|
CVE-2024-22592 - https://github.com/ysuzhangbin/cms2/blob/main/2.md
|
|
CVE-2024-22593 - https://github.com/ysuzhangbin/cms2/blob/main/3.md
|
|
CVE-2024-22601 - https://github.com/ljw11e/cms/blob/main/5.md
|
|
CVE-2024-22603 - https://github.com/ljw11e/cms/blob/main/4.md
|
|
CVE-2024-2262 - https://wpscan.com/vulnerability/30544377-b90d-4762-b38a-ec89bda0dfdc/
|
|
CVE-2024-2263 - https://wpscan.com/vulnerability/ec092ed9-eb3e-40a7-a878-ab854104e290/
|
|
CVE-2024-22632 - https://tomiodarim.io/posts/cve-2024-22632-3/
|
|
CVE-2024-22633 - https://tomiodarim.io/posts/cve-2024-22632-3/
|
|
CVE-2024-22635 - https://packetstormsecurity.com/files/176365/WebCalendar-1.3.0-Cross-Site-Scripting.html
|
|
CVE-2024-22637 - https://packetstormsecurity.com/files/176403/Form-Tools-3.1.1-Cross-Site-Scripting.html
|
|
CVE-2024-22638 - https://packetstormsecurity.com/files/176420/liveSite-2019.1-Remote-Code-Execution.html
|
|
CVE-2024-22638 - https://www.exploit-db.com/exploits/51936
|
|
CVE-2024-22639 - https://packetstormsecurity.com/files/176411/iGalerie-3.0.22-Cross-Site-Scripting.html
|
|
CVE-2024-2264 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20PHP-MYSQL-User-Login-System/SQLI%20Auth.md
|
|
CVE-2024-22640 - https://github.com/zunak/CVE-2024-22640
|
|
CVE-2024-22651 - https://github.com/goldds96/Report/blob/main/DLink/DIR-815/CI.md
|
|
CVE-2024-22660 - https://github.com/Covteam/iot_vuln/tree/main/setLanguageCfg
|
|
CVE-2024-22662 - https://github.com/Covteam/iot_vuln/tree/main/setParentalRules
|
|
CVE-2024-22663 - https://github.com/Covteam/iot_vuln/tree/main/setOpModeCfg2
|
|
CVE-2024-22667 - https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt
|
|
CVE-2024-22667 - https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47
|
|
CVE-2024-2267 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Business%20Logic/Business%20Logic%20shop.php%20.md
|
|
CVE-2024-2268 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/File%20Upload/Arbitrary%20FIle%20Upload%20in%20product_update.php%20.md
|
|
CVE-2024-2269 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/SQL%20Injection%20Search/SQL%20Injection%20in%20search.php%20.md
|
|
CVE-2024-22699 - https://github.com/biantaibao/cms/blob/main/1.md
|
|
CVE-2024-2270 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/StoredXSS%20Signup/Stored%20XSS%20signup.php%20.md
|
|
CVE-2024-2271 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Blind%20SQL%20Injection%20%20Shop/Blind%20SQL%20Injection%20Shop.php%20.md
|
|
CVE-2024-22715 - https://github.com/RumblingIsOccupied/cms/blob/main/1.md
|
|
CVE-2024-2272 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Blind%20SQL%20Injection%20%20Home/Blind%20SQL%20Injection%20Home.php%20.md
|
|
CVE-2024-22727 - https://teltonika-networks.com/newsroom/critical-security-update-for-trb1-series-gateways
|
|
CVE-2024-22729 - https://github.com/adhikara13/CVE/blob/main/netis_MW5360/blind%20command%20injection%20in%20password%20parameter%20in%20initial%20settings.md
|
|
CVE-2024-22734 - https://www.redlinecybersecurity.com/blog/cve-2024-22734
|
|
CVE-2024-22749 - https://github.com/gpac/gpac/issues/2713
|
|
CVE-2024-22749 - https://github.com/hanxuer/crashes/blob/main/gapc/01/readme.md
|
|
CVE-2024-22751 - https://github.com/5erua/vuls/blob/main/dir882.md
|
|
CVE-2024-22751 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2024-22752 - https://github.com/hacker625/CVE-2024-22752
|
|
CVE-2024-2277 - https://vuldb.com/?id.256046
|
|
CVE-2024-22773 - https://medium.com/@wagneralves_87750/poc-cve-2024-22773-febf0d3a5433
|
|
CVE-2024-22773 - https://www.youtube.com/watch?v=-r0TWJq55DU&t=7s
|
|
CVE-2024-2278 - https://wpscan.com/vulnerability/2cbabde8-1e3e-4205-8a5c-b889447236a0/
|
|
CVE-2024-22795 - https://github.com/Hagrid29/ForeScout-SecureConnector-EoP
|
|
CVE-2024-2281 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/BROKEN%20ACCESS%20CONTROL%20.md
|
|
CVE-2024-22817 - https://github.com/mafangqian/cms/blob/main/1.md
|
|
CVE-2024-22818 - https://github.com/mafangqian/cms/blob/main/3.md
|
|
CVE-2024-22819 - https://github.com/mafangqian/cms/blob/main/2.md
|
|
CVE-2024-2282 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/SQL%20Injection%20Login.md
|
|
CVE-2024-2282 - https://vuldb.com/?id.256049
|
|
CVE-2024-2283 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/SQL%20Injection%20member-view.php%20.md
|
|
CVE-2024-22830 - https://www.defencetech.it/wp-content/uploads/2024/04/Report-CVE-2024-22830.pdf
|
|
CVE-2024-22836 - https://github.com/u32i/cve/tree/main/CVE-2024-22836
|
|
CVE-2024-2284 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/STORED%20XSS%20member-chat.php%20.md
|
|
CVE-2024-2285 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/STORED%20XSS%20member-member-edit.php%20.md
|
|
CVE-2024-22851 - https://www.drive-byte.de/en/blog/liveconfig-advisory-cve-2024-22851
|
|
CVE-2024-22852 - https://github.com/Beckaf/vunl/blob/main/D-Link/AC750/1/1.md
|
|
CVE-2024-22852 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2024-22853 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2024-22854 - https://tomekwasiak.pl/cve-2024-22854/
|
|
CVE-2024-22856 - https://www.4rth4s.xyz/2024/04/cve-2024-22856-authenticated-blind-sql.html
|
|
CVE-2024-22857 - https://www.ebryx.com/blogs/arbitrary-code-execution-in-zlog-cve-2024-22857
|
|
CVE-2024-22859 - https://github.com/github/advisory-database/pull/3490
|
|
CVE-2024-22871 - https://hackmd.io/@fe1w0/rymmJGida
|
|
CVE-2024-22889 - https://github.com/shenhav12/CVE-2024-22889-Plone-v6.0.9
|
|
CVE-2024-22891 - https://github.com/EQSTLab/PoC/tree/main/2024/RCE/CVE-2024-22891
|
|
CVE-2024-22899 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/
|
|
CVE-2024-22900 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/
|
|
CVE-2024-22901 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/
|
|
CVE-2024-22902 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/
|
|
CVE-2024-22903 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/
|
|
CVE-2024-22911 - https://github.com/matthiaskramm/swftools/issues/216
|
|
CVE-2024-22912 - https://github.com/matthiaskramm/swftools/issues/212
|
|
CVE-2024-22913 - https://github.com/matthiaskramm/swftools/issues/213
|
|
CVE-2024-22914 - https://github.com/matthiaskramm/swftools/issues/214
|
|
CVE-2024-22915 - https://github.com/matthiaskramm/swftools/issues/215
|
|
CVE-2024-22916 - https://kee02p.github.io/2024/01/13/CVE-2024-22916/
|
|
CVE-2024-22916 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2024-22919 - https://github.com/matthiaskramm/swftools/issues/209
|
|
CVE-2024-22920 - https://github.com/matthiaskramm/swftools/issues/211
|
|
CVE-2024-22923 - https://gist.github.com/whiteman007/
|
|
CVE-2024-22927 - https://github.com/weng-xianhu/eyoucms/issues/57
|
|
CVE-2024-22939 - https://github.com/NUDTTAN91/CVE-2024-22939
|
|
CVE-2024-22939 - https://github.com/NUDTTAN91/CVE20240109/blob/master/README.md
|
|
CVE-2024-22942 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/1/TOTOlink%20A3300R%20setWanCfg.md
|
|
CVE-2024-22955 - https://github.com/matthiaskramm/swftools/issues/207
|
|
CVE-2024-22956 - https://github.com/matthiaskramm/swftools/issues/208
|
|
CVE-2024-22957 - https://github.com/matthiaskramm/swftools/issues/206
|
|
CVE-2024-22983 - https://github.com/keru6k/CVE-2024-22983/blob/main/CVE-2024-22983.md
|
|
CVE-2024-22988 - https://gist.github.com/whiteman007/b50a9b64007a5d7bcb7a8bee61d2cb47
|
|
CVE-2024-22988 - https://www.vicarius.io/vsociety/posts/revealing-cve-2024-22988-a-unique-dive-into-exploiting-access-control-gaps-in-zkbio-wdms-uncover-the-untold-crafted-for-beginners-with-a-rare-glimpse-into-pentesting-strategies
|
|
CVE-2024-23031 - https://github.com/weng-xianhu/eyoucms/issues/57
|
|
CVE-2024-23032 - https://github.com/weng-xianhu/eyoucms/issues/57
|
|
CVE-2024-23033 - https://github.com/weng-xianhu/eyoucms/issues/57
|
|
CVE-2024-23034 - https://github.com/weng-xianhu/eyoucms/issues/57
|
|
CVE-2024-23052 - https://github.com/WuKongOpenSource/WukongCRM-9.0-JAVA/issues/28
|
|
CVE-2024-23054 - https://github.com/c0d3x27/CVEs/blob/main/CVE-2024-23054/README.md
|
|
CVE-2024-23055 - https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055
|
|
CVE-2024-23057 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/5/TOTOlink%20A3300R%20setNtpCfg.md
|
|
CVE-2024-23058 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/6/TOTOlink%20A3300R%20setTr069Cfg.md
|
|
CVE-2024-23059 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/2/TOTOlink%20A3300R%20setDdnsCfg.md
|
|
CVE-2024-23060 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/4/TOTOLINK%20A3300R%20setDmzCfg.md
|
|
CVE-2024-23061 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/3/TOTOLINK%20A3300R%20setScheduleCfg.md
|
|
CVE-2024-2307 - https://bugzilla.redhat.com/show_bug.cgi?id=2268513
|
|
CVE-2024-2309 - https://wpscan.com/vulnerability/a4152818-1e07-46a7-aec4-70f1a1b579a6/
|
|
CVE-2024-23094 - https://github.com/TinkAnet/cve/blob/main/csrf3.md
|
|
CVE-2024-2310 - https://wpscan.com/vulnerability/7a2c173c-19e3-4f48-b3af-14790b5b8e94/
|
|
CVE-2024-2318 - https://gist.github.com/whiteman007/a3b25a7ddf38774329d72930e0cd841a
|
|
CVE-2024-2322 - https://wpscan.com/vulnerability/c740ed3b-d6b8-4afc-8c6b-a1ec37597055/
|
|
CVE-2024-2329 - https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_resource_icon.md
|
|
CVE-2024-2330 - https://github.com/jikedaodao/cve/blob/main/NS-ASG-sql-addmacbind.md
|
|
CVE-2024-23301 - https://github.com/rear/rear/pull/3123
|
|
CVE-2024-2332 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Blind%20SQL%20Injection%20Manage%20Category%20-%20Mobile%20Management%20Store.md
|
|
CVE-2024-23329 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-hcvp-2cc7-jrwr
|
|
CVE-2024-2333 - https://github.com/0x404Ming/CVE_Hunter/blob/main/SQLi-3.md
|
|
CVE-2024-23330 - https://github.com/tutao/tutanota/security/advisories/GHSA-32w8-v5fc-vpp7
|
|
CVE-2024-23331 - https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw
|
|
CVE-2024-23334 - https://github.com/aio-libs/aiohttp/pull/8079
|
|
CVE-2024-23342 - https://minerva.crocs.fi.muni.cz/
|
|
CVE-2024-23346 - https://github.com/materialsproject/pymatgen/security/advisories/GHSA-vgv8-5cpj-qj2f
|
|
CVE-2024-2344 - https://gist.github.com/Xib3rR4dAr/05a32f63d75082ab05de27e313e70fa3
|
|
CVE-2024-23446 - https://www.elastic.co/community/security
|
|
CVE-2024-23447 - https://www.elastic.co/community/security
|
|
CVE-2024-23448 - https://www.elastic.co/community/security
|
|
CVE-2024-23450 - https://www.elastic.co/community/security
|
|
CVE-2024-23525 - https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a
|
|
CVE-2024-23525 - https://metacpan.org/release/NUDDLEGG/Spreadsheet-ParseXLSX-0.30/changes
|
|
CVE-2024-23525 - https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html
|
|
CVE-2024-2353 - https://github.com/OraclePi/repo/blob/main/totolink%20X6000R/1/X6000R%20AX3000%20WiFi%206%20Giga%20unauthed%20rce.md
|
|
CVE-2024-2355 - https://vuldb.com/?id.256315
|
|
CVE-2024-23633 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-fq23-g58m-799r
|
|
CVE-2024-23634 - https://github.com/geoserver/geoserver/security/advisories/GHSA-75m5-hh4r-q9gx
|
|
CVE-2024-23634 - https://osgeo-org.atlassian.net/browse/GEOS-11213
|
|
CVE-2024-2364 - https://github.com/ctflearner/Android_Findings/blob/main/Musicshelf/Musicshelf_Manifest_issue.md
|
|
CVE-2024-23640 - https://github.com/geoserver/geoserver/security/advisories/GHSA-9rfr-pf2x-g4xf
|
|
CVE-2024-23640 - https://osgeo-org.atlassian.net/browse/GEOS-11149
|
|
CVE-2024-23640 - https://osgeo-org.atlassian.net/browse/GEOS-11155
|
|
CVE-2024-23641 - https://github.com/sveltejs/kit/security/advisories/GHSA-g5m6-hxpp-fc49
|
|
CVE-2024-23642 - https://github.com/geoserver/geoserver/security/advisories/GHSA-fg9v-56hw-g525
|
|
CVE-2024-23642 - https://osgeo-org.atlassian.net/browse/GEOS-11152
|
|
CVE-2024-23643 - https://github.com/geoserver/geoserver/security/advisories/GHSA-56r3-f536-5gf7
|
|
CVE-2024-23646 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-cwx6-4wmf-c6xv
|
|
CVE-2024-23648 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-mrqg-mwh7-q94j
|
|
CVE-2024-23649 - https://github.com/LemmyNet/lemmy/security/advisories/GHSA-r64r-5h43-26qv
|
|
CVE-2024-2365 - https://github.com/ctflearner/Android_Findings/blob/main/Musicshelf/Weak_Hashing_Algorithms.md
|
|
CVE-2024-23655 - https://github.com/tutao/tutanota/security/advisories/GHSA-5h47-g927-629g
|
|
CVE-2024-23656 - https://github.com/dexidp/dex/security/advisories/GHSA-gr79-9v6v-gc9r
|
|
CVE-2024-23660 - https://secbit.io/blog/en/2024/01/19/trust-wallets-fomo3d-summer-vuln/
|
|
CVE-2024-23674 - https://ctrlalt.medium.com/space-attack-spoofing-eids-password-authenticated-connection-establishment-11561e5657b1
|
|
CVE-2024-23681 - https://github.com/advisories/GHSA-98hq-4wmw-98w9
|
|
CVE-2024-23681 - https://github.com/ls1intum/Ares/security/advisories/GHSA-98hq-4wmw-98w9
|
|
CVE-2024-23686 - https://github.com/advisories/GHSA-qqhq-8r2c-c3f5
|
|
CVE-2024-23686 - https://github.com/jeremylong/DependencyCheck/security/advisories/GHSA-qqhq-8r2c-c3f5
|
|
CVE-2024-2369 - https://wpscan.com/vulnerability/252dfc35-4c8c-4304-aa09-73dfe986b10d/
|
|
CVE-2024-23709 - https://android.googlesource.com/platform/external/sonivox/+/3f798575d2d39cd190797427d13471d6e7ceae4c
|
|
CVE-2024-23717 - https://android.googlesource.com/platform/packages/modules/Bluetooth/+/c5c528beb6e1cfed3ec93a3a264084df32ce83c2
|
|
CVE-2024-23722 - https://medium.com/@adurands82/fluent-bit-dos-vulnerability-cve-2024-23722-4e3e74af9d00
|
|
CVE-2024-23724 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724
|
|
CVE-2024-23745 - https://blog.xpnsec.com/dirtynib/
|
|
CVE-2024-23745 - https://chromium.googlesource.com/chromium/src/+/master/docs/security/faq.md#Why-arent-physically_local-attacks-in-Chromes-threat-model
|
|
CVE-2024-23745 - https://github.com/louiselalanne/CVE-2024-23745
|
|
CVE-2024-23746 - https://github.com/louiselalanne/CVE-2024-23746
|
|
CVE-2024-23747 - https://github.com/louiselalanne/CVE-2024-23747
|
|
CVE-2024-23749 - http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html
|
|
CVE-2024-23749 - http://seclists.org/fulldisclosure/2024/Feb/14
|
|
CVE-2024-23752 - https://github.com/gventuri/pandas-ai/issues/868
|
|
CVE-2024-23756 - https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23756
|
|
CVE-2024-23759 - https://herolab.usd.de/security-advisories/usd-2023-0046/
|
|
CVE-2024-23760 - https://herolab.usd.de/security-advisories/usd-2023-0050/
|
|
CVE-2024-23761 - https://herolab.usd.de/security-advisories/usd-2023-0048/
|
|
CVE-2024-23762 - https://herolab.usd.de/security-advisories/usd-2023-0049/
|
|
CVE-2024-23763 - https://herolab.usd.de/security-advisories/usd-2023-0047/
|
|
CVE-2024-23817 - https://github.com/Dolibarr/dolibarr/security/advisories/GHSA-7947-48q7-cp5m
|
|
CVE-2024-23818 - https://osgeo-org.atlassian.net/browse/GEOS-11153
|
|
CVE-2024-23819 - https://osgeo-org.atlassian.net/browse/GEOS-11154
|
|
CVE-2024-23822 - https://github.com/sni/Thruk/security/advisories/GHSA-4mrh-mx7x-rqjx
|
|
CVE-2024-23824 - https://github.com/0xbunniee/MailCow-Pixel-Flood-Attack
|
|
CVE-2024-23824 - https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-45rv-3c5p-w4h7
|
|
CVE-2024-23825 - https://github.com/TablePress/TablePress/security/advisories/GHSA-x8rf-c8x6-mrpg
|
|
CVE-2024-23826 - https://github.com/spbu-se/spbu_se_site/security/advisories/GHSA-5vfc-v7hg-pvwm
|
|
CVE-2024-23827 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227m
|
|
CVE-2024-23829 - https://github.com/aio-libs/aiohttp/pull/8074
|
|
CVE-2024-23829 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2
|
|
CVE-2024-23833 - https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-6p92-qfqf-qwx4
|
|
CVE-2024-23837 - https://redmine.openinfosecfoundation.org/issues/6444
|
|
CVE-2024-23850 - https://lore.kernel.org/lkml/CALGdzuo6awWdau3X=8XK547x2vX_-VoFmH1aPsqosRTQ5WzJVA@mail.gmail.com/
|
|
CVE-2024-23897 - http://packetstormsecurity.com/files/176839/Jenkins-2.441-LTS-2.426.3-CVE-2024-23897-Scanner.html
|
|
CVE-2024-23897 - http://packetstormsecurity.com/files/176840/Jenkins-2.441-LTS-2.426.3-Arbitrary-File-Read.html
|
|
CVE-2024-2391 - https://www.exploit-db.com/exploits/51153
|
|
CVE-2024-2394 - https://github.com/LiAoRJ/CVE_Hunter/blob/main/RCE-1.md
|
|
CVE-2024-23940 - https://medium.com/@s1kr10s/av-when-a-friend-becomes-an-enemy-55f41aba42b1
|
|
CVE-2024-23985 - https://packetstormsecurity.com/files/176663/EzServer-6.4.017-Denial-Of-Service.html
|
|
CVE-2024-24001 - https://github.com/jishenghua/jshERP/issues/99
|
|
CVE-2024-24002 - https://github.com/jishenghua/jshERP/issues/99
|
|
CVE-2024-24003 - https://github.com/jishenghua/jshERP/issues/99
|
|
CVE-2024-24004 - https://github.com/jishenghua/jshERP/issues/99
|
|
CVE-2024-2402 - https://wpscan.com/vulnerability/98e050cf-5686-4216-bad1-575decf3eaa7/
|
|
CVE-2024-24034 - https://github.com/ELIZEUOPAIN/CVE-2024-24034/tree/main
|
|
CVE-2024-24035 - https://github.com/ELIZEUOPAIN/CVE-2024-24035/tree/main
|
|
CVE-2024-2404 - https://wpscan.com/vulnerability/a2cb7167-9edc-4640-87eb-4c511639e5b7/
|
|
CVE-2024-24041 - https://github.com/tubakvgc/CVE/blob/main/Travel_Journal_App.md
|
|
CVE-2024-24041 - https://portswigger.net/web-security/cross-site-scripting
|
|
CVE-2024-2405 - https://wpscan.com/vulnerability/c42ffa15-6ebe-4c70-9e51-b95bd05ea04d/
|
|
CVE-2024-24050 - https://www.muratcagrialis.com/workout-journal-app-stored-xss-cve-2024-24050
|
|
CVE-2024-24059 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#2-file-upload-vulnerability
|
|
CVE-2024-24062 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#12-stored-cross-site-scripting-sysrole
|
|
CVE-2024-24115 - https://mechaneus.github.io/CVE-2024-24115.html
|
|
CVE-2024-24115 - https://mechaneus.github.io/CVE-PENDING-COTONTI.html
|
|
CVE-2024-24130 - https://github.com/Hebing123/cve/issues/13
|
|
CVE-2024-24131 - https://github.com/Hebing123/cve/issues/14
|
|
CVE-2024-24133 - https://github.com/Hebing123/cve/issues/16
|
|
CVE-2024-24134 - https://github.com/BurakSevben/2024_Online_Food_Menu_XSS/
|
|
CVE-2024-24135 - https://github.com/BurakSevben/2024_Product_Inventory_with_Export_to_Excel_XSS/
|
|
CVE-2024-24136 - https://github.com/BurakSevben/2024_Math_Game_XSS
|
|
CVE-2024-24139 - https://github.com/BurakSevben/Login_System_with_Email_Verification_SQL_Injection/
|
|
CVE-2024-24140 - https://github.com/BurakSevben/Daily_Habit_Tracker_App_SQL_Injection
|
|
CVE-2024-24141 - https://github.com/BurakSevben/School-Task-Manager-System-SQLi-1
|
|
CVE-2024-24142 - https://github.com/BurakSevben/School-Task-Manager-SQL-Injection-2
|
|
CVE-2024-24146 - https://github.com/libming/libming/issues/307
|
|
CVE-2024-24147 - https://github.com/libming/libming/issues/311
|
|
CVE-2024-24148 - https://github.com/libming/libming/issues/308
|
|
CVE-2024-24149 - https://github.com/libming/libming/issues/310
|
|
CVE-2024-24150 - https://github.com/libming/libming/issues/309
|
|
CVE-2024-24155 - https://github.com/axiomatic-systems/Bento4/issues/919
|
|
CVE-2024-24156 - https://github.com/gnuboard/g6/issues/316
|
|
CVE-2024-24160 - https://github.com/wy876/cve/issues/1
|
|
CVE-2024-24161 - https://github.com/wy876/cve/issues/2
|
|
CVE-2024-24186 - https://github.com/pcmacdon/jsish/issues/98
|
|
CVE-2024-24188 - https://github.com/pcmacdon/jsish/issues/100
|
|
CVE-2024-24189 - https://github.com/pcmacdon/jsish/issues/101
|
|
CVE-2024-24246 - https://github.com/qpdf/qpdf/issues/1123
|
|
CVE-2024-24256 - https://github.com/l8l1/killl.github.io/blob/main/3.md
|
|
CVE-2024-2428 - https://wpscan.com/vulnerability/4832e223-4571-4b45-97db-2fd403797c49/
|
|
CVE-2024-2429 - https://wpscan.com/vulnerability/1c6812d8-a218-4c15-9e2d-d43f3f3b0e78/
|
|
CVE-2024-24300 - https://github.com/yckuo-sdc/PoC
|
|
CVE-2024-24301 - https://github.com/yckuo-sdc/PoC
|
|
CVE-2024-2432 - https://security.paloaltonetworks.com/CVE-2024-2432
|
|
CVE-2024-24321 - https://github.com/dkjiayu/Vul/blob/main/DIR816A2-dir_setWanWifi.md
|
|
CVE-2024-24321 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2024-24325 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/11/TOTOlink%20A3300R%20setParentalRules.md
|
|
CVE-2024-24326 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/8/TOTOlink%20A3300R%20setStaticDhcpRules.md
|
|
CVE-2024-24327 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/7/TOTOlink%20A3300R%20setIpv6Cfg.md
|
|
CVE-2024-24328 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/12/TOTOlink%20A3300R%20setMacFilterRules.md
|
|
CVE-2024-24329 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/10/TOTOlink%20A3300R%20setPortForwardRules.md
|
|
CVE-2024-24330 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/14/TOTOlink%20A3300R%20setRemoteCfg.md
|
|
CVE-2024-24331 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/13/TOTOlink%20A3300R%20setWiFiScheduleCfg.md
|
|
CVE-2024-24332 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/9/TOTOlink%20A3300R%20setUrlFilterRules.md
|
|
CVE-2024-24333 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/15/TOTOlink%20A3300R%20setWiFiAclRules.md
|
|
CVE-2024-24336 - https://nitipoom-jar.github.io/CVE-2024-24336/
|
|
CVE-2024-24337 - https://nitipoom-jar.github.io/CVE-2024-24337/
|
|
CVE-2024-2439 - https://wpscan.com/vulnerability/7a375077-fc70-4389-b109-28fce3db2aef/
|
|
CVE-2024-24396 - https://cves.at/posts/cve-2024-24396/writeup/
|
|
CVE-2024-24397 - https://cves.at/posts/cve-2024-24397/writeup/
|
|
CVE-2024-24398 - https://cves.at/posts/cve-2024-24398/writeup/
|
|
CVE-2024-24399 - https://packetstormsecurity.com/files/176647/Lepton-CMS-7.0.0-Remote-Code-Execution.html
|
|
CVE-2024-2441 - https://wpscan.com/vulnerability/9647e273-5724-4a02-868d-9b79f4bb2b79/
|
|
CVE-2024-2444 - https://wpscan.com/vulnerability/214e5fd7-8684-418a-b67d-60b1dcf11a48/
|
|
CVE-2024-24468 - https://github.com/tang-0717/cms/blob/main/3.md
|
|
CVE-2024-24469 - https://github.com/tang-0717/cms/blob/main/2.md
|
|
CVE-2024-24470 - https://github.com/tang-0717/cms/blob/main/1.md
|
|
CVE-2024-24482 - https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-vgwr-4w3p-xmjv
|
|
CVE-2024-24494 - https://github.com/0xQRx/VunerabilityResearch/blob/master/2024/DailyHabitTracker-Stored_XSS.md
|
|
CVE-2024-24495 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/DailyHabitTracker-SQL_Injection.md
|
|
CVE-2024-24496 - https://github.com/0xQRx/VunerabilityResearch/blob/master/2024/DailyHabitTracker-Broken_Access_Control.md
|
|
CVE-2024-24497 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/EmployeeManagementSystem-SQL_Injection_Admin_Login.md
|
|
CVE-2024-24498 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/EmployeeManagementSystem-Unauthenticated_Unrestricted_File_Upload_To_RCE.md
|
|
CVE-2024-24499 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/EmployeeManagementSystem-SQL_Injection_Admin_Update_Profile.md
|
|
CVE-2024-24506 - https://bugs.limesurvey.org/bug_relationship_graph.php?bug_id=19364&graph=relation
|
|
CVE-2024-24506 - https://www.exploit-db.com/exploits/51926
|
|
CVE-2024-24511 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-24511%20-%3E%20Stored%20XSS%20in%20input%20Title%20of%20the%20Component
|
|
CVE-2024-24512 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-24512%20-%3E%20Stored%20XSS%20in%20input%20SubTitle%20of%20the%20Component
|
|
CVE-2024-24524 - https://github.com/harryrabbit5651/cms/blob/main/1.md
|
|
CVE-2024-2453 - https://www.cisa.gov/news-events/ics-advisories/icsa-24-081-01
|
|
CVE-2024-24543 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0130/setSchedWifi.md
|
|
CVE-2024-24559 - https://github.com/vyperlang/vyper/security/advisories/GHSA-6845-xw22-ffxv
|
|
CVE-2024-24560 - https://github.com/vyperlang/vyper/security/advisories/GHSA-gp3w-2v2m-p686
|
|
CVE-2024-24561 - https://github.com/vyperlang/vyper/security/advisories/GHSA-9x7f-gwxq-6f2c
|
|
CVE-2024-24563 - https://github.com/vyperlang/vyper/security/advisories/GHSA-52xq-j7v9-v4v2
|
|
CVE-2024-24564 - https://github.com/vyperlang/vyper/security/advisories/GHSA-4hwq-4cpm-8vmx
|
|
CVE-2024-24565 - https://github.com/crate/crate/security/advisories/GHSA-475g-vj6c-xf96
|
|
CVE-2024-24566 - https://github.com/lobehub/lobe-chat/security/advisories/GHSA-pf55-fj96-xf37
|
|
CVE-2024-24569 - https://github.com/pixee/java-security-toolkit/security/advisories/GHSA-qh4g-4m4w-jgv2
|
|
CVE-2024-24570 - http://packetstormsecurity.com/files/177133/Statamic-CMS-Cross-Site-Scripting.html
|
|
CVE-2024-24570 - http://seclists.org/fulldisclosure/2024/Feb/17
|
|
CVE-2024-24571 - https://github.com/WillyXJ/facileManager/security/advisories/GHSA-h7w3-xv88-2xqj
|
|
CVE-2024-24572 - https://github.com/WillyXJ/facileManager/security/advisories/GHSA-xw34-8pj6-75gc
|
|
CVE-2024-24573 - https://github.com/WillyXJ/facileManager/security/advisories/GHSA-w67q-pp62-j4pf
|
|
CVE-2024-24574 - https://github.com/thorsten/phpMyFAQ/pull/2827
|
|
CVE-2024-24574 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-7m8g-fprr-47fx
|
|
CVE-2024-24578 - https://github.com/jens-maus/RaspberryMatic/security/advisories/GHSA-q967-q4j8-637h
|
|
CVE-2024-24707 - https://snicco.io/vulnerability-disclosure/cwicly/remote-code-execution-cwicly-1-4-0-2?_s_id=cve
|
|
CVE-2024-24724 - https://packetstormsecurity.com/files/177857
|
|
CVE-2024-24725 - https://www.exploit-db.com/exploits/51903
|
|
CVE-2024-24736 - https://packetstormsecurity.com/files/176784/YahooPOPs-1.6-Denial-Of-Service.html
|
|
CVE-2024-24747 - https://github.com/minio/minio/security/advisories/GHSA-xx8w-mq23-29g4
|
|
CVE-2024-24752 - https://github.com/brefphp/bref/security/advisories/GHSA-x4hh-frx8-98r5
|
|
CVE-2024-24753 - https://github.com/brefphp/bref/security/advisories/GHSA-99f9-gv72-fw9r
|
|
CVE-2024-24754 - https://github.com/brefphp/bref/security/advisories/GHSA-82vx-mm6r-gg8w
|
|
CVE-2024-24756 - https://github.com/crafatar/crafatar/security/advisories/GHSA-5cxq-25mp-q5f2
|
|
CVE-2024-24762 - https://github.com/Kludex/python-multipart/security/advisories/GHSA-2jv5-9r88-3w3p
|
|
CVE-2024-24762 - https://github.com/encode/starlette/security/advisories/GHSA-93gm-qmq6-w238
|
|
CVE-2024-24762 - https://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389
|
|
CVE-2024-24765 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-h5gf-cmm8-cg7c
|
|
CVE-2024-24766 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c967-2652-gfjm
|
|
CVE-2024-24767 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x
|
|
CVE-2024-24768 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-9xfw-jjq2-7v8h
|
|
CVE-2024-24793 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931
|
|
CVE-2024-24793 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1931
|
|
CVE-2024-24794 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931
|
|
CVE-2024-24794 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1931
|
|
CVE-2024-24806 - http://www.openwall.com/lists/oss-security/2024/02/08/2
|
|
CVE-2024-24806 - https://github.com/libuv/libuv/security/advisories/GHSA-f74f-cvh7-c6q6
|
|
CVE-2024-24808 - https://github.com/pyload/pyload/security/advisories/GHSA-g3cm-qg2v-2hj5
|
|
CVE-2024-24809 - https://github.com/traccar/traccar/security/advisories/GHSA-vhrw-72f6-gwp5
|
|
CVE-2024-24810 - https://github.com/wixtoolset/issues/security/advisories/GHSA-7wh2-wxc7-9ph5
|
|
CVE-2024-24814 - https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-hxr6-w4gc-7vvv
|
|
CVE-2024-24818 - https://github.com/espocrm/espocrm/security/advisories/GHSA-8gv6-8r33-fm7j
|
|
CVE-2024-24824 - https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-p6gg-5hf4-4rgj
|
|
CVE-2024-24830 - https://github.com/openobserve/openobserve/security/advisories/GHSA-hfxx-g56f-8h5v
|
|
CVE-2024-2485 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/SetSpeedWan.md
|
|
CVE-2024-2485 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md
|
|
CVE-2024-2489 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetQosBand.md
|
|
CVE-2024-2490 - https://github.com/Emilytutu/IoT-vulnerable/blob/main/Tenda/AC18/setSchedWifi_end.md
|
|
CVE-2024-24945 - https://github.com/tubakvgc/CVE/blob/main/Travel_Journal_App.md
|
|
CVE-2024-24945 - https://portswigger.net/web-security/cross-site-scripting
|
|
CVE-2024-25003 - http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html
|
|
CVE-2024-25003 - http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html
|
|
CVE-2024-25003 - http://seclists.org/fulldisclosure/2024/Feb/14
|
|
CVE-2024-25003 - https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004
|
|
CVE-2024-25004 - http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html
|
|
CVE-2024-25004 - http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html
|
|
CVE-2024-25004 - http://seclists.org/fulldisclosure/2024/Feb/14
|
|
CVE-2024-25004 - https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004
|
|
CVE-2024-25007 - https://www.ericsson.com/en/about-us/security/psirt/security-bulletin--ericsson-network-manager-march-2024
|
|
CVE-2024-2505 - https://wpscan.com/vulnerability/9b3d6148-ecee-4e59-84a4-3b3e9898473b/
|
|
CVE-2024-2509 - https://research.cleantalk.org/cve-2024-2509/
|
|
CVE-2024-2509 - https://wpscan.com/vulnerability/dec4a632-e04b-4fdd-86e4-48304b892a4f/
|
|
CVE-2024-25106 - https://github.com/openobserve/openobserve/security/advisories/GHSA-3m5f-9m66-xgp7
|
|
CVE-2024-25108 - https://github.com/pixelfed/pixelfed/security/advisories/GHSA-gccq-h3xj-jgvf
|
|
CVE-2024-25117 - https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-f3qr-qr4x-j273
|
|
CVE-2024-25122 - https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38
|
|
CVE-2024-25123 - https://github.com/Open-MSS/MSS/security/advisories/GHSA-pf2h-qjcr-qvq2
|
|
CVE-2024-25124 - http://blog.portswigger.net/2016/10/exploiting-cors-misconfigurations-for.html
|
|
CVE-2024-25124 - https://github.com/gofiber/fiber/security/advisories/GHSA-fmg4-x8pw-hjhg
|
|
CVE-2024-25126 - https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx
|
|
CVE-2024-2515 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20home.php.md
|
|
CVE-2024-2516 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20home.php.md
|
|
CVE-2024-25164 - https://github.com/u32i/cve/tree/main/CVE-2024-25164
|
|
CVE-2024-25165 - https://github.com/matthiaskramm/swftools/issues/217
|
|
CVE-2024-25166 - https://github.com/xiaocheng-keji/71cms/issues/1
|
|
CVE-2024-25167 - https://github.com/biantaibao/eblog_xss/blob/main/report.md
|
|
CVE-2024-25168 - https://github.com/biantaibao/snow_SQL/blob/main/report.md
|
|
CVE-2024-25169 - https://github.com/shenhav12/CVE-2024-25169-Mezzanine-v6.0.0
|
|
CVE-2024-2517 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20book_history.php.md
|
|
CVE-2024-25170 - https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0
|
|
CVE-2024-2518 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20book_history.php.md
|
|
CVE-2024-25180 - https://github.com/joaoviictorti/My-CVES/blob/main/CVE-2024-25180/README.md
|
|
CVE-2024-25180 - https://security.snyk.io/vuln/SNYK-JS-PDFMAKE-6347243
|
|
CVE-2024-2519 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20navbar.php.md
|
|
CVE-2024-25197 - https://github.com/ros-planning/navigation2/issues/3940
|
|
CVE-2024-2520 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20bookdate.php.md
|
|
CVE-2024-25200 - https://github.com/espruino/Espruino/issues/2457
|
|
CVE-2024-25201 - https://github.com/espruino/Espruino/issues/2456
|
|
CVE-2024-25202 - https://github.com/Agampreet-Singh/CVE-2024-25202
|
|
CVE-2024-25202 - https://medium.com/@agampreetsingh_93704/cve-2024-25202-discover-by-agampreet-singh-cyber-security-expert-ff8e32f5cf52
|
|
CVE-2024-25207 - https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20XSS-2.md
|
|
CVE-2024-25208 - https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20XSS-1.md
|
|
CVE-2024-25209 - https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20SQL%20Injection.md
|
|
CVE-2024-2521 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20bookdate.php.md
|
|
CVE-2024-25210 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Expense%20Tracker/Simple%20Expense%20Tacker%20-%20SQL%20Injection-1.md
|
|
CVE-2024-25211 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Expense%20Tracker/Simple%20Expense%20Tracker%20-%20SQL%20Injection-2.md
|
|
CVE-2024-25212 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%204.md
|
|
CVE-2024-25213 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%203.md
|
|
CVE-2024-25214 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20Authentication%20Bypass.md
|
|
CVE-2024-25215 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%202.md
|
|
CVE-2024-25216 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%201.md
|
|
CVE-2024-25217 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Medicine%20Ordering%20System/OMOS%20-%20SQL%20Injection(Unauthenticated).md
|
|
CVE-2024-25218 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-1.md
|
|
CVE-2024-25219 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-%202.md
|
|
CVE-2024-2522 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20booktime.php.md
|
|
CVE-2024-2522 - https://vuldb.com/?id.256959
|
|
CVE-2024-25220 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20SQL%20Injection%20-%202.md
|
|
CVE-2024-25221 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-3.md
|
|
CVE-2024-25222 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20SQL%20Injection%20-%201.md
|
|
CVE-2024-25223 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20SQL%20Injection.md
|
|
CVE-2024-25224 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20Cross-Site-Scripting%20-%202.md
|
|
CVE-2024-25225 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20Cross-Site-Scripting%20-%201.md
|
|
CVE-2024-25226 - https://github.com/BurakSevben/CVEs/blob/main/Supplier%20Managment%20System/Supplier%20Managment%20System%20-%20SQL%20Injection.md
|
|
CVE-2024-25228 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/
|
|
CVE-2024-2523 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20booktime.php.md
|
|
CVE-2024-25239 - https://blu3ming.github.io/sourcecodester-employee-management-system-sql-injection/
|
|
CVE-2024-2524 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20receipt.php.md
|
|
CVE-2024-2525 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20receipt.php.md
|
|
CVE-2024-2526 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20rooms.php.md
|
|
CVE-2024-25260 - https://sourceware.org/bugzilla/show_bug.cgi?id=31058
|
|
CVE-2024-25262 - https://bugs.launchpad.net/ubuntu/+source/texlive-bin/+bug/2047912
|
|
CVE-2024-25269 - https://github.com/strukturag/libheif/issues/1073
|
|
CVE-2024-2527 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20rooms.php.md
|
|
CVE-2024-2528 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-rooms.php.md
|
|
CVE-2024-25288 - https://github.com/slims/slims9_bulian/issues/229
|
|
CVE-2024-2529 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Arbitrary%20File%20Upload%20-%20rooms.php.md
|
|
CVE-2024-25291 - https://github.com/ji-zzang/EQST-PoC/tree/main/2024/RCE/CVE-2024-25291
|
|
CVE-2024-25292 - https://github.com/ji-zzang/EQST-PoC/tree/main/2024/RCE/CVE-2024-25292
|
|
CVE-2024-25293 - https://github.com/EQSTLab/PoC/tree/main/2024/LCE/CVE-2024-25293
|
|
CVE-2024-25297 - https://github.com/CpyRe/I-Find-CVE-2024/blob/main/BLUDIT%20Stored%20XSS.md
|
|
CVE-2024-25298 - https://github.com/CpyRe/I-Find-CVE-2024/blob/main/REDAXO%20RCE.md
|
|
CVE-2024-2530 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20update-rooms.php.md
|
|
CVE-2024-25300 - https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-REDAXO/XSS.md
|
|
CVE-2024-25301 - https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-REDAXO/RCE.md
|
|
CVE-2024-25301 - https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39459
|
|
CVE-2024-25302 - https://github.com/tubakvgc/CVE/blob/main/Event_Student_Attendance_System.md
|
|
CVE-2024-25304 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-2.md
|
|
CVE-2024-25305 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20Authentication%20Bypass.md
|
|
CVE-2024-25306 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-1.md
|
|
CVE-2024-25307 - https://github.com/tubakvgc/CVEs/blob/main/Cinema%20Seat%20Reservation%20System/Cinema%20Seat%20Reservation%20System%20-%20SQL%20Injection.md
|
|
CVE-2024-25308 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-6.md
|
|
CVE-2024-25309 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-7.md
|
|
CVE-2024-2531 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Arbitrary%20File%20Upload%20-%20update-rooms.php.md
|
|
CVE-2024-25310 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-3.md
|
|
CVE-2024-25312 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-5.md
|
|
CVE-2024-25313 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20Authentication%20Bypass%20-%202.md
|
|
CVE-2024-25314 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-2.md
|
|
CVE-2024-25315 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-1.md
|
|
CVE-2024-25316 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-4.md
|
|
CVE-2024-25318 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-3.md
|
|
CVE-2024-2532 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-users.php.md
|
|
CVE-2024-25320 - https://github.com/cqliuke/cve/blob/main/sql.md
|
|
CVE-2024-25327 - https://packetstormsecurity.com/files/177500/FullCourt-Enterprise-8.2-Cross-Site-Scripting.html
|
|
CVE-2024-2533 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20update-users.php.md
|
|
CVE-2024-2534 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20users.php.md
|
|
CVE-2024-25343 - https://github.com/ShravanSinghRathore/Tenda-N300-F3-Router/wiki/Password-Policy-Bypass-Vulnerability-CVE%E2%80%902024%E2%80%9025343
|
|
CVE-2024-25344 - https://packetstormsecurity.com/files/177224/ITFlow-Cross-Site-Request-Forgery.html
|
|
CVE-2024-2535 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20users.php.md
|
|
CVE-2024-25350 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/ZooManagementSystem-SQL_Injection_Edit_Ticket.md
|
|
CVE-2024-25351 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/ZooManagementSystem-SQL_Injection_Change_Image.md
|
|
CVE-2024-25354 - https://gist.github.com/6en6ar/c3b11b4058b8e2bc54717408d451fb79
|
|
CVE-2024-25360 - https://github.com/leetsun/Hints/tree/main/moto-CX2L/4
|
|
CVE-2024-25366 - https://github.com/mz-automation/libiec61850/issues/492
|
|
CVE-2024-25369 - https://github.com/liyako/vulnerability/blob/main/POC/FUEL%20CMS%20Reflected%20Cross-Site%20Scripting%20(XSS).md
|
|
CVE-2024-25373 - https://github.com/cvdyfbwa/IoT-Tenda-Router/blob/main/sub_49B384.md
|
|
CVE-2024-2538 - https://gist.github.com/Xib3rR4dAr/b1eec00e844932c6f2f30a63024b404e
|
|
CVE-2024-25385 - https://github.com/hanxuer/crashes/blob/main/flvmeta/01/readme.md
|
|
CVE-2024-25385 - https://github.com/noirotm/flvmeta/issues/23
|
|
CVE-2024-25386 - https://gist.github.com/Shulelk/15c9ba8d6b54dd4256a50a24ac7dd0a2
|
|
CVE-2024-25386 - https://sec.1i6w31fen9.top/2024/02/02/dcf-operations-window-remote-command-execute/
|
|
CVE-2024-25398 - https://github.com/Nivedita-22/SRELAY-exploit-writeup/blob/main/Srelay.md
|
|
CVE-2024-25410 - https://github.com/flusity/flusity-CMS/issues/9
|
|
CVE-2024-25413 - https://github.com/capture0x/Magento-ver.-2.4.6
|
|
CVE-2024-25413 - https://packetstormsecurity.com/files/175801/FireBear-Improved-Import-And-Export-3.8.6-XSLT-Server-Side-Injection.html
|
|
CVE-2024-25414 - https://github.com/capture0x/CSZ_CMS
|
|
CVE-2024-25414 - https://packetstormsecurity.com/files/175889/CSZ-CMS-1.3.0-Shell-Upload.html
|
|
CVE-2024-25415 - https://github.com/capture0x/Phoenix
|
|
CVE-2024-25415 - https://packetstormsecurity.com/files/175913/CE-Phoenix-1.0.8.20-Remote-Command-Execution.html
|
|
CVE-2024-25417 - https://github.com/Carl0724/cms/blob/main/3.md
|
|
CVE-2024-25418 - https://github.com/Carl0724/cms/blob/main/2.md
|
|
CVE-2024-25419 - https://github.com/Carl0724/cms/blob/main/1.md
|
|
CVE-2024-25423 - https://github.com/DriverUnload/cve-2024-25423
|
|
CVE-2024-25428 - https://github.com/wuweiit/mushroom/issues/19
|
|
CVE-2024-2543 - https://gist.github.com/Xib3rR4dAr/a248426dfee107c6fda08e80f98fa894
|
|
CVE-2024-25434 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25434%20-%3E%20Stored%20XSS%20in%20input%20public%20name%20of%20the%20Component
|
|
CVE-2024-25435 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25435%20-%3E%20Reflected%20XSS%20on%20md1patient%20login%20page
|
|
CVE-2024-25436 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25438%20-%3E%20Stored%20XSS%20in%20input%20Subject%20of%20the%20Add%20Discussion%20Component%20under%20Submissions
|
|
CVE-2024-25438 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25438%20-%3E%20Stored%20XSS%20in%20input%20Subject%20of%20the%20Add%20Discussion%20Component%20under%20Submissions
|
|
CVE-2024-25442 - https://bugs.launchpad.net/hugin/+bug/2025032
|
|
CVE-2024-25443 - https://bugs.launchpad.net/hugin/+bug/2025035
|
|
CVE-2024-25445 - https://bugs.launchpad.net/hugin/+bug/2025038
|
|
CVE-2024-25446 - https://bugs.launchpad.net/hugin/+bug/2025037
|
|
CVE-2024-25447 - https://github.com/derf/feh/issues/709
|
|
CVE-2024-25448 - https://github.com/derf/feh/issues/711
|
|
CVE-2024-25450 - https://github.com/derf/feh/issues/712
|
|
CVE-2024-25451 - https://github.com/axiomatic-systems/Bento4/issues/872
|
|
CVE-2024-25452 - https://github.com/axiomatic-systems/Bento4/issues/873
|
|
CVE-2024-25453 - https://github.com/axiomatic-systems/Bento4/issues/204
|
|
CVE-2024-25453 - https://github.com/axiomatic-systems/Bento4/issues/874
|
|
CVE-2024-25454 - https://github.com/axiomatic-systems/Bento4/issues/875
|
|
CVE-2024-25458 - https://tanzhuyin.com/posts/cve-2024-25458/
|
|
CVE-2024-2546 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/A18/fromSetWirelessRepeat_a.md
|
|
CVE-2024-2547 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/R7WebsSecurityHandler.md
|
|
CVE-2024-25502 - https://github.com/flusity/flusity-CMS/issues/10
|
|
CVE-2024-25503 - https://github.com/EQSTLab/PoC/tree/main/2024/XSS/CVE-2024-25503
|
|
CVE-2024-25507 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#plan_template_previewaspx
|
|
CVE-2024-25508 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#bulletin_template_showaspx
|
|
CVE-2024-25509 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_file_downloadaspx
|
|
CVE-2024-25510 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#address_public_showaspx
|
|
CVE-2024-25511 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#address_public_newaspx
|
|
CVE-2024-25512 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#attachdownloadaspx
|
|
CVE-2024-25513 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#kaizen_downloadaspx
|
|
CVE-2024-25514 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_template_child_field_listaspx
|
|
CVE-2024-25517 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#mfaspx
|
|
CVE-2024-25518 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_get_fields_approveaspx
|
|
CVE-2024-25519 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_printaspx
|
|
CVE-2024-25520 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#sys_blogtemplate_newaspx
|
|
CVE-2024-25521 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_companyaspx
|
|
CVE-2024-25522 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_form_saveaspx
|
|
CVE-2024-25523 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#file_memoaspx
|
|
CVE-2024-25524 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#workplanattachdownloadaspx
|
|
CVE-2024-25526 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#pm_gatt_incaspx
|
|
CVE-2024-25527 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#worklog_template_showaspx
|
|
CVE-2024-25528 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_stat_settingaspx
|
|
CVE-2024-2553 - https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/CVE-2024-2553%20-%20Product%20Rating%20System%20-%20Cross-Site-Scripting.md
|
|
CVE-2024-25530 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_find_condictionaspx
|
|
CVE-2024-25531 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#searchcondictionaspx
|
|
CVE-2024-25533 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#information-leakage-and-unauthorized-access-to-sensitive-data
|
|
CVE-2024-2554 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#3sql-injection-vulnerability-in-update-employeephp
|
|
CVE-2024-2555 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-update-adminphp
|
|
CVE-2024-2556 - https://github.com/tht1997/WhiteBox/blob/main/sourcecodesters/employee-management-system-php-attendance-info.md
|
|
CVE-2024-2557 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Execute%20After%20Redirect%20-%20Food%20Management%20System.md
|
|
CVE-2024-25575 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1963
|
|
CVE-2024-25575 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1963
|
|
CVE-2024-2558 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formexeCommand.md
|
|
CVE-2024-2559 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolReboot.md
|
|
CVE-2024-2560 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolRestoreSet.md
|
|
CVE-2024-25618 - https://github.com/mastodon/mastodon/security/advisories/GHSA-vm39-j3vx-pch3
|
|
CVE-2024-25619 - https://github.com/mastodon/mastodon/security/advisories/GHSA-7w3c-p9j8-mq3x
|
|
CVE-2024-25625 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-3qpq-6w89-f7mx
|
|
CVE-2024-25627 - https://github.com/alfio-event/alf.io/security/advisories/GHSA-gpmg-8f92-37cf
|
|
CVE-2024-25634 - https://github.com/alfio-event/alf.io/security/advisories/GHSA-5wcv-pjc6-mxvv
|
|
CVE-2024-25635 - https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f
|
|
CVE-2024-25648 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1959
|
|
CVE-2024-25648 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1959
|
|
CVE-2024-25652 - https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25652
|
|
CVE-2024-25653 - https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25653
|
|
CVE-2024-2567 - https://github.com/ctflearner/Android_Findings/blob/main/AndroidWeatherApp/Android_backup.md
|
|
CVE-2024-25676 - https://excellium-services.com/cert-xlm-advisory/cve-2024-25676
|
|
CVE-2024-2568 - https://github.com/bigbigbigbaby/cms/blob/main/5.md
|
|
CVE-2024-2569 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20admin-manage-user.php.md
|
|
CVE-2024-2570 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20edit-task.php.md
|
|
CVE-2024-2571 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20manage-admin.php.md
|
|
CVE-2024-25712 - https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html
|
|
CVE-2024-25713 - https://github.com/ibireme/yyjson/security/advisories/GHSA-q4m7-9pcm-fpxh
|
|
CVE-2024-2572 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-details.php.md
|
|
CVE-2024-25728 - https://www.bleepingcomputer.com/news/security/expressvpn-bug-has-been-leaking-some-dns-requests-for-years/
|
|
CVE-2024-2573 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md
|
|
CVE-2024-25730 - https://github.com/actuator/cve/blob/main/Hitron/CVE-2024-25730
|
|
CVE-2024-25734 - http://packetstormsecurity.com/files/177081
|
|
CVE-2024-25735 - http://packetstormsecurity.com/files/177082
|
|
CVE-2024-25736 - http://packetstormsecurity.com/files/177083
|
|
CVE-2024-2574 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20edit-task.php.md
|
|
CVE-2024-25742 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9
|
|
CVE-2024-25746 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/add_white_node.md
|
|
CVE-2024-25748 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/fromSetIpMacBind.md
|
|
CVE-2024-2575 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20task-details.php.md
|
|
CVE-2024-25751 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/fromSetSysTime.md
|
|
CVE-2024-25753 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/formSetDeviceName.md
|
|
CVE-2024-25756 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/formWifiBasicSet.md
|
|
CVE-2024-2576 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-admin.php.md
|
|
CVE-2024-2577 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-employee.php.md
|
|
CVE-2024-2577 - https://vuldb.com/?id.257080
|
|
CVE-2024-25807 - https://github.com/Hebing123/cve/issues/17
|
|
CVE-2024-25808 - https://github.com/Hebing123/cve/issues/17
|
|
CVE-2024-2581 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/fromSetRouteStatic.md
|
|
CVE-2024-25811 - https://github.com/Fei123-design/vuln/blob/master/Dreamer%20CMS%20Unauthorized%20access%20vulnerability.md
|
|
CVE-2024-25817 - https://github.com/advisories/GHSA-3qx3-6hxr-j2ch
|
|
CVE-2024-25817 - https://www.cubeyond.net/blog/my-cves/eza-cve-report
|
|
CVE-2024-25828 - https://github.com/sec-Kode/cve
|
|
CVE-2024-2583 - https://wpscan.com/vulnerability/98d8c713-e8cd-4fad-a8fb-7a40db2742a2/
|
|
CVE-2024-25830 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report
|
|
CVE-2024-25831 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report
|
|
CVE-2024-25832 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report
|
|
CVE-2024-25833 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report
|
|
CVE-2024-25843 - https://security.friendsofpresta.org/modules/2024/02/27/ba_importer.html
|
|
CVE-2024-25850 - https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md
|
|
CVE-2024-25851 - https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md
|
|
CVE-2024-25851 - https://github.com/no1rr/Vulnerability/blob/master/netis/other_para_config_sequence.md
|
|
CVE-2024-25852 - https://github.com/ZackSecurity/VulnerReport/blob/cve/Linksys/1.md
|
|
CVE-2024-25866 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-SQL_Injection_Login.md
|
|
CVE-2024-25867 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-SQL_Injection_Add_Type.md
|
|
CVE-2024-25868 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-Stored_XSS_Add_Type.md
|
|
CVE-2024-25869 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-Unrestricted_Fileupload.md
|
|
CVE-2024-25873 - https://github.com/dd3x3r/enhavo/blob/main/html-injection-page-content-blockquote-author-v0.13.1.md
|
|
CVE-2024-25874 - https://github.com/dd3x3r/enhavo/blob/main/xss-create-tag-v0.13.1.md
|
|
CVE-2024-25875 - https://github.com/dd3x3r/enhavo/blob/main/xss-page-content-header-undertitel-v0.13.1.md
|
|
CVE-2024-25876 - https://github.com/dd3x3r/enhavo/blob/main/xss-page-content-header-titel-v0.13.1.md
|
|
CVE-2024-25891 - https://github.com/ChurchCRM/CRM/issues/6856
|
|
CVE-2024-25892 - https://github.com/ChurchCRM/CRM/issues/6858
|
|
CVE-2024-25893 - https://github.com/ChurchCRM/CRM/issues/6856
|
|
CVE-2024-25894 - https://github.com/ChurchCRM/CRM/issues/6849
|
|
CVE-2024-25895 - https://github.com/ChurchCRM/CRM/issues/6853
|
|
CVE-2024-25896 - https://github.com/ChurchCRM/CRM/issues/6854
|
|
CVE-2024-25897 - https://github.com/ChurchCRM/CRM/issues/6856
|
|
CVE-2024-25898 - https://github.com/ChurchCRM/CRM/issues/6851
|
|
CVE-2024-25938 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1958
|
|
CVE-2024-25938 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1958
|
|
CVE-2024-25973 - http://seclists.org/fulldisclosure/2024/Feb/23
|
|
CVE-2024-25973 - https://r.sec-consult.com/openolat
|
|
CVE-2024-25974 - http://seclists.org/fulldisclosure/2024/Feb/23
|
|
CVE-2024-25974 - https://r.sec-consult.com/openolat
|
|
CVE-2024-2603 - https://wpscan.com/vulnerability/b4186c03-99ee-4297-85c0-83b7053afc1c/
|
|
CVE-2024-2604 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20File%20Manager%20App/Arbitrary%20File%20Upload%20-%20update-file.php.md
|
|
CVE-2024-26134 - https://github.com/agronholm/cbor2/security/advisories/GHSA-375g-39jq-vq7m
|
|
CVE-2024-26135 - https://github.com/Ylianst/MeshCentral/security/advisories/GHSA-cp68-qrhr-g9h8
|
|
CVE-2024-26149 - https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w
|
|
CVE-2024-26152 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qfhg
|
|
CVE-2024-2627 - https://issues.chromium.org/issues/41493290
|
|
CVE-2024-26329 - https://x41-dsec.de/lab/advisories/x41-2024-001-chilkat-prng/
|
|
CVE-2024-26333 - https://github.com/matthiaskramm/swftools/issues/219
|
|
CVE-2024-26334 - https://github.com/matthiaskramm/swftools/issues/221
|
|
CVE-2024-26335 - https://github.com/matthiaskramm/swftools/issues/222
|
|
CVE-2024-26337 - https://github.com/matthiaskramm/swftools/issues/223
|
|
CVE-2024-26339 - https://github.com/matthiaskramm/swftools/issues/225
|
|
CVE-2024-26342 - https://github.com/Nicholas-wei/bug-discovery/blob/main/asus/2/ASUS_ac68u.md
|
|
CVE-2024-26349 - https://github.com/Icycu123/cms/blob/main/1.md
|
|
CVE-2024-26362 - https://packetstormsecurity.com/files/177075/Enpass-Desktop-Application-6.9.2-HTML-Injection.html
|
|
CVE-2024-26369 - https://github.com/eProsima/Fast-DDS/issues/4365
|
|
CVE-2024-26445 - https://github.com/xiaolanjing0/cms/blob/main/1.md
|
|
CVE-2024-26454 - https://github.com/OmRajpurkar/Healthcare-Chatbot/issues/4
|
|
CVE-2024-26454 - https://medium.com/@0x0d0x0a/healthcare-chatbot-xss-cve-2024-26454-acf2607bf210
|
|
CVE-2024-26470 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2024-26470
|
|
CVE-2024-26476 - https://github.com/mpdf/mpdf/issues/867
|
|
CVE-2024-26489 - https://github.com/2111715623/cms/blob/main/3.md
|
|
CVE-2024-26490 - https://github.com/2111715623/cms/blob/main/2.md
|
|
CVE-2024-26491 - https://github.com/2111715623/cms/blob/main/1.md
|
|
CVE-2024-26492 - https://packetstormsecurity.com/files/165555/Online-Diagnostic-Lab-Management-System-1.0-Missing-Access-Control.html
|
|
CVE-2024-26492 - https://www.exploit-db.com/exploits/50660
|
|
CVE-2024-26495 - https://github.com/friendica/friendica/issues/13884
|
|
CVE-2024-26504 - https://tomiodarim.io/posts/cve-2024-26504/
|
|
CVE-2024-26521 - https://github.com/capture0x/Phoenix
|
|
CVE-2024-26521 - https://github.com/hackervegas001/CVE-2024-26521
|
|
CVE-2024-26529 - https://github.com/mz-automation/libiec61850/issues/492
|
|
CVE-2024-26529 - https://github.com/mz-automation/libiec61850/issues/495
|
|
CVE-2024-26540 - https://github.com/GreycLab/CImg/issues/403
|
|
CVE-2024-26542 - https://github.com/c0d3x27/CVEs/blob/main/CVE-2024-26542/README.md
|
|
CVE-2024-26548 - https://github.com/cwh031600/vivotek/blob/main/vivotek-FD8166A-uploadfile-dos/vivotek-FD8166A-uploadfile-analysis.md
|
|
CVE-2024-26557 - https://github.com/Hebing123/cve/issues/18
|
|
CVE-2024-26559 - https://syst1m.cn/2024/01/22/U%E9%AA%8C%E8%AF%81%E7%BD%91%E7%BB%9C%E7%94%A8%E6%88%B7%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E/
|
|
CVE-2024-26577 - https://github.com/guusec/VSeeDoS
|
|
CVE-2024-26633 - https://git.kernel.org/stable/c/da23bd709b46168f7dfc36055801011222b076cd
|
|
CVE-2024-26798 - https://git.kernel.org/stable/c/00d6a284fcf3fad1b7e1b5bc3cd87cbfb60ce03f
|
|
CVE-2024-26798 - https://git.kernel.org/stable/c/20a4b5214f7bee13c897477168c77bbf79683c3d
|
|
CVE-2024-26798 - https://git.kernel.org/stable/c/2f91a96b892fab2f2543b4a55740c5bee36b1a6b
|
|
CVE-2024-26798 - https://git.kernel.org/stable/c/73a6bd68a1342f3a44cac9dffad81ad6a003e520
|
|
CVE-2024-26798 - https://git.kernel.org/stable/c/a2c881413dcc5d801bdc9535e51270cc88cb9cd8
|
|
CVE-2024-2690 - https://github.com/wkeyi0x1/vul-report/issues/2
|
|
CVE-2024-2697 - https://wpscan.com/vulnerability/c430b30d-61db-45f5-8499-91b491503b9c/
|
|
CVE-2024-26979 - https://git.kernel.org/stable/c/07c3fe923ff7eccf684fb4f8c953d0a7cc8ded73
|
|
CVE-2024-26979 - https://git.kernel.org/stable/c/517621b7060096e48e42f545fa6646fc00252eac
|
|
CVE-2024-26979 - https://git.kernel.org/stable/c/585fec7361e7850bead21fada49a7fcde2f2e791
|
|
CVE-2024-26979 - https://git.kernel.org/stable/c/899e154f9546fcae18065d74064889d08fff62c2
|
|
CVE-2024-26979 - https://git.kernel.org/stable/c/9cb3755b1e3680b720b74dbedfac889e904605c7
|
|
CVE-2024-26979 - https://git.kernel.org/stable/c/c560327d900bab968c2e1b4cd7fa2d46cd429e3d
|
|
CVE-2024-26979 - https://git.kernel.org/stable/c/ff41e0d4f3fa10d7cdd7d40f8026bea9fcc8b000
|
|
CVE-2024-27000 - https://git.kernel.org/stable/c/54c4ec5f8c471b7c1137a1f769648549c423c026
|
|
CVE-2024-2703 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetDeviceName_mac.md
|
|
CVE-2024-2704 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetFirewallCfg.md
|
|
CVE-2024-2705 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetQosBand.md
|
|
CVE-2024-2706 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formWifiWpsStart.md
|
|
CVE-2024-2707 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formWriteFacMac.md
|
|
CVE-2024-2708 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formexeCommand.md
|
|
CVE-2024-27081 - https://github.com/esphome/esphome/security/advisories/GHSA-8p25-3q46-8q2p
|
|
CVE-2024-27082 - https://github.com/Cacti/cacti/security/advisories/GHSA-j868-7vjp-rp9h
|
|
CVE-2024-27088 - https://github.com/medikoo/es5-ext/issues/201
|
|
CVE-2024-2709 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/fromSetRouteStatic.md
|
|
CVE-2024-27092 - https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-8r6h-8r68-q3pp
|
|
CVE-2024-27093 - https://github.com/stacklok/minder/security/advisories/GHSA-q6h8-4j2v-pjg4
|
|
CVE-2024-2710 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/setSchedWifi_start.md
|
|
CVE-2024-2711 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/addWifiMacFilter_deviceMac.md
|
|
CVE-2024-27132 - https://research.jfrog.com/vulnerabilities/mlflow-untrusted-recipe-xss-jfsa-2024-000631930/
|
|
CVE-2024-27133 - https://research.jfrog.com/vulnerabilities/mlflow-untrusted-dataset-xss-jfsa-2024-000631932/
|
|
CVE-2024-27285 - https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc
|
|
CVE-2024-27285 - https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml
|
|
CVE-2024-27287 - https://github.com/esphome/esphome/security/advisories/GHSA-9p43-hj5j-96h5
|
|
CVE-2024-2729 - https://wpscan.com/vulnerability/5014f886-020e-49d1-96a5-2159eed8ba14/
|
|
CVE-2024-27297 - https://hackmd.io/03UGerewRcy3db44JQoWvw
|
|
CVE-2024-27299 - https://drive.google.com/drive/folders/1BFL8GHIBxSUxu0TneYf66KjFA0A4RZga?usp=sharing
|
|
CVE-2024-27299 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-qgxx-4xv5-6hcw
|
|
CVE-2024-27300 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-q7g6-xfh2-vhpx
|
|
CVE-2024-27301 - https://github.com/root3nl/SupportApp/security/advisories/GHSA-jr78-247f-rhqc
|
|
CVE-2024-27302 - https://github.com/zeromicro/go-zero/security/advisories/GHSA-fgxv-gw55-r5fq
|
|
CVE-2024-27318 - https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479
|
|
CVE-2024-2738 - https://gist.github.com/Xib3rR4dAr/561ac3c17b92cb55d3032504a076fa4b
|
|
CVE-2024-2738 - https://gist.github.com/Xib3rR4dAr/b1eec00e844932c6f2f30a63024b404e
|
|
CVE-2024-2739 - https://wpscan.com/vulnerability/5b84145b-f94e-4ea7-84d5-56cf776817a2/
|
|
CVE-2024-27398 - https://git.kernel.org/stable/c/012363cb1bec5f33a7b94629ab2c1086f30280f2
|
|
CVE-2024-27398 - https://git.kernel.org/stable/c/1b33d55fb7355e27f8c82cd4ecd560f162469249
|
|
CVE-2024-27398 - https://git.kernel.org/stable/c/3212afd00e3cda790fd0583cb3eaef8f9575a014
|
|
CVE-2024-27398 - https://git.kernel.org/stable/c/33a6e92161a78c1073d90e27abe28d746feb0a53
|
|
CVE-2024-27398 - https://git.kernel.org/stable/c/483bc08181827fc475643272ffb69c533007e546
|
|
CVE-2024-27398 - https://git.kernel.org/stable/c/50c2037fc28df870ef29d9728c770c8955d32178
|
|
CVE-2024-27398 - https://git.kernel.org/stable/c/6a18eeb1b3bbc67c20d9609c31dca6a69b4bcde5
|
|
CVE-2024-27398 - https://git.kernel.org/stable/c/bfab2c1f7940a232cd519e82fff137e308abfd93
|
|
CVE-2024-27399 - https://git.kernel.org/stable/c/06acb75e7ed600d0bbf7bff5628aa8f24a97978c
|
|
CVE-2024-27399 - https://git.kernel.org/stable/c/6466ee65e5b27161c846c73ef407f49dfa1bd1d9
|
|
CVE-2024-27399 - https://git.kernel.org/stable/c/8960ff650aec70485b40771cd8e6e8c4cb467d33
|
|
CVE-2024-27399 - https://git.kernel.org/stable/c/955b5b6c54d95b5e7444dfc81c95c8e013f27ac0
|
|
CVE-2024-27399 - https://git.kernel.org/stable/c/adf0398cee86643b8eacde95f17d073d022f782c
|
|
CVE-2024-27399 - https://git.kernel.org/stable/c/e137e2ba96e51902dc2878131823a96bf8e638ae
|
|
CVE-2024-27399 - https://git.kernel.org/stable/c/e97e16433eb4533083b096a3824b93a5ca3aee79
|
|
CVE-2024-27399 - https://git.kernel.org/stable/c/eb86f955488c39526534211f2610e48a5cf8ead4
|
|
CVE-2024-2744 - https://wpscan.com/vulnerability/a5579c15-50ba-4618-95e4-04b2033d721f/
|
|
CVE-2024-27453 - https://www.exsiliumsecurity.com/CVE-2024-27453.html
|
|
CVE-2024-27474 - https://github.com/dead1nfluence/Leantime-POC/blob/main/README.md
|
|
CVE-2024-27476 - https://github.com/dead1nfluence/Leantime-POC/blob/main/README.md
|
|
CVE-2024-27477 - https://github.com/dead1nfluence/Leantime-POC/blob/main/README.md
|
|
CVE-2024-2749 - https://wpscan.com/vulnerability/c0640d3a-80b3-4cad-a3cf-fb5d86558e91/
|
|
CVE-2024-27515 - https://github.com/mindstellar/Osclass/issues/495
|
|
CVE-2024-27516 - https://github.com/LiveHelperChat/livehelperchat/issues/2054
|
|
CVE-2024-27517 - https://github.com/webasyst/webasyst-framework/issues/377
|
|
CVE-2024-27518 - https://github.com/secunnix/CVE-2024-27518
|
|
CVE-2024-27518 - https://www.youtube.com/watch?v=FM5XlZPdvdo
|
|
CVE-2024-27521 - https://github.com/SpikeReply/advisories/blob/main/cve/totolink/cve-2024-27521.md
|
|
CVE-2024-2754 - https://github.com/wkeyi0x1/vul-report/issues/4
|
|
CVE-2024-27558 - https://github.com/kilooooo/cms/blob/main/2.md
|
|
CVE-2024-27559 - https://github.com/kilooooo/cms/blob/main/1.md
|
|
CVE-2024-2756 - http://www.openwall.com/lists/oss-security/2024/04/12/11
|
|
CVE-2024-2756 - https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4
|
|
CVE-2024-27561 - https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_installUpdateThemePluginAction_plugins.md
|
|
CVE-2024-27563 - https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_pluginThemeUrl.md
|
|
CVE-2024-27564 - https://github.com/dirk1983/chatgpt/issues/114
|
|
CVE-2024-27565 - https://github.com/dirk1983/chatgpt-wechat-personal/issues/4
|
|
CVE-2024-27567 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/config_vpn_pptp.md
|
|
CVE-2024-27568 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/setupEC20Apn.md
|
|
CVE-2024-27569 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/init_nvram.md
|
|
CVE-2024-2757 - http://www.openwall.com/lists/oss-security/2024/04/12/11
|
|
CVE-2024-2757 - https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hwx-59fq
|
|
CVE-2024-27570 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/generate_conf_router.md
|
|
CVE-2024-27571 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/makeCurRemoteApList.md
|
|
CVE-2024-27572 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/updateCurAPlist.md
|
|
CVE-2024-27592 - https://medium.com/@nicatabbasov00002/open-redirect-vulnerability-62986ccaf0f7
|
|
CVE-2024-27593 - https://blog.smarttecs.com/posts/2024-002-cve-2024-27593/
|
|
CVE-2024-2760 - https://fluidattacks.com/advisories/kent/
|
|
CVE-2024-2761 - https://wpscan.com/vulnerability/e092ccdc-7ea1-4937-97b7-4cdbff5e74e5/
|
|
CVE-2024-27619 - https://github.com/ioprojecton/dir-3040_dos
|
|
CVE-2024-27619 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2024-27620 - https://packetstormsecurity.com/files/177506/Ladder-0.0.21-Server-Side-Request-Forgery.html
|
|
CVE-2024-27625 - https://packetstormsecurity.com/files/177243/CMS-Made-Simple-2.2.19-Cross-Site-Scripting.html
|
|
CVE-2024-27626 - https://packetstormsecurity.com/files/177239/Dotclear-2.29-Cross-Site-Scripting.html
|
|
CVE-2024-27627 - https://packetstormsecurity.com/files/177254/SuperCali-1.1.0-Cross-Site-Scripting.html
|
|
CVE-2024-2763 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetCfm.md
|
|
CVE-2024-27630 - https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3
|
|
CVE-2024-27631 - https://github.com/ally-petitt/CVE-2024-27631
|
|
CVE-2024-27631 - https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3
|
|
CVE-2024-27632 - https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3
|
|
CVE-2024-2764 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetPPTPServer.md
|
|
CVE-2024-27665 - https://github.com/Thirukrishnan/CVE-2024-27665/
|
|
CVE-2024-27668 - https://github.com/LY102483/cms/blob/main/1.md
|
|
CVE-2024-27680 - https://github.com/xiaolanjing0/cms/blob/main/4.md
|
|
CVE-2024-27683 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2024-27684 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2024-27689 - https://github.com/Xin246/cms/blob/main/2.md
|
|
CVE-2024-27694 - https://github.com/sms2056/cms/blob/main/1.md
|
|
CVE-2024-27703 - https://github.com/b-hermes/vulnerability-research/blob/main/CVE-2024-27703/README.md
|
|
CVE-2024-27705 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-27705
|
|
CVE-2024-27706 - https://github.com/b-hermes/vulnerability-research/blob/main/CVE-2024-27706/README.md
|
|
CVE-2024-27707 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-27707
|
|
CVE-2024-27718 - https://github.com/tldjgggg/cve/blob/main/sql.md
|
|
CVE-2024-27719 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-002
|
|
CVE-2024-27733 - https://github.com/Sadw11v/cve/blob/main/upload.md
|
|
CVE-2024-27734 - https://github.com/sms2056/cms/blob/main/3.md
|
|
CVE-2024-27743 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md
|
|
CVE-2024-27744 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md
|
|
CVE-2024-27746 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27746.md
|
|
CVE-2024-27747 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27747.md
|
|
CVE-2024-27752 - https://github.com/flyhha/cms/blob/main/1.md
|
|
CVE-2024-27757 - https://github.com/jubilianite/flusity-CMS/security/advisories/GHSA-5843-5m74-7fqh
|
|
CVE-2024-27758 - https://gist.github.com/renbou/957f70d27470982994f12a1d70153d09
|
|
CVE-2024-27916 - https://github.com/stacklok/minder/security/advisories/GHSA-v627-69v2-xx37
|
|
CVE-2024-27921 - https://github.com/getgrav/grav/security/advisories/GHSA-m7hx-hw6h-mqmc
|
|
CVE-2024-27923 - https://github.com/getgrav/grav/security/advisories/GHSA-f6g2-h7qv-3m5v
|
|
CVE-2024-27927 - https://github.com/DIYgod/RSSHub/security/advisories/GHSA-3p3p-cgj7-vgw3
|
|
CVE-2024-27932 - https://github.com/denoland/deno/security/advisories/GHSA-5frw-4rwq-xhcr
|
|
CVE-2024-27933 - https://github.com/denoland/deno/security/advisories/GHSA-6q4w-9x56-rmwq
|
|
CVE-2024-27934 - https://github.com/denoland/deno/security/advisories/GHSA-3j27-563v-28wf
|
|
CVE-2024-27935 - https://github.com/denoland/deno/security/advisories/GHSA-wrqv-pf6j-mqjp
|
|
CVE-2024-27936 - https://github.com/denoland/deno/security/advisories/GHSA-m4pq-fv2w-6hrw
|
|
CVE-2024-27938 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide
|
|
CVE-2024-2805 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/SetSpeedWan.md
|
|
CVE-2024-28056 - https://securitylabs.datadoghq.com/articles/amplified-exposure-how-aws-flaws-made-amplify-iam-roles-vulnerable-to-takeover/
|
|
CVE-2024-2806 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/addWifiMacFilter_deviceId.md
|
|
CVE-2024-28065 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-007.txt
|
|
CVE-2024-28066 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-008.txt
|
|
CVE-2024-2807 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formExpandDlnaFile.md
|
|
CVE-2024-2808 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formQuickIndex.md
|
|
CVE-2024-28085 - https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt
|
|
CVE-2024-28085 - https://www.openwall.com/lists/oss-security/2024/03/27/5
|
|
CVE-2024-28088 - https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md
|
|
CVE-2024-28089 - https://github.com/actuator/cve/blob/main/Hitron/CVE-2024-28089
|
|
CVE-2024-28089 - https://github.com/actuator/cve/blob/main/Hitron/Hitron_DOM_XSS_POC.gif
|
|
CVE-2024-28089 - https://github.com/actuator/cve/blob/main/Hitron/Hitron_DOM_XSS_POC_DOS_ALT.gif
|
|
CVE-2024-2809 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formSetFirewallCfg.md
|
|
CVE-2024-2810 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsOOB.md
|
|
CVE-2024-28102 - https://github.com/latchset/jwcrypto/security/advisories/GHSA-j857-7rvv-vj97
|
|
CVE-2024-28105 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-pwh2-fpfr-x5gf
|
|
CVE-2024-28106 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6p68-36m6-392r
|
|
CVE-2024-28107 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r
|
|
CVE-2024-28108 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-48vw-jpf8-hwqh
|
|
CVE-2024-2811 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsStart.md
|
|
CVE-2024-28116 - https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh
|
|
CVE-2024-28117 - https://github.com/getgrav/grav/security/advisories/GHSA-qfv4-q44r-g7rv
|
|
CVE-2024-28118 - https://github.com/getgrav/grav/security/advisories/GHSA-r6vw-8v8r-pmp4
|
|
CVE-2024-28119 - https://github.com/getgrav/grav/security/advisories/GHSA-2m7x-c7px-hp58
|
|
CVE-2024-2812 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWriteFacMac.md
|
|
CVE-2024-28120 - https://github.com/Exafunction/codeium-chrome/security/advisories/GHSA-8c7j-2h97-q63p
|
|
CVE-2024-28120 - https://securitylab.github.com/advisories/GHSL-2024-027_GHSL-2024-028_codeium-chrome
|
|
CVE-2024-28122 - https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259
|
|
CVE-2024-2813 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/form_fast_setting_wifi_set.md
|
|
CVE-2024-2814 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromDhcpListClient_page.md
|
|
CVE-2024-2815 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/R7WebsSecurityHandler.md
|
|
CVE-2024-2816 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolReboot.md
|
|
CVE-2024-2817 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolRestoreSet.md
|
|
CVE-2024-28185 - https://github.com/judge0/judge0/security/advisories/GHSA-h9g2-45c8-89cf
|
|
CVE-2024-28189 - https://github.com/judge0/judge0/security/advisories/GHSA-3xpw-36v7-2cmg
|
|
CVE-2024-28189 - https://github.com/judge0/judge0/security/advisories/GHSA-h9g2-45c8-89cf
|
|
CVE-2024-28192 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-c8wf-wcjc-2pvm
|
|
CVE-2024-28193 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-3782-758f-mj85
|
|
CVE-2024-28194 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-gvcr-g265-j827
|
|
CVE-2024-28195 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-hfgf-99p3-6fjj
|
|
CVE-2024-28196 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-m5x2-6hjm-cggq
|
|
CVE-2024-2821 - https://vuldb.com/?id.257708
|
|
CVE-2024-28224 - https://research.nccgroup.com/2024/04/08/technical-advisory-ollama-dns-rebinding-attack-cve-2024-28224/
|
|
CVE-2024-2823 - https://github.com/lcg-22266/cms/blob/main/1.md
|
|
CVE-2024-28231 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-9m2j-qw67-ph4w
|
|
CVE-2024-28232 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-hcw2-2r9c-gc6p
|
|
CVE-2024-28237 - https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-x7mf-wrh9-r76c
|
|
CVE-2024-28239 - https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p
|
|
CVE-2024-2824 - https://github.com/Matthias-Wandel/jhead/files/14613084/poc.zip
|
|
CVE-2024-2824 - https://github.com/Matthias-Wandel/jhead/issues/84
|
|
CVE-2024-28247 - https://github.com/pi-hole/pi-hole/security/advisories/GHSA-95g6-7q26-mp9x
|
|
CVE-2024-28253 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-7vf4-x5m2-r6gr
|
|
CVE-2024-28254 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-j86m-rrpr-g8gw
|
|
CVE-2024-28255 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-6wx7-qw5p-wh84
|
|
CVE-2024-28275 - https://paste.sr.ht/~edaigle/0b4a037fbd3166c8c72fee18efaa7decaf75b0ab
|
|
CVE-2024-28286 - https://github.com/mz-automation/libiec61850/issues/496
|
|
CVE-2024-28294 - https://gist.github.com/lx39214/248dc58c6d05455d4bd06c4d3df8e2d0
|
|
CVE-2024-28318 - https://github.com/gpac/gpac/issues/2764
|
|
CVE-2024-28319 - https://github.com/gpac/gpac/issues/2763
|
|
CVE-2024-28320 - https://packetstormsecurity.com/files/177326/Hospital-Management-System-1.0-Insecure-Direct-Object-Reference-Account-Takeover.html
|
|
CVE-2024-28320 - https://sospiro014.github.io/Hospital-Management-System-1.0-Insecure-Direct-Object-Reference-+-Account-Takeover
|
|
CVE-2024-28322 - https://github.com/Sospiro014/zday1/blob/main/event-managment.md
|
|
CVE-2024-28322 - https://packetstormsecurity.com/files/177841/Event-Management-1.0-SQL-Injection.html
|
|
CVE-2024-28323 - https://packetstormsecurity.com/files/177168/User-Registration-And-Login-And-User-Management-System-3.1-SQL-Injection.html
|
|
CVE-2024-28323 - https://sospiro014.github.io/User-Registration-And-Login-And-User-Management-System-3.1-SQL-Injection
|
|
CVE-2024-28325 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Credentials-Stored-in-Cleartext-CVE%E2%80%902024%E2%80%9028325
|
|
CVE-2024-28326 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Privilege-Escalation-CVE%E2%80%902024%E2%80%9028326
|
|
CVE-2024-28327 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Insecure-Credential-Storage-CVE%E2%80%902024%E2%80%9028327
|
|
CVE-2024-28328 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/CSV-Injection-CVE%E2%80%902024%E2%80%9028328
|
|
CVE-2024-28335 - https://packetstormsecurity.com/files/177708/Lektor-Static-CMS-3.3.10-Arbitrary-File-Upload-Remote-Code-Execution.html
|
|
CVE-2024-28338 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A8000RU/TOTOlink%20A8000RU%20login%20bypass.md
|
|
CVE-2024-28344 - https://securitycafe.ro/2024/03/21/cve-2024-28344-cve-2024-28345-in-sipwise-c5/
|
|
CVE-2024-28345 - https://securitycafe.ro/2024/03/21/cve-2024-28344-cve-2024-28345-in-sipwise-c5/
|
|
CVE-2024-2836 - https://wpscan.com/vulnerability/36f95b19-af74-4c56-9848-8ff270af4723/
|
|
CVE-2024-2837 - https://wpscan.com/vulnerability/91058c48-f262-4fcc-9390-472d59d61115/
|
|
CVE-2024-28383 - https://github.com/cvdyfbwa/IoT-Tenda-Router/blob/main/sub_431CF0.md
|
|
CVE-2024-28421 - https://gist.github.com/LioTree/003202727a61c0fb3ec3c948ab5e38f9
|
|
CVE-2024-28421 - https://github.com/cobub/razor/issues/178
|
|
CVE-2024-28429 - https://github.com/itsqian797/cms/blob/main/2.md
|
|
CVE-2024-28430 - https://github.com/itsqian797/cms/blob/main/1.md
|
|
CVE-2024-28431 - https://github.com/itsqian797/cms/blob/main/3.md
|
|
CVE-2024-28432 - https://github.com/itsqian797/cms/blob/main/4.md
|
|
CVE-2024-28434 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-28434
|
|
CVE-2024-28435 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-28435
|
|
CVE-2024-28441 - https://github.com/iamHuFei/HVVault/blob/main/webapp/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/magicflu-mailupdate-jsp-fileupload.md
|
|
CVE-2024-28442 - https://medium.com/@deepsahu1/cve-2024-28442-yealink-ip-phone-webview-escape-leads-to-sensitive-file-disclosure-via-directory-686ef8f80227
|
|
CVE-2024-28458 - https://github.com/keepinggg/poc/blob/main/poc_of_swfc
|
|
CVE-2024-2849 - https://github.com/CveSecLook/cve/issues/1
|
|
CVE-2024-2850 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/saveParentControlInfo_urls.md
|
|
CVE-2024-2851 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/formSetSambaConf.md
|
|
CVE-2024-28515 - https://github.com/heshi906/CVE-2024-28515
|
|
CVE-2024-2852 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/saveParentControlInfo_urls.md
|
|
CVE-2024-28520 - https://github.com/aknbg1thub/cve/blob/main/upload.md
|
|
CVE-2024-2853 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetSambaConf.md
|
|
CVE-2024-28535 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromAddressNat_mitInterface.md
|
|
CVE-2024-28537 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromNatStaticSetting.md
|
|
CVE-2024-2854 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetSambaConf.md
|
|
CVE-2024-28545 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md
|
|
CVE-2024-28547 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetFirewallCfg.md
|
|
CVE-2024-2855 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromSetSysTime.md
|
|
CVE-2024-28550 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formExpandDlnaFile.md
|
|
CVE-2024-28551 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md
|
|
CVE-2024-28553 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromAddressNat_entrys.md
|
|
CVE-2024-28556 - https://github.com/xuanluansec/vul/issues/1
|
|
CVE-2024-28557 - https://github.com/xuanluansec/vul/issues/2
|
|
CVE-2024-28558 - https://github.com/xuanluansec/vul/issues/3#issue-2243633522
|
|
CVE-2024-2856 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/fromSetSysTime.md
|
|
CVE-2024-28562 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28563 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28564 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28565 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28566 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28567 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28568 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28569 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-2857 - https://wpscan.com/vulnerability/b7a35c5b-474a-444a-85ee-c50782c7a6c2/
|
|
CVE-2024-28570 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28571 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28572 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28573 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28574 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28575 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28576 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28577 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28578 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28579 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-2858 - https://wpscan.com/vulnerability/43297210-17a6-4b51-b8ca-32ceef9fc09a/
|
|
CVE-2024-28580 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28581 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28582 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28583 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28584 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
|
CVE-2024-28595 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-28595.md
|
|
CVE-2024-28623 - https://github.com/GURJOTEXPERT/ritecms
|
|
CVE-2024-28635 - https://packetstormsecurity.com/2403-exploits/surveyjssurveycreator19132-xss.txt
|
|
CVE-2024-28639 - https://github.com/ZIKH26/CVE-information/blob/master/TOTOLINK/Vulnerability%20Information_1.md
|
|
CVE-2024-28640 - https://github.com/ZIKH26/CVE-information/blob/master/TOTOLINK/Vulnerability%20Information_2.md
|
|
CVE-2024-2866 - https://research.cleantalk.org/cve-2024-2509/
|
|
CVE-2024-2866 - https://wpscan.com/vulnerability/dec4a632-e04b-4fdd-86e4-48304b892a4f/
|
|
CVE-2024-28665 - https://github.com/777erp/cms/blob/main/1.md
|
|
CVE-2024-28666 - https://github.com/777erp/cms/blob/main/2.md
|
|
CVE-2024-28667 - https://github.com/777erp/cms/blob/main/6.md
|
|
CVE-2024-28668 - https://github.com/777erp/cms/blob/main/5.md
|
|
CVE-2024-28669 - https://github.com/777erp/cms/blob/main/10.md
|
|
CVE-2024-28670 - https://github.com/777erp/cms/blob/main/9.md
|
|
CVE-2024-28671 - https://github.com/777erp/cms/blob/main/7.md
|
|
CVE-2024-28672 - https://github.com/777erp/cms/blob/main/3.md
|
|
CVE-2024-28673 - https://github.com/777erp/cms/blob/main/4.md
|
|
CVE-2024-28675 - https://github.com/777erp/cms/blob/main/12.md
|
|
CVE-2024-28676 - https://github.com/777erp/cms/blob/main/18.md
|
|
CVE-2024-28677 - https://github.com/777erp/cms/blob/main/14.md
|
|
CVE-2024-28678 - https://github.com/777erp/cms/blob/main/15.md
|
|
CVE-2024-28679 - https://github.com/777erp/cms/blob/main/19.md
|
|
CVE-2024-28680 - https://github.com/777erp/cms/blob/main/11.md
|
|
CVE-2024-28681 - https://github.com/777erp/cms/blob/main/17.md
|
|
CVE-2024-28682 - https://github.com/777erp/cms/blob/main/13.md
|
|
CVE-2024-28683 - https://github.com/777erp/cms/blob/main/20.md
|
|
CVE-2024-28684 - https://github.com/777erp/cms/blob/main/16.md
|
|
CVE-2024-28699 - https://github.com/flexpaper/pdf2json/issues/52
|
|
CVE-2024-28714 - https://github.com/JiangXiaoBaiJia/cve2/blob/main/1.md
|
|
CVE-2024-28714 - https://github.com/JiangXiaoBaiJia/cve2/blob/main/a.png
|
|
CVE-2024-28715 - https://github.com/Lq0ne/CVE-2024-28715
|
|
CVE-2024-28716 - https://bugs.launchpad.net/solum/+bug/2047505
|
|
CVE-2024-28716 - https://drive.google.com/file/d/11x-6CjWCyap8_W1JpVzun56HQkPNLtWT/view?usp=drive_link
|
|
CVE-2024-28732 - https://gist.github.com/ErodedElk/1133d64dde2d92393a065edc9b243792
|
|
CVE-2024-28734 - https://packetstormsecurity.com/files/177619/Financials-By-Coda-Cross-Site-Scripting.html
|
|
CVE-2024-28735 - https://packetstormsecurity.com/files/177620/Financials-By-Coda-Authorization-Bypass.html
|
|
CVE-2024-28741 - https://blog.chebuya.com/posts/discovering-cve-2024-28741-remote-code-execution-on-northstar-c2-agents-via-pre-auth-stored-xss/
|
|
CVE-2024-28741 - https://packetstormsecurity.com/files/177542/NorthStar-C2-Agent-1.0-Cross-Site-Scripting-Remote-Command-Execution.html
|
|
CVE-2024-28756 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-012.txt
|
|
CVE-2024-28816 - https://github.com/AaravRajSIngh/Chatbot/pull/10
|
|
CVE-2024-28823 - https://github.com/awslabs/aws-js-s3-explorer/issues/118
|
|
CVE-2024-28834 - https://minerva.crocs.fi.muni.cz/
|
|
CVE-2024-28847 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-8p5r-6mvv-2435
|
|
CVE-2024-28848 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-5xv3-fm7g-865r
|
|
CVE-2024-28849 - https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp
|
|
CVE-2024-28852 - https://github.com/ampache/ampache/security/advisories/GHSA-g7hx-hm68-f639
|
|
CVE-2024-28853 - https://github.com/ampache/ampache/security/advisories/GHSA-prw2-7cr3-5mx8
|
|
CVE-2024-28854 - https://en.wikipedia.org/wiki/Slowloris_(computer_security)
|
|
CVE-2024-28854 - https://github.com/tmccombs/tls-listener/security/advisories/GHSA-2qph-qpvm-2qf7
|
|
CVE-2024-28859 - https://github.com/FriendsOfSymfony1/symfony1/security/advisories/GHSA-wjv8-pxr6-5f4r
|
|
CVE-2024-28861 - https://github.com/FriendsOfSymfony1/symfony1/security/advisories/GHSA-pv9j-c53q-h433
|
|
CVE-2024-28863 - https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36
|
|
CVE-2024-2891 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formQuickIndex.md
|
|
CVE-2024-2899 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWirelessRepeat.md
|
|
CVE-2024-2900 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/saveParentControlInfo_deviceId.md
|
|
CVE-2024-2901 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/setSchedWifi.md
|
|
CVE-2024-29019 - https://github.com/advisories/GHSA-9p43-hj5j-96h5
|
|
CVE-2024-29019 - https://github.com/esphome/esphome/security/advisories/GHSA-5925-88xh-6h99
|
|
CVE-2024-2902 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWifiGusetBasic.md
|
|
CVE-2024-29021 - https://github.com/judge0/judge0/security/advisories/GHSA-q7vg-26pg-v5hr
|
|
CVE-2024-29025 - https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v
|
|
CVE-2024-29028 - https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos
|
|
CVE-2024-29029 - https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/
|
|
CVE-2024-2903 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/GetParentControlInfo.md
|
|
CVE-2024-29030 - https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/
|
|
CVE-2024-29031 - https://securitylab.github.com/advisories/GHSL-2023-249_Meshery/
|
|
CVE-2024-29032 - https://github.com/Qiskit/qiskit-ibm-runtime/security/advisories/GHSA-x4x5-jv3x-9c7m
|
|
CVE-2024-29042 - https://github.com/franciscop/translate/security/advisories/GHSA-882j-4vj5-7vmj
|
|
CVE-2024-2907 - https://wpscan.com/vulnerability/d2588b47-a518-4cb2-a557-2c7eaffa17e4/
|
|
CVE-2024-2908 - https://wpscan.com/vulnerability/58c9e088-ed74-461a-b305-e217679f26c1/
|
|
CVE-2024-29090 - https://www.vicarius.io/vsociety/posts/chaos-in-the-ai-zoo-exploiting-cve-2024-29090-authenticated-ssrf-in-ai-engine-plugin-by-jordy-meow
|
|
CVE-2024-29149 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-010.txt
|
|
CVE-2024-29150 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-011.txt
|
|
CVE-2024-29156 - https://launchpad.net/bugs/2048114
|
|
CVE-2024-29179 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9
|
|
CVE-2024-29180 - https://github.com/webpack/webpack-dev-middleware/security/advisories/GHSA-wr3j-pwj9-hqq6
|
|
CVE-2024-29183 - https://securitylab.github.com/advisories/GHSL-2023-253_openrasp
|
|
CVE-2024-29186 - https://github.com/brefphp/bref/security/advisories/GHSA-j4hq-f63x-f39r
|
|
CVE-2024-29187 - https://github.com/wixtoolset/issues/security/advisories/GHSA-rf39-3f98-xr7r
|
|
CVE-2024-29190 - https://drive.google.com/file/d/1nbKMd2sKosbJef5Mh4DxjcHcQ8Hw0BNR/view?usp=share_link
|
|
CVE-2024-29190 - https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-wfgj-wrgh-h3r3
|
|
CVE-2024-29191 - https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/
|
|
CVE-2024-29192 - https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/
|
|
CVE-2024-29193 - https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/
|
|
CVE-2024-29194 - https://github.com/OneUptime/oneuptime/security/advisories/GHSA-246p-xmg8-wmcq
|
|
CVE-2024-29196 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-mmh6-5cpf-2c72
|
|
CVE-2024-29197 - https://github.com/pimcore/pimcore/security/advisories/GHSA-5737-rqv4-v445
|
|
CVE-2024-29200 - https://github.com/kimai/kimai/security/advisories/GHSA-cj3c-5xpm-cx94
|
|
CVE-2024-29216 - https://sangomakb.atlassian.net/wiki/spaces/DVC/pages/45351279/Natural+Access+Software+Download
|
|
CVE-2024-29271 - https://github.com/givanz/VvvebJs/issues/342
|
|
CVE-2024-29272 - https://github.com/givanz/VvvebJs/issues/343
|
|
CVE-2024-29273 - https://github.com/zyx0814/dzzoffice/issues/244
|
|
CVE-2024-29275 - https://github.com/seacms-net/CMS/issues/15
|
|
CVE-2024-29276 - https://www.cnblogs.com/Rainy-Day/p/18061399
|
|
CVE-2024-29291 - https://gist.github.com/whiteman007/43bd7fa1fa0e47554b33f0cf93066784
|
|
CVE-2024-29296 - https://github.com/ThaySolis/CVE-2024-29296
|
|
CVE-2024-2930 - https://github.com/xuanluansec/vul/blob/main/vul/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code.md
|
|
CVE-2024-29301 - https://packetstormsecurity.com/files/177737/Task-Management-System-1.0-SQL-Injection.html
|
|
CVE-2024-29302 - https://packetstormsecurity.com/files/177737/Task-Management-System-1.0-SQL-Injection.html
|
|
CVE-2024-29303 - https://packetstormsecurity.com/files/177737/Task-Management-System-1.0-SQL-Injection.html
|
|
CVE-2024-29309 - https://gist.github.com/Siebene/c22e1a4a4a8b61067180475895e60858
|
|
CVE-2024-29316 - https://nodebb.org/bounty/
|
|
CVE-2024-2932 - https://github.com/CveSecLook/cve/issues/3
|
|
CVE-2024-29338 - https://github.com/PWwwww123/cms/blob/main/1.md
|
|
CVE-2024-2934 - https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20SQL%20Injection.md
|
|
CVE-2024-2935 - https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20Cross-Site-Scripting.md
|
|
CVE-2024-29366 - https://github.com/20Yiju/DLink/blob/master/DIR-845L/CI.md
|
|
CVE-2024-29366 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2024-29368 - https://github.com/becpn/mozilocms
|
|
CVE-2024-29374 - https://gist.github.com/fir3storm/f9c7f3ec1a6496498517ed216d2640b2
|
|
CVE-2024-29375 - https://github.com/ismailcemunver/CVE-2024-29375
|
|
CVE-2024-29384 - https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41
|
|
CVE-2024-29384 - https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-29384
|
|
CVE-2024-29385 - https://github.com/songah119/Report/blob/main/CI-1.md
|
|
CVE-2024-29385 - https://www.dlink.com/en/security-bulletin/
|
|
CVE-2024-29386 - https://cve.anas-cherni.me/2024/04/04/cve-2024-29386/
|
|
CVE-2024-29387 - https://cve.anas-cherni.me/2024/04/04/cve-2024-29387/
|
|
CVE-2024-29392 - https://gist.github.com/phulelouch/48ee63a7c46078574f3b3dc9a739052c
|
|
CVE-2024-29399 - https://github.com/ally-petitt/CVE-2024-29399
|
|
CVE-2024-29400 - https://github.com/Fr1ezy/RuoYi_info
|
|
CVE-2024-29401 - https://github.com/menghaining/PoC/blob/main/xzs-mysql/xzs-mysql%20--%20PoC.md
|
|
CVE-2024-29402 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158
|
|
CVE-2024-29413 - https://github.com/RealestName/Vulnerability-Research/tree/main/CVE-2024-29413
|
|
CVE-2024-29421 - https://github.com/SpikeReply/advisories/blob/530dbd7ce68600a22c47dd1bcbe360220feda1d9/cve/xmedcon/cve-2024-29421.md
|
|
CVE-2024-2944 - https://vuldb.com/?id.258035
|
|
CVE-2024-29461 - https://gist.github.com/ErodedElk/399a226905c574efe705e3bff77955e3
|
|
CVE-2024-29461 - https://github.com/floodlight/floodlight/issues/867
|
|
CVE-2024-29499 - https://github.com/daddywolf/cms/blob/main/1.md
|
|
CVE-2024-29504 - https://github.com/summernote/summernote/pull/3782
|
|
CVE-2024-29513 - https://github.com/dru1d-foofus/briscKernelDriver
|
|
CVE-2024-29514 - https://github.com/zzq66/cve6/
|
|
CVE-2024-29515 - https://github.com/zzq66/cve7/
|
|
CVE-2024-2954 - https://blog.sth.sh/wordpress-action-network-1-4-3-authenticated-sql-injection-0-day-01fcd6e89e96
|
|
CVE-2024-2962 - https://gist.github.com/Xib3rR4dAr/ab293092ffcfe3c14a3c7daf5462a50b
|
|
CVE-2024-29650 - https://gist.github.com/tariqhawis/1bc340ca5ea6ae115c9ab9665cfd5921
|
|
CVE-2024-29650 - https://learn.snyk.io/lesson/prototype-pollution/#a0a863a5-fd3a-539f-e1ed-a0769f6c6e3b
|
|
CVE-2024-29651 - https://gist.github.com/tariqhawis/5db76b38112bba756615b688c32409ad
|
|
CVE-2024-29684 - https://github.com/iimiss/cms/blob/main/1.md
|
|
CVE-2024-29686 - https://www.exploit-db.com/exploits/51893
|
|
CVE-2024-2972 - https://wpscan.com/vulnerability/27134a4f-a59b-40e9-8fc8-abe1f58672ad/
|
|
CVE-2024-2980 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formexeCommand.md
|
|
CVE-2024-2981 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/form_fast_setting_wifi_set.md
|
|
CVE-2024-2982 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWriteFacMac.md
|
|
CVE-2024-2982 - https://vuldb.com/?id.258151
|
|
CVE-2024-2983 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetClientState.md
|
|
CVE-2024-2984 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetCfm.md
|
|
CVE-2024-2985 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formQuickIndex.md
|
|
CVE-2024-29882 - https://github.com/ossrs/srs/security/advisories/GHSA-gv9r-qcjc-5hj7
|
|
CVE-2024-29895 - https://github.com/Cacti/cacti/security/advisories/GHSA-cr28-x256-xf5m
|
|
CVE-2024-29903 - https://github.com/sigstore/cosign/security/advisories/GHSA-95pr-fxf5-86gv
|
|
CVE-2024-29916 - https://unsaflok.com
|
|
CVE-2024-29937 - https://www.youtube.com/watch?v=i_JOkHaCdzk
|
|
CVE-2024-3000 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md
|
|
CVE-2024-3001 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%203.md
|
|
CVE-2024-3002 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%204.md
|
|
CVE-2024-3003 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%205.md
|
|
CVE-2024-3004 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Cross-Site-Scripting.md
|
|
CVE-2024-3011 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formQuickIndex.md
|
|
CVE-2024-3012 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/GetParentControlInfo.md
|
|
CVE-2024-3024 - https://docs.google.com/document/d/1wCIrViAJwGsO5afPBLLjRhO5RClsoUo3J9q1psLs84s/edit?usp=sharing
|
|
CVE-2024-30248 - https://github.com/piccolo-orm/piccolo_admin/security/advisories/GHSA-pmww-v6c9-7p83
|
|
CVE-2024-30252 - https://github.com/nt1m/livemarks/security/advisories/GHSA-3gg9-w4fm-jjcg
|
|
CVE-2024-30257 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f
|
|
CVE-2024-30258 - https://drive.google.com/file/d/19W5UC52hPnAqVq_boZWO45d1TJ4WoCSh/view?usp=sharing
|
|
CVE-2024-30258 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-53xw-465j-rxfh
|
|
CVE-2024-30259 - https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing
|
|
CVE-2024-30259 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662
|
|
CVE-2024-30264 - https://github.com/baptisteArno/typebot.io/security/advisories/GHSA-mx2f-9mcr-8j73
|
|
CVE-2024-3048 - https://wpscan.com/vulnerability/e179ff7d-137c-48bf-8b18-e874e3f876f4/
|
|
CVE-2024-30564 - https://gist.github.com/mestrtee/5dc2c948c2057f98d3de0a9790903c6c
|
|
CVE-2024-30568 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Netgear-R6850%20V1.1.0.88%20Command%20Injection(ping_test).md
|
|
CVE-2024-30572 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Netgear-R6850%20V1.1.0.88%20Command%20Injection(ntp_server).md
|
|
CVE-2024-3058 - https://wpscan.com/vulnerability/fc33c79d-ad24-4d55-973a-25280995a2ab/
|
|
CVE-2024-30583 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_mitInterface.md
|
|
CVE-2024-30584 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWifiBasicSet_security.md
|
|
CVE-2024-30585 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_deviceId.md
|
|
CVE-2024-30586 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWifiBasicSet_security_5g.md
|
|
CVE-2024-30587 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_urls.md
|
|
CVE-2024-30588 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/setSchedWifi_start.md
|
|
CVE-2024-30589 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_entrys.md
|
|
CVE-2024-3059 - https://wpscan.com/vulnerability/e154096d-e9b7-43ba-9a34-81a6c431025c/
|
|
CVE-2024-30590 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/setSchedWifi_end.md
|
|
CVE-2024-30591 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_time.md
|
|
CVE-2024-30592 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_page.md
|
|
CVE-2024-30593 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetDeviceName_devName.md
|
|
CVE-2024-30594 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/addWifiMacFilter_deviceMac.md
|
|
CVE-2024-30595 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/addWifiMacFilter_deviceId.md
|
|
CVE-2024-30596 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetDeviceName_deviceId.md
|
|
CVE-2024-30597 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security.md
|
|
CVE-2024-30598 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security_5g.md
|
|
CVE-2024-30599 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/addWifiMacFilter_deviceMac.md
|
|
CVE-2024-3060 - https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/
|
|
CVE-2024-30600 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_end.md
|
|
CVE-2024-30601 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_time.md
|
|
CVE-2024-30602 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_start.md
|
|
CVE-2024-30603 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_urls.md
|
|
CVE-2024-30604 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_list1.md
|
|
CVE-2024-30606 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_page.md
|
|
CVE-2024-30607 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_deviceId.md
|
|
CVE-2024-30612 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetClientState.md
|
|
CVE-2024-30613 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/setSmartPowerManagement.md
|
|
CVE-2024-30620 - https://github.com/re1wn/IoT_vuln/blob/main/Tenda_AX1803_v1.0.0.1_contains_a_stack_overflow_via_the_serviceName_parameter_in_the_function_fromAdvSetMacMtuWan.md
|
|
CVE-2024-30621 - https://github.com/re1wn/IoT_vuln/blob/main/Tenda_AX1803_v1.0.0.1_contains_a_stack_overflow_via_the_serverName_parameter_in_the_function_fromAdvSetMacMtuWan.md
|
|
CVE-2024-30622 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_mitInterface.md
|
|
CVE-2024-30623 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromDhcpListClient_page.md
|
|
CVE-2024-30624 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_urls.md
|
|
CVE-2024-30625 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_entrys.md
|
|
CVE-2024-30626 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/setSchedWifi_end.md
|
|
CVE-2024-30627 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_deviceId.md
|
|
CVE-2024-30628 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_page.md
|
|
CVE-2024-30629 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromDhcpListClient_list1.md
|
|
CVE-2024-30630 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_time.md
|
|
CVE-2024-30631 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/setSchedWifi_start.md
|
|
CVE-2024-30632 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWifiBasicSet_security_5g.md
|
|
CVE-2024-30633 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWifiBasicSet_security.md
|
|
CVE-2024-30634 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_mitInterface.md
|
|
CVE-2024-30635 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formSetCfm.md
|
|
CVE-2024-30636 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formQuickIndex.md
|
|
CVE-2024-30637 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formWriteFacMac.md
|
|
CVE-2024-30638 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_entrys.md
|
|
CVE-2024-30639 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_page.md
|
|
CVE-2024-30645 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/setUsbUnload.md
|
|
CVE-2024-3075 - https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/
|
|
CVE-2024-3076 - https://wpscan.com/vulnerability/617ec2e9-9058-4a93-8ad4-7ecb85107141/
|
|
CVE-2024-30802 - https://github.com/WarmBrew/web_vul/blob/main/TTX.md
|
|
CVE-2024-30807 - https://github.com/axiomatic-systems/Bento4/issues/937
|
|
CVE-2024-30808 - https://github.com/axiomatic-systems/Bento4/issues/937
|
|
CVE-2024-30809 - https://github.com/axiomatic-systems/Bento4/issues/937
|
|
CVE-2024-30840 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromDhcpListClient_list1.md
|
|
CVE-2024-30845 - https://gist.github.com/Zshan7que/c813f2b52daab08c9fb4f6c6b8178b66
|
|
CVE-2024-30845 - https://github.com/netcccyun/pan/issues/6
|
|
CVE-2024-30850 - https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/
|
|
CVE-2024-30851 - https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc
|
|
CVE-2024-30862 - https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-index.md
|
|
CVE-2024-30878 - https://github.com/jianyan74/rageframe2/issues/111
|
|
CVE-2024-30879 - https://github.com/jianyan74/rageframe2/issues/114
|
|
CVE-2024-30880 - https://github.com/jianyan74/rageframe2/issues/114
|
|
CVE-2024-30883 - https://github.com/jianyan74/rageframe2/issues/114
|
|
CVE-2024-30884 - https://github.com/Hebing123/cve/issues/28
|
|
CVE-2024-30885 - https://github.com/Hebing123/cve/issues/29
|
|
CVE-2024-30886 - https://github.com/Hebing123/cve/issues/30
|
|
CVE-2024-3089 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_csrf.md
|
|
CVE-2024-3089 - https://vuldb.com/?submit.306963
|
|
CVE-2024-30891 - https://github.com/Lantern-r/IoT-vuln/blob/main/Tenda/AC18/formexeCommand.md
|
|
CVE-2024-30915 - https://github.com/OpenDDS/OpenDDS/issues/4527
|
|
CVE-2024-3093 - https://wpscan.com/vulnerability/7c87fcd2-6ffd-4285-bbf5-36efea70b620/
|
|
CVE-2024-30938 - https://github.com/lampSEC/semcms/blob/main/semcms.md
|
|
CVE-2024-30939 - https://medium.com/@deepsahu1/yealink-ip-phone-account-take-over-9bf9e7b847c0?source=friends_link&sk=b0d664dd5b3aad5b758e4934aca997ad
|
|
CVE-2024-3094 - http://www.openwall.com/lists/oss-security/2024/04/16/5
|
|
CVE-2024-3094 - https://lwn.net/Articles/967180/
|
|
CVE-2024-3094 - https://news.ycombinator.com/item?id=39895344
|
|
CVE-2024-3094 - https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils
|
|
CVE-2024-3094 - https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094
|
|
CVE-2024-30946 - https://github.com/testgo1safe/cms/blob/main/1.md
|
|
CVE-2024-30950 - https://github.com/CrownZTX/vulnerabilities/blob/main/fudforum/stored_xss_in_admsql.md
|
|
CVE-2024-30952 - https://github.com/CrownZTX/vulnerabilities/blob/main/pescms/stored_xss.md
|
|
CVE-2024-30953 - https://github.com/CrownZTX/vulnerabilities/blob/main/htmly/stored_xss_in_Menueditor.md
|
|
CVE-2024-3096 - http://www.openwall.com/lists/oss-security/2024/04/12/11
|
|
CVE-2024-3096 - https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr
|
|
CVE-2024-30965 - https://github.com/Fishkey1/cms/commit/e9d294951ab2dd85709f1d12ad4747f25d326b1b
|
|
CVE-2024-30973 - https://github.com/Athos-Zago/CVE-2024-30973/tree/main
|
|
CVE-2024-30979 - https://medium.com/@shanunirwan/cve-2024-30979-stored-cross-site-scripting-xss-in-cyber-cafe-management-system-project-ccms-1-44b10f50817b
|
|
CVE-2024-30980 - https://medium.com/@shanunirwan/cve-2024-30980-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-30bffd26dab7
|
|
CVE-2024-30981 - https://medium.com/@shanunirwan/cve-2024-30981-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-534676f9bdeb
|
|
CVE-2024-30985 - https://medium.com/@shanunirwan/cve-2024-30985-sql-injection-vulnerability-in-client-management-system-using-php-mysql-1-1-c21fecbda062
|
|
CVE-2024-30986 - https://medium.com/@shanunirwan/cve-2024-30986-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3fb702d9d510
|
|
CVE-2024-30987 - https://medium.com/@shanunirwan/cve-2024-30987-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-b6a7a177d254
|
|
CVE-2024-30988 - https://medium.com/@shanunirwan/cve-2024-30988-cross-site-scripting-vulnerability-in-client-management-system-using-php-mysql-1-1-e7a677936c23
|
|
CVE-2024-30989 - https://medium.com/@shanunirwan/cve-2024-30989-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3cfa1c54e4a6
|
|
CVE-2024-30990 - https://medium.com/@shanunirwan/cve-2024-30990-sql-injection-vulnerability-in-invoices-page-of-client-management-system-using-php-58baa94a1761
|
|
CVE-2024-30998 - https://github.com/efekaanakkar/CVEs/blob/main/PHPGurukul-Men-Salon-Management-System-2.0.md
|
|
CVE-2024-31002 - https://github.com/axiomatic-systems/Bento4/issues/939
|
|
CVE-2024-31003 - https://github.com/axiomatic-systems/Bento4/issues/939
|
|
CVE-2024-31004 - https://github.com/axiomatic-systems/Bento4/issues/941
|
|
CVE-2024-31005 - https://github.com/axiomatic-systems/Bento4/issues/941
|
|
CVE-2024-31008 - https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0-Captcha%20bypass%20(logic%20vulnerability).md
|
|
CVE-2024-31009 - https://github.com/ss122-0ss/semcms/blob/main/README.md
|
|
CVE-2024-31010 - https://github.com/ss122-0ss/semcms/blob/main/README.md
|
|
CVE-2024-31047 - https://github.com/AcademySoftwareFoundation/openexr/issues/1680
|
|
CVE-2024-31061 - https://github.com/sahildari/cve/blob/master/CVE-2024-31061.md
|
|
CVE-2024-31061 - https://portswigger.net/web-security/cross-site-scripting/stored
|
|
CVE-2024-31062 - https://github.com/sahildari/cve/blob/master/CVE-2024-31062.md
|
|
CVE-2024-31062 - https://portswigger.net/web-security/cross-site-scripting/stored
|
|
CVE-2024-31063 - https://github.com/sahildari/cve/blob/master/CVE-2024-31063.md
|
|
CVE-2024-31063 - https://portswigger.net/web-security/cross-site-scripting/stored
|
|
CVE-2024-31064 - https://github.com/sahildari/cve/blob/master/CVE-2024-31064.md
|
|
CVE-2024-31065 - https://github.com/sahildari/cve/blob/master/CVE-2024-31065.md
|
|
CVE-2024-31065 - https://portswigger.net/web-security/cross-site-scripting/stored
|
|
CVE-2024-3118 - https://vuldb.com/?id.258779
|
|
CVE-2024-31212 - https://github.com/instantsoft/icms2/security/advisories/GHSA-qx95-w566-73fw
|
|
CVE-2024-31213 - https://github.com/instantsoft/icms2/security/advisories/GHSA-6v3c-p92q-prfq
|
|
CVE-2024-31214 - https://github.com/traccar/traccar/security/advisories/GHSA-3gxq-f2qj-c8v9
|
|
CVE-2024-3124 - https://github.com/ctflearner/Android_Findings/blob/main/Smartalarm/Backup.md
|
|
CVE-2024-3124 - https://vuldb.com/?submit.307752
|
|
CVE-2024-3125 - https://github.com/strik3r0x1/Vulns/blob/main/ZTC_GK420d-SXSS.md
|
|
CVE-2024-3128 - https://github.com/ctflearner/Android_Findings/blob/main/Replify-Messenger/Backup.md
|
|
CVE-2024-3128 - https://vuldb.com/?submit.307761
|
|
CVE-2024-3129 - https://github.com/Sospiro014/zday1/blob/main/Image_Accordion_Gallery.md
|
|
CVE-2024-3131 - https://github.com/ycxdzj/CVE_Hunter/blob/main/SQL-7.md
|
|
CVE-2024-31380 - https://patchstack.com/articles/unpatched-authenticated-rce-in-oxygen-and-breakdance-builder?_s_id=cve
|
|
CVE-2024-31380 - https://snicco.io/vulnerability-disclosure/oxygen/client-control-remote-code-execution-oxygen-4-8-1?_s_id=cve
|
|
CVE-2024-3139 - https://github.com/Sospiro014/zday1/blob/main/Laboratory_Management_System.md
|
|
CVE-2024-31390 - https://patchstack.com/articles/unpatched-authenticated-rce-in-oxygen-and-breakdance-builder?_s_id=cve
|
|
CVE-2024-31390 - https://snicco.io/vulnerability-disclosure/breakdance/client-mode-remote-code-execution-breakdance-1-7-0?_s_id=cve
|
|
CVE-2024-31390 - https://www.youtube.com/watch?v=9glx54-LfRE
|
|
CVE-2024-3140 - https://github.com/Sospiro014/zday1/blob/main/xss_1.md
|
|
CVE-2024-3141 - https://github.com/strik3r0x1/Vulns/blob/main/Clavister_E80-RXSS.md
|
|
CVE-2024-3142 - https://github.com/strik3r0x1/Vulns/blob/main/CSRF_Clavister-E80,E10.md
|
|
CVE-2024-3144 - https://github.com/Hckwzh/cms/blob/main/12.md
|
|
CVE-2024-31443 - https://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3
|
|
CVE-2024-31444 - https://github.com/Cacti/cacti/security/advisories/GHSA-p4ch-7hjw-6m87
|
|
CVE-2024-3145 - https://github.com/Hckwzh/cms/blob/main/13.md
|
|
CVE-2024-3145 - https://vuldb.com/?id.258920
|
|
CVE-2024-31453 - https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-xg8v-m2mh-45m6
|
|
CVE-2024-31454 - https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-2p2x-p7wj-j5h2
|
|
CVE-2024-31457 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gv3w-m57p-3wc4
|
|
CVE-2024-31458 - https://github.com/Cacti/cacti/security/advisories/GHSA-jrxg-8wh8-943x
|
|
CVE-2024-31459 - https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv
|
|
CVE-2024-31459 - https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r
|
|
CVE-2024-3146 - https://github.com/Hckwzh/cms/blob/main/14.md
|
|
CVE-2024-31460 - https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv
|
|
CVE-2024-31460 - https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r
|
|
CVE-2024-3147 - https://github.com/Hckwzh/cms/blob/main/15.md
|
|
CVE-2024-31497 - https://securityonline.info/cve-2024-31497-critical-putty-vulnerability-exposes-private-keys-immediate-action-required/
|
|
CVE-2024-31497 - https://www.bleepingcomputer.com/news/security/putty-ssh-client-flaw-allows-recovery-of-cryptographic-private-keys/
|
|
CVE-2024-31502 - https://github.com/sahildari/cve/blob/master/CVE-2024-31502.md
|
|
CVE-2024-31506 - https://github.com/CveSecLook/cve/issues/4
|
|
CVE-2024-31507 - https://github.com/CveSecLook/cve/issues/6
|
|
CVE-2024-3154 - https://github.com/cri-o/cri-o/security/advisories/GHSA-2cgq-h8xw-2v5j
|
|
CVE-2024-31544 - https://github.com/emirhanmtl/vuln-research/blob/main/Stored-XSS-Computer-Laboratory-Management-System-PoC.md
|
|
CVE-2024-31545 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-4-Computer-Laboratory-Management-System-PoC.md
|
|
CVE-2024-31546 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-2-Computer-Laboratory-Management-System-PoC.md
|
|
CVE-2024-31547 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-3-Computer-Laboratory-Management-System-PoC.md
|
|
CVE-2024-31581 - https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/cbs_h266_syntax_template.c#L2048
|
|
CVE-2024-31610 - https://github.com/ss122-0ss/School/blob/main/readme.md
|
|
CVE-2024-31616 - https://gist.github.com/Swind1er/0c50e72428059fb72a4fd4d31c43f883
|
|
CVE-2024-31621 - https://www.exploit-db.com/exploits/52001
|
|
CVE-2024-31636 - https://github.com/lief-project/LIEF/issues/1038
|
|
CVE-2024-31648 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31648.md
|
|
CVE-2024-31649 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31649.md
|
|
CVE-2024-31650 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31650.md
|
|
CVE-2024-31651 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31651.md
|
|
CVE-2024-31652 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31652.md
|
|
CVE-2024-31678 - https://github.com/CveSecLook/cve/issues/10
|
|
CVE-2024-31680 - https://github.com/heidashuai5588/cve/blob/main/upload.md
|
|
CVE-2024-31705 - https://github.com/V3locidad/GLPI_POC_Plugins_Shell
|
|
CVE-2024-31705 - https://seclists.org/fulldisclosure/2024/Apr/23
|
|
CVE-2024-31744 - https://github.com/jasper-software/jasper/issues/381
|
|
CVE-2024-31747 - https://medium.com/@deepsahu1/yealink-vp59-microsoft-teams-phone-lock-bypass-b7fee9dd9c8c
|
|
CVE-2024-31755 - https://github.com/DaveGamble/cJSON/issues/839
|
|
CVE-2024-31759 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158
|
|
CVE-2024-31759 - https://github.com/menghaining/PoC/blob/main/PublicCMS/publishCMS--PoC.md
|
|
CVE-2024-31760 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158
|
|
CVE-2024-31760 - https://github.com/menghaining/PoC/blob/main/gin-vue-admin/gin-vue-admin--PoC.md
|
|
CVE-2024-31804 - https://www.exploit-db.com/exploits/51977
|
|
CVE-2024-31819 - https://chocapikk.com/posts/2024/cve-2024-31819/
|
|
CVE-2024-31819 - https://github.com/Chocapikk/CVE-2024-31819
|
|
CVE-2024-31839 - https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/
|
|
CVE-2024-31840 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2024-31841 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2024-31843 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2024-31844 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2024-31845 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2024-31846 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2024-31847 - https://www.gruppotim.it/it/footer/red-team.html
|
|
CVE-2024-31848 - https://www.tenable.com/security/research/tra-2024-09
|
|
CVE-2024-31849 - https://www.tenable.com/security/research/tra-2024-09
|
|
CVE-2024-31850 - https://www.tenable.com/security/research/tra-2024-09
|
|
CVE-2024-31852 - https://github.com/llvm/llvm-project/issues/80287
|
|
CVE-2024-3188 - https://wpscan.com/vulnerability/bc273e75-7faf-4eaf-8ebd-efc5d6e9261f/
|
|
CVE-2024-32019 - https://github.com/netdata/netdata/security/advisories/GHSA-pmhq-4cxq-wj93
|
|
CVE-2024-32022 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss
|
|
CVE-2024-32023 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss
|
|
CVE-2024-32024 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss
|
|
CVE-2024-32025 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss
|
|
CVE-2024-32026 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss
|
|
CVE-2024-32027 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss
|
|
CVE-2024-3203 - https://vuldb.com/?submit.304556
|
|
CVE-2024-3204 - https://vuldb.com/?submit.304557
|
|
CVE-2024-3205 - https://vuldb.com/?submit.304561
|
|
CVE-2024-3207 - https://vuldb.com/?submit.304572
|
|
CVE-2024-32163 - https://github.com/XiLitter/CMS_vulnerability-discovery/blob/main/CMSeasy_7.7.7.9_code_execution.md
|
|
CVE-2024-32166 - https://github.com/Fewword/Poc/blob/main/webid/webid-poc14.md
|
|
CVE-2024-3218 - https://github.com/garboa/cve_3/blob/main/file_put_content.md
|
|
CVE-2024-32206 - https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0%20Stored%20Xss%20In%20Affiche%20Model.md
|
|
CVE-2024-32254 - https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md
|
|
CVE-2024-32256 - https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md
|
|
CVE-2024-32258 - https://github.com/TASEmulators/fceux/issues/727
|
|
CVE-2024-32258 - https://github.com/liyansong2018/CVE-2024-32258
|
|
CVE-2024-32282 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formexecommand_cmdi.md
|
|
CVE-2024-32283 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formexecommand_cmdi.md
|
|
CVE-2024-32285 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formaddUserName.md
|
|
CVE-2024-32286 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromVirtualSer.md
|
|
CVE-2024-32287 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromqossetting.md
|
|
CVE-2024-32288 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromwebExcptypemanFilter.md
|
|
CVE-2024-32290 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromAddressNat_page.md
|
|
CVE-2024-32291 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromNatlimit.md
|
|
CVE-2024-32292 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formexecommand_cmdi.md
|
|
CVE-2024-32293 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromDhcpListClient_page.md
|
|
CVE-2024-32299 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromWizardHandle.md
|
|
CVE-2024-32301 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromWizardHandle.md
|
|
CVE-2024-32302 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromWizardHandle.md
|
|
CVE-2024-32303 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromWizardHandle.md
|
|
CVE-2024-32305 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromWizardHandle.md
|
|
CVE-2024-32306 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/fromWizardHandle.md
|
|
CVE-2024-32307 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromWizardHandle.md
|
|
CVE-2024-3231 - https://wpscan.com/vulnerability/81dbb5c0-ccdd-4af1-b2f2-71cb1b37fe93/
|
|
CVE-2024-32310 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1203/fromWizardHandle.md
|
|
CVE-2024-32311 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWanParameterSetting.md
|
|
CVE-2024-32312 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1203/formWanParameterSetting.md
|
|
CVE-2024-32313 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWanParameterSetting.md
|
|
CVE-2024-32314 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexecommand_cmdi.md
|
|
CVE-2024-32316 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_list1.md
|
|
CVE-2024-32317 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/formWanParameterSetting.md
|
|
CVE-2024-32318 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromSetVlanInfo_vlan.md
|
|
CVE-2024-32320 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetTimeZone.md
|
|
CVE-2024-32337 - https://github.com/adiapera/xss_security_wondercms_3.4.3
|
|
CVE-2024-32338 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3
|
|
CVE-2024-32339 - https://github.com/adiapera/xss_how_to_page_wondercms_3.4.3
|
|
CVE-2024-32340 - https://github.com/adiapera/xss_menu_page_wondercms_3.4.3
|
|
CVE-2024-32341 - https://github.com/adiapera/xss_home_page_wondercms_3.4.3
|
|
CVE-2024-32342 - https://github.com/adiapera/xss_create_boidcms_2.1.0
|
|
CVE-2024-32343 - https://github.com/adiapera/xss_create2_boidcms_2.1.0
|
|
CVE-2024-32344 - https://github.com/adiapera/xss_language_cmsimple_5.15/blob/main/README.md
|
|
CVE-2024-32345 - https://github.com/adiapera/xss_language_cmsimple_5.15
|
|
CVE-2024-32359 - https://github.com/HouqiyuA/k8s-rbac-poc
|
|
CVE-2024-3239 - https://wpscan.com/vulnerability/dfa1421b-41b0-4b25-95ef-0843103e1f5e/
|
|
CVE-2024-32391 - https://github.com/magicblack/maccms10/issues/1133
|
|
CVE-2024-32392 - https://github.com/Hebing123/cve/issues/33
|
|
CVE-2024-32394 - https://gist.github.com/Swind1er/7aad5c28e5bdc91d73fa7489b7250c94
|
|
CVE-2024-32399 - https://github.com/NN0b0dy/CVE-2024-32399/blob/main/README.md
|
|
CVE-2024-32404 - https://packetstormsecurity.com/2404-exploits/rlts-sstexec.txt
|
|
CVE-2024-32405 - https://packetstormsecurity.com/files/178101/Relate-Cross-Site-Scripting.html
|
|
CVE-2024-32405 - https://portswigger.net/web-security/cross-site-scripting/stored
|
|
CVE-2024-32406 - https://packetstormsecurity.com/files/178251/Relate-Learning-And-Teaching-System-SSTI-Remote-Code-Execution.html
|
|
CVE-2024-3241 - https://wpscan.com/vulnerability/a645daee-42ea-43f8-9480-ef3be69606e0/
|
|
CVE-2024-32461 - https://github.com/librenms/librenms/security/advisories/GHSA-cwx6-cx7x-4q34
|
|
CVE-2024-32467 - https://github.com/metersphere/metersphere/security/advisories/GHSA-7499-q88f-mxqp
|
|
CVE-2024-3247 - https://forum.xpdfreader.com/viewtopic.php?t=43597
|
|
CVE-2024-32472 - https://github.com/excalidraw/excalidraw/security/advisories/GHSA-m64q-4jqh-f72f
|
|
CVE-2024-32477 - https://github.com/denoland/deno/security/advisories/GHSA-95cj-3hr2-7j5j
|
|
CVE-2024-32479 - https://github.com/librenms/librenms/security/advisories/GHSA-72m9-7c8x-pmmw
|
|
CVE-2024-3248 - https://forum.xpdfreader.com/viewtopic.php?t=43657
|
|
CVE-2024-32480 - https://github.com/librenms/librenms/security/advisories/GHSA-jh57-j3vq-h438
|
|
CVE-2024-32481 - https://github.com/vyperlang/vyper/security/advisories/GHSA-ppx5-q359-pvwj
|
|
CVE-2024-3251 - https://github.com/0xAlmighty/Vulnerability-Research/blob/main/SourceCodester/CLMS/SourceCodester-CLMS-SQLi.md
|
|
CVE-2024-3255 - https://vuldb.com/?id.259104
|
|
CVE-2024-3261 - https://wpscan.com/vulnerability/5a0d5922-eefc-48e1-9681-b63e420bb8b3/
|
|
CVE-2024-32645 - https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3
|
|
CVE-2024-32646 - https://github.com/vyperlang/vyper/security/advisories/GHSA-r56x-j438-vw5m
|
|
CVE-2024-32648 - https://github.com/vyperlang/vyper/security/advisories/GHSA-m2v9-w374-5hj9
|
|
CVE-2024-32649 - https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h
|
|
CVE-2024-3265 - https://wpscan.com/vulnerability/ecb74622-eeed-48b6-a944-4e3494d6594d/
|
|
CVE-2024-32650 - https://github.com/rustls/rustls/security/advisories/GHSA-6g7w-8wpp-frhj
|
|
CVE-2024-32651 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-4r7v-whpg-8rx3
|
|
CVE-2024-32653 - https://github.com/skylot/jadx/security/advisories/GHSA-3pp3-hg2q-9gpm
|
|
CVE-2024-32735 - https://www.tenable.com/security/research/tra-2024-14
|
|
CVE-2024-32736 - https://www.tenable.com/security/research/tra-2024-14
|
|
CVE-2024-32737 - https://www.tenable.com/security/research/tra-2024-14
|
|
CVE-2024-32738 - https://www.tenable.com/security/research/tra-2024-14
|
|
CVE-2024-32739 - https://www.tenable.com/security/research/tra-2024-14
|
|
CVE-2024-32743 - https://github.com/adiapera/xss_security_wondercms_3.4.3
|
|
CVE-2024-32744 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3
|
|
CVE-2024-32745 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3
|
|
CVE-2024-32746 - https://github.com/adiapera/xss_menu_page_wondercms_3.4.3
|
|
CVE-2024-3281 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-003.txt
|
|
CVE-2024-32866 - https://github.com/edmundhung/conform/security/advisories/GHSA-624g-8qjg-8qxf
|
|
CVE-2024-32869 - https://github.com/honojs/hono/security/advisories/GHSA-3mpf-rcc7-5347
|
|
CVE-2024-32876 - https://github.com/TeamNewPipe/NewPipe/security/advisories/GHSA-wxrm-jhpf-vp6v
|
|
CVE-2024-32878 - https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-p5mv-gjc5-mwqv
|
|
CVE-2024-32880 - https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f
|
|
CVE-2024-32881 - https://github.com/danswer-ai/danswer/security/advisories/GHSA-xr9w-3ggr-hr6j
|
|
CVE-2024-32884 - https://github.com/Byron/gitoxide/security/advisories/GHSA-98p4-xjmm-8mfh
|
|
CVE-2024-32884 - https://rustsec.org/advisories/RUSTSEC-2024-0335.html
|
|
CVE-2024-32890 - https://github.com/librespeed/speedtest/security/advisories/GHSA-3954-xrwh-fq4q
|
|
CVE-2024-32962 - https://github.com/node-saml/xml-crypto/security/advisories/GHSA-2xp3-57p7-qf4v
|
|
CVE-2024-32963 - https://github.com/navidrome/navidrome/security/advisories/GHSA-4jrx-5w4h-3gpm
|
|
CVE-2024-32964 - https://github.com/lobehub/lobe-chat/security/advisories/GHSA-mxhq-xw3g-rphc
|
|
CVE-2024-32970 - https://github.com/payloadbox/xss-payload-list
|
|
CVE-2024-32977 - https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-2vjq-hg5w-5gm7
|
|
CVE-2024-32982 - https://github.com/litestar-org/litestar/security/advisories/GHSA-83pv-qr33-2vcf
|
|
CVE-2024-33101 - https://github.com/thinksaas/ThinkSAAS/issues/34
|
|
CVE-2024-33102 - https://github.com/thinksaas/ThinkSAAS/issues/35
|
|
CVE-2024-33103 - https://github.com/dokuwiki/dokuwiki/issues/4267
|
|
CVE-2024-33110 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md
|
|
CVE-2024-33111 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md
|
|
CVE-2024-33112 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md
|
|
CVE-2024-33113 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md
|
|
CVE-2024-33247 - https://github.com/CveSecLook/cve/issues/11
|
|
CVE-2024-33250 - https://github.com/hacker2004/cccccckkkkkk/blob/main/CVE-2024-33250.md
|
|
CVE-2024-33255 - https://github.com/jerryscript-project/jerryscript/issues/5135
|
|
CVE-2024-33258 - https://github.com/jerryscript-project/jerryscript/issues/5114
|
|
CVE-2024-33259 - https://github.com/jerryscript-project/jerryscript/issues/5132
|
|
CVE-2024-33260 - https://github.com/jerryscript-project/jerryscript/issues/5133
|
|
CVE-2024-33263 - https://github.com/bellard/quickjs/issues/277
|
|
CVE-2024-33266 - https://security.friendsofpresta.org/modules/2024/04/25/deliveryorderautoupdate.html
|
|
CVE-2024-33272 - https://security.friendsofpresta.org/modules/2024/04/25/autosuggest.html
|
|
CVE-2024-33294 - https://github.com/CveSecLook/cve/issues/16
|
|
CVE-2024-33302 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33302.md
|
|
CVE-2024-33302 - https://portswigger.net/web-security/cross-site-scripting/stored
|
|
CVE-2024-33303 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33303.md
|
|
CVE-2024-33304 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33304.md
|
|
CVE-2024-33305 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33305.md
|
|
CVE-2024-33306 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33306.md
|
|
CVE-2024-33307 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33307.md
|
|
CVE-2024-33332 - https://github.com/wy876/cve/issues/3
|
|
CVE-2024-33338 - https://github.com/7akahash1/POC/blob/main/1.md
|
|
CVE-2024-33345 - https://github.com/n0wstr/IOTVuln/tree/main/DIR-823g/UploadFirmware
|
|
CVE-2024-33350 - https://github.com/majic-banana/vulnerability/blob/main/POC/taocms-3.0.2%20Arbitrary%20File%20Writing%20Vulnerability.md
|
|
CVE-2024-33383 - https://juvl1ne.github.io/2024/04/18/novel-plus-vulnerability/
|
|
CVE-2024-33398 - https://github.com/HouqiyuA/k8s-rbac-poc
|
|
CVE-2024-33423 - https://github.com/adiapera/xss_language_cmsimple_5.15
|
|
CVE-2024-33424 - https://github.com/adiapera/xss_language_cmsimple_5.15
|
|
CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/heap-buffer-overflow-1.assets/image-20240420005017430.png
|
|
CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/heap-buffer-overflow-1.md
|
|
CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/poc
|
|
CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/heap-buffer-overflow-1
|
|
CVE-2024-33428 - https://github.com/stsaz/phiola/issues/29
|
|
CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.assets/image-20240420011116818.png
|
|
CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.md
|
|
CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/poc/
|
|
CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/heap-buffer-overflow-2
|
|
CVE-2024-33429 - https://github.com/stsaz/phiola/issues/30
|
|
CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/poc/I2ZFI3~5
|
|
CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.assets/image-20240420011601263.png
|
|
CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.md
|
|
CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1
|
|
CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1/poc
|
|
CVE-2024-33430 - https://github.com/stsaz/phiola/issues/28
|
|
CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.assets/image-20240420004701828.png
|
|
CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.md
|
|
CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/poc/I0I72U~G
|
|
CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/flowPointException-1
|
|
CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/flowPointException-1/poc
|
|
CVE-2024-33431 - https://github.com/stsaz/phiola/issues/27
|
|
CVE-2024-33435 - https://github.com/vulreport3r/cve-reports/blob/main/Ncast_Yingshi_has_RCE_vulnerabilities/report.md
|
|
CVE-2024-33436 - https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41
|
|
CVE-2024-33436 - https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-33436
|
|
CVE-2024-33437 - https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41
|
|
CVE-2024-33437 - https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-33437
|
|
CVE-2024-33438 - https://github.com/julio-cfa/CVE-2024-33438
|
|
CVE-2024-33443 - https://gist.github.com/LioTree/a81111fb0c598a920cb49aaf0bd64e58
|
|
CVE-2024-33443 - https://github.com/liu21st/onethink/issues/40
|
|
CVE-2024-33444 - https://gist.github.com/LioTree/1971a489dd5ff619b89e7a9e1da91152
|
|
CVE-2024-33444 - https://github.com/liu21st/onethink/issues/39
|
|
CVE-2024-33445 - https://gist.github.com/LioTree/04a4ece38df53af4027d52b2aeb7aff6
|
|
CVE-2024-33445 - https://github.com/hisiphp/hisiphp/issues/11
|
|
CVE-2024-3346 - https://github.com/Yu1e/vuls/blob/main/Byzro%20Networks%20Smart%20S80%20management%20platform%20has%20rce%20vulnerability.md
|
|
CVE-2024-33485 - https://github.com/CveSecLook/cve/issues/17
|
|
CVE-2024-33525 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/
|
|
CVE-2024-33526 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/
|
|
CVE-2024-33527 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/
|
|
CVE-2024-33528 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/
|
|
CVE-2024-33529 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/
|
|
CVE-2024-33530 - https://insinuator.net/2024/05/vulnerability-in-jitsi-meet-meeting-password-disclosure-affecting-meetings-with-lobbies/
|
|
CVE-2024-3366 - https://github.com/xuxueli/xxl-job/issues/3391
|
|
CVE-2024-33664 - https://github.com/mpdavis/python-jose/issues/344
|
|
CVE-2024-33669 - https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html
|
|
CVE-2024-33669 - https://help.passbolt.com/incidents/pwned-password-service-information-leak
|
|
CVE-2024-3368 - https://wpscan.com/vulnerability/ab78b1a5-e28c-406b-baaf-6d53017f9328/
|
|
CVE-2024-3376 - https://github.com/Sospiro014/zday1/blob/main/Execution_After_Redirect.md
|
|
CVE-2024-33763 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg
|
|
CVE-2024-33764 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg
|
|
CVE-2024-33766 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg
|
|
CVE-2024-33767 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg
|
|
CVE-2024-33768 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg
|
|
CVE-2024-3377 - https://github.com/Sospiro014/zday1/blob/main/ear_stord_xss.md
|
|
CVE-2024-33771 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md
|
|
CVE-2024-33772 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md
|
|
CVE-2024-33773 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md
|
|
CVE-2024-33774 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md
|
|
CVE-2024-3378 - https://vuldb.com/?submit.310642
|
|
CVE-2024-33788 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33788
|
|
CVE-2024-33789 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33789
|
|
CVE-2024-33792 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792
|
|
CVE-2024-33793 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33793
|
|
CVE-2024-33820 - https://gist.github.com/Swind1er/ee095fbfe13f77a5b45b39a5aa82bd17
|
|
CVE-2024-33829 - https://github.com/xyaly163/cms/blob/main/1.md
|
|
CVE-2024-33830 - https://github.com/xyaly163/cms/blob/main/2.md
|
|
CVE-2024-33831 - https://github.com/YMFE/yapi/issues/2745
|
|
CVE-2024-33832 - https://github.com/helloxz/onenav/issues/186
|
|
CVE-2024-33835 - https://github.com/isBigChen/iot/blob/main/tenda/formSetSafeWanWebMan.md
|
|
CVE-2024-33891 - https://straightblast.medium.com/all-your-secrets-are-belong-to-us-a-delinea-secret-server-authn-authz-bypass-adc26c800ad3
|
|
CVE-2024-33899 - https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983
|
|
CVE-2024-33900 - https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838
|
|
CVE-2024-33901 - https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838
|
|
CVE-2024-33905 - https://medium.com/@pedbap/telegram-web-app-xss-session-hijacking-1-click-95acccdc8d90
|
|
CVE-2024-3400 - https://security.paloaltonetworks.com/CVE-2024-3400
|
|
CVE-2024-3400 - https://unit42.paloaltonetworks.com/cve-2024-3400/
|
|
CVE-2024-34020 - https://bugzilla.suse.com/show_bug.cgi?id=1223534
|
|
CVE-2024-3405 - https://wpscan.com/vulnerability/6968d43c-16ff-43a9-8451-71aabbe69014/
|
|
CVE-2024-34058 - https://www.openwall.com/lists/oss-security/2024/05/16/3
|
|
CVE-2024-3406 - https://wpscan.com/vulnerability/1bfab060-64d2-4c38-8bc8-a8f81c5a6e0d/
|
|
CVE-2024-34061 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-pwgc-w4x9-gw67
|
|
CVE-2024-3407 - https://wpscan.com/vulnerability/262348ab-a335-4acf-8e4d-229fc0b4972f/
|
|
CVE-2024-34070 - https://github.com/froxlor/Froxlor/security/advisories/GHSA-x525-54hf-xr53
|
|
CVE-2024-34075 - https://github.com/xiboon/kurwov/security/advisories/GHSA-hfrv-h3q8-9jpr
|
|
CVE-2024-34082 - https://github.com/getgrav/grav/security/advisories/GHSA-f8v5-jmfh-pr69
|
|
CVE-2024-34196 - https://gist.github.com/Swind1er/1ec2fde42254598a72f1d716f9cfe2a1
|
|
CVE-2024-34200 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpQosRules
|
|
CVE-2024-34201 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/getSaveConfig
|
|
CVE-2024-34202 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setMacFilterRules
|
|
CVE-2024-34203 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setLanguageCfg
|
|
CVE-2024-34204 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setUpgradeFW
|
|
CVE-2024-34206 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setWebWlanIdx
|
|
CVE-2024-34207 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setStaticDhcpConfig
|
|
CVE-2024-34209 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpPortFilterRules
|
|
CVE-2024-34210 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/CloudACMunualUpdate_injection
|
|
CVE-2024-34212 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/CloudACMunualUpdate_overflow
|
|
CVE-2024-34215 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetUrlFilterRules
|
|
CVE-2024-34217 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/addWlProfileClientMode
|
|
CVE-2024-34218 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/NTPSyncWithHost
|
|
CVE-2024-34220 - https://github.com/dovankha/CVE-2024-34220
|
|
CVE-2024-34221 - https://github.com/dovankha/CVE-2024-34221
|
|
CVE-2024-34224 - https://github.com/dovankha/CVE-2024-34224
|
|
CVE-2024-34225 - https://github.com/dovankha/CVE-2024-34225
|
|
CVE-2024-34226 - https://github.com/dovankha/CVE-2024-34226
|
|
CVE-2024-34230 - https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34230.md
|
|
CVE-2024-34231 - https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34231.md
|
|
CVE-2024-34246 - https://github.com/wasm3/wasm3/issues/484
|
|
CVE-2024-34249 - https://github.com/wasm3/wasm3/issues/485
|
|
CVE-2024-34250 - https://github.com/bytecodealliance/wasm-micro-runtime/issues/3346
|
|
CVE-2024-34251 - https://github.com/bytecodealliance/wasm-micro-runtime/issues/3347
|
|
CVE-2024-34252 - https://github.com/wasm3/wasm3/issues/483
|
|
CVE-2024-34308 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/README.md
|
|
CVE-2024-34340 - https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m
|
|
CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/commit/5e5e1e0b9422f47d2de81c7c4064b803a01e7203
|
|
CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/pull/1063
|
|
CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/security/advisories/GHSA-38gf-rh2w-gmj7
|
|
CVE-2024-34347 - https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qmmm-73r2-f8xr
|
|
CVE-2024-34352 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847
|
|
CVE-2024-34359 - https://github.com/abetlen/llama-cpp-python/security/advisories/GHSA-56xg-wfcc-g829
|
|
CVE-2024-3437 - https://vuldb.com/?id.259631
|
|
CVE-2024-34391 - https://research.jfrog.com/vulnerabilities/libxmljs-attrs-type-confusion-rce-jfsa-2024-001033988/
|
|
CVE-2024-34392 - https://github.com/libxmljs/libxmljs/issues/646
|
|
CVE-2024-34392 - https://research.jfrog.com/vulnerabilities/libxmljs-namespaces-type-confusion-rce-jfsa-2024-001034096/
|
|
CVE-2024-34393 - https://github.com/marudor/libxmljs2/issues/204
|
|
CVE-2024-34393 - https://research.jfrog.com/vulnerabilities/libxmljs2-attrs-type-confusion-rce-jfsa-2024-001034097/
|
|
CVE-2024-34394 - https://github.com/marudor/libxmljs2/issues/205
|
|
CVE-2024-34394 - https://research.jfrog.com/vulnerabilities/libxmljs2-namespaces-type-confusion-rce-jfsa-2024-001034098/
|
|
CVE-2024-34397 - https://gitlab.gnome.org/GNOME/glib/-/issues/3268
|
|
CVE-2024-34401 - https://www.exploit-db.com/exploits/51988
|
|
CVE-2024-34408 - https://github.com/Tencent/libpag/issues/2230
|
|
CVE-2024-3442 - https://vuldb.com/?id.259695
|
|
CVE-2024-3443 - https://github.com/zyairelai/CVE-submissions/blob/main/prison-xss.md
|
|
CVE-2024-34467 - https://github.com/top-think/framework/issues/2996
|
|
CVE-2024-34470 - https://github.com/osvaldotenorio/CVE-2024-34470
|
|
CVE-2024-34471 - https://github.com/osvaldotenorio/CVE-2024-34471
|
|
CVE-2024-34472 - https://github.com/osvaldotenorio/CVE-2024-34472
|
|
CVE-2024-34473 - https://jira.o-ran-sc.org/browse/RIC-1055
|
|
CVE-2024-34478 - https://delvingbitcoin.org/t/disclosure-btcd-consensus-bugs-due-to-usage-of-signed-transaction-version/455
|
|
CVE-2024-34483 - https://github.com/faucetsdn/ryu/issues/193
|
|
CVE-2024-34484 - https://github.com/faucetsdn/ryu/issues/194
|
|
CVE-2024-34486 - https://github.com/faucetsdn/ryu/issues/190
|
|
CVE-2024-34487 - https://github.com/faucetsdn/ryu/issues/192
|
|
CVE-2024-34488 - https://github.com/faucetsdn/ryu/issues/191
|
|
CVE-2024-34489 - https://github.com/faucetsdn/ryu/issues/195
|
|
CVE-2024-34515 - https://github.com/spatie/image-optimizer/issues/210
|
|
CVE-2024-34523 - https://github.com/piuppi/Proof-of-Concepts/blob/main/AChecker/CVE-2024-34523.md
|
|
CVE-2024-34532 - https://github.com/luvsn/OdZoo/tree/main/exploits/query_deluxe
|
|
CVE-2024-34533 - https://github.com/luvsn/OdZoo/tree/main/exploits/izi_data
|
|
CVE-2024-34534 - https://github.com/luvsn/OdZoo/tree/main/exploits/text_commander
|
|
CVE-2024-3471 - https://wpscan.com/vulnerability/a3c282fb-81b8-48bf-8c18-8366ea8ad9af/
|
|
CVE-2024-34714 - https://github.com/hoppscotch/hoppscotch-extension/security/advisories/GHSA-jjh5-pvqx-gg5v
|
|
CVE-2024-3472 - https://wpscan.com/vulnerability/d42f74dd-520f-40aa-9cf0-3544db9562c7/
|
|
CVE-2024-3474 - https://wpscan.com/vulnerability/e5c3e145-6738-4d85-8507-43ca1b1d5877/
|
|
CVE-2024-3475 - https://wpscan.com/vulnerability/bf540242-5306-4c94-ad50-782d0d5b127f/
|
|
CVE-2024-3476 - https://wpscan.com/vulnerability/46f74493-9082-48b2-90bc-2c1d1db64ccd/
|
|
CVE-2024-3477 - https://wpscan.com/vulnerability/ca5e59e6-c500-4129-997b-391cdf9aa9c7/
|
|
CVE-2024-3478 - https://wpscan.com/vulnerability/09f1a696-86ee-47cc-99de-57cfd2a3219d/
|
|
CVE-2024-3481 - https://wpscan.com/vulnerability/0c441293-e7f9-4634-8f3a-09925cd2b696/
|
|
CVE-2024-34899 - https://hackerdna.com/courses/cve/cve-2024-34899
|
|
CVE-2024-34914 - https://chmod744.super.site/redacted-vulnerability
|
|
CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/dos_mmExhausted.assets/image-20240505161831080.png
|
|
CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/dos_mmExhausted.md
|
|
CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/poc/I7K9QM~F
|
|
CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_mmExhausted
|
|
CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_mmExhausted/poc
|
|
CVE-2024-34953 - https://github.com/taurusxin/ncmdump/issues/19
|
|
CVE-2024-34954 - https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/XSS/XSS.md
|
|
CVE-2024-34955 - https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/SQLi.md
|
|
CVE-2024-34974 - https://github.com/hunzi0/Vullnfo/tree/main/Tenda/AC18/formSetPPTPServer
|
|
CVE-2024-35009 - https://github.com/Thirtypenny77/cms/blob/main/5.md
|
|
CVE-2024-35010 - https://github.com/Thirtypenny77/cms/blob/main/6.md
|
|
CVE-2024-35011 - https://github.com/Thirtypenny77/cms/blob/main/8.md
|
|
CVE-2024-35012 - https://github.com/Thirtypenny77/cms/blob/main/7.md
|
|
CVE-2024-35048 - https://github.com/javahuang/SurveyKing/issues/56
|
|
CVE-2024-35049 - https://github.com/javahuang/SurveyKing/issues/55
|
|
CVE-2024-35050 - https://github.com/javahuang/SurveyKing/issues/57
|
|
CVE-2024-35099 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/V9.3.5u.6698_B20230810/README.md
|
|
CVE-2024-35108 - https://github.com/FirstLIF/cms/blob/main/1.md
|
|
CVE-2024-35179 - https://github.com/stalwartlabs/mail-server/security/advisories/GHSA-5pfx-j27j-4c6h
|
|
CVE-2024-3521 - https://github.com/garboa/cve_3/blob/main/Upload2.md
|
|
CVE-2024-3529 - https://vuldb.com/?id.259899
|
|
CVE-2024-35373 - https://chocapikk.com/posts/2024/mocodo-vulnerabilities/
|
|
CVE-2024-35374 - https://chocapikk.com/posts/2024/mocodo-vulnerabilities/
|
|
CVE-2024-3548 - https://wpscan.com/vulnerability/9eef8b29-2c62-4daa-ae90-467ff9be18d8/
|
|
CVE-2024-3567 - https://gitlab.com/qemu-project/qemu/-/issues/2273
|
|
CVE-2024-3580 - https://wpscan.com/vulnerability/31f401c4-735a-4efb-b81f-ab98c00c526b/
|
|
CVE-2024-3582 - https://wpscan.com/vulnerability/5a348b5d-13aa-40c3-9d21-0554683f8019/
|
|
CVE-2024-3590 - https://wpscan.com/vulnerability/829f4d40-e5b0-4009-b753-85ca2a5b3d25/
|
|
CVE-2024-3591 - https://wpscan.com/vulnerability/f85d8b61-eaeb-433c-b857-06ee4db5c7d5/
|
|
CVE-2024-3594 - https://wpscan.com/vulnerability/7a8a834a-e5d7-4678-9d35-4390d1200437/
|
|
CVE-2024-36049 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-007/
|
|
CVE-2024-36052 - https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983
|
|
CVE-2024-36080 - https://www.westermo.com/-/media/Files/Cyber-security/westermo_sa_EDW-100_24-05.pdf
|
|
CVE-2024-36081 - https://www.westermo.com/-/media/Files/Cyber-security/westermo_sa_EDW-100_24-05.pdf
|
|
CVE-2024-3617 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-deactivate_case-sqli.md
|
|
CVE-2024-3618 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-activate_case-sqli.md
|
|
CVE-2024-3619 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-addcase_stage-sqli.md
|
|
CVE-2024-3620 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-adds-sqli.md
|
|
CVE-2024-3621 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-register_case-sqli.md
|
|
CVE-2024-3628 - https://wpscan.com/vulnerability/171af8eb-ceeb-403a-abc2-969d9535a4c9/
|
|
CVE-2024-3629 - https://wpscan.com/vulnerability/c1f6ed2c-0f84-4b13-b39e-5cb91443c2b1/
|
|
CVE-2024-3630 - https://wpscan.com/vulnerability/cbab7639-fdb2-4ee5-b5ca-9e30701a63b7/
|
|
CVE-2024-3631 - https://wpscan.com/vulnerability/c59a8b49-6f3e-452b-ba9b-50b80c522ee9/
|
|
CVE-2024-3634 - https://wpscan.com/vulnerability/76e000e0-314f-4e39-8871-68bf8cc95b22/
|
|
CVE-2024-3637 - https://wpscan.com/vulnerability/33f6fea6-c784-40ae-a548-55d41618752d/
|
|
CVE-2024-3641 - https://wpscan.com/vulnerability/f4047f1e-d5ea-425f-8def-76dd5e6a497e/
|
|
CVE-2024-3642 - https://wpscan.com/vulnerability/dc44d85f-afe8-4824-95b0-11b9abfb04d8/
|
|
CVE-2024-3643 - https://wpscan.com/vulnerability/698277e6-56f9-4688-9a84-c2fa3ea9f7dc/
|
|
CVE-2024-3644 - https://wpscan.com/vulnerability/10eb712a-d9c3-46c9-be6a-02811396fae8/
|
|
CVE-2024-3660 - https://kb.cert.org/vuls/id/253266
|
|
CVE-2024-3660 - https://www.kb.cert.org/vuls/id/253266
|
|
CVE-2024-3661 - https://news.ycombinator.com/item?id=40279632
|
|
CVE-2024-3661 - https://www.leviathansecurity.com/blog/tunnelvision
|
|
CVE-2024-3661 - https://www.leviathansecurity.com/research/tunnelvision
|
|
CVE-2024-3690 - https://github.com/psudo-bugboy/CVE-2024
|
|
CVE-2024-3691 - https://github.com/nikhil-aniill/Small-CRM-CVE
|
|
CVE-2024-3691 - https://vuldb.com/?submit.312975
|
|
CVE-2024-3692 - https://wpscan.com/vulnerability/6f100f85-3a76-44be-8092-06eb8595b0c9/
|
|
CVE-2024-3695 - https://vuldb.com/?id.260482
|
|
CVE-2024-3703 - https://wpscan.com/vulnerability/3242b820-1da0-41ba-9f35-7be5dbc6d4b0/
|
|
CVE-2024-3720 - https://github.com/scausoft/cve/blob/main/sql.md
|
|
CVE-2024-3721 - https://github.com/netsecfish/tbk_dvr_command_injection
|
|
CVE-2024-3735 - https://vuldb.com/?submit.311153
|
|
CVE-2024-3745 - https://fluidattacks.com/advisories/gershwin/
|
|
CVE-2024-3748 - https://wpscan.com/vulnerability/01427cfb-5c51-4524-9b9d-e09a603bc34c/
|
|
CVE-2024-3749 - https://wpscan.com/vulnerability/d14bb16e-ce1d-4c31-8791-bc63174897c0/
|
|
CVE-2024-3752 - https://wpscan.com/vulnerability/e738540a-2006-4b92-8db1-2476374d35bd/
|
|
CVE-2024-3755 - https://wpscan.com/vulnerability/d34caeaf-2ecf-44a2-b308-e940bafd402c/
|
|
CVE-2024-3756 - https://wpscan.com/vulnerability/b28d0dca-2df1-4925-be81-dd9c46859c38/
|
|
CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control
|
|
CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control/blob/main/pocCheck3-en.py
|
|
CVE-2024-3767 - https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%203.md
|
|
CVE-2024-3769 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20Authentication%20Bypass.md
|
|
CVE-2024-3770 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%203.md
|
|
CVE-2024-3771 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%204.md
|
|
CVE-2024-3797 - https://github.com/BurakSevben/CVEs/blob/main/QR%20Code%20Bookmark%20System/QR%20Code%20Bookmark%20System%20-%20SQL%20Injection.md
|
|
CVE-2024-3822 - https://wpscan.com/vulnerability/ff5411b1-9e04-4e72-a502-e431d774642a/
|
|
CVE-2024-3823 - https://wpscan.com/vulnerability/a138215c-4b8c-4182-978f-d21ce25070d3/
|
|
CVE-2024-3824 - https://wpscan.com/vulnerability/749ae334-b1d1-421e-a04c-35464c961a4a/
|
|
CVE-2024-3873 - https://vuldb.com/?submit.312623
|
|
CVE-2024-3874 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W20E/formSetRemoteWebManage.md
|
|
CVE-2024-3875 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromNatlimit.md
|
|
CVE-2024-3876 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromVirtualSer.md
|
|
CVE-2024-3877 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromqossetting.md
|
|
CVE-2024-3878 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromwebExcptypemanFilter.md
|
|
CVE-2024-3879 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formSetCfm.md
|
|
CVE-2024-3880 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md
|
|
CVE-2024-3881 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md
|
|
CVE-2024-3903 - https://wpscan.com/vulnerability/0a0e7bd4-948d-47c9-9219-380bda9f3034/
|
|
CVE-2024-3905 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/R7WebsSecurityHandler.md
|
|
CVE-2024-3906 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formQuickIndex.md
|
|
CVE-2024-3907 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetCfm.md
|
|
CVE-2024-3908 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formWriteFacMac.md
|
|
CVE-2024-3909 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexeCommand.md
|
|
CVE-2024-3909 - https://vuldb.com/?id.261145
|
|
CVE-2024-3910 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_page.md
|
|
CVE-2024-3917 - https://wpscan.com/vulnerability/88162016-9fc7-4194-9e81-44c50991f6e9/
|
|
CVE-2024-3918 - https://wpscan.com/vulnerability/2074d0f5-4165-4130-9391-37cb21e8aa1b/
|
|
CVE-2024-3920 - https://wpscan.com/vulnerability/2fb28c77-3c35-4a2f-91ed-823d0d011048/
|
|
CVE-2024-3928 - https://github.com/ggfzx/OCP-Security-Misconfiguration/tree/main
|
|
CVE-2024-3932 - https://vuldb.com/?submit.314381
|
|
CVE-2024-3940 - https://wpscan.com/vulnerability/bb0245e5-8e94-4f11-9003-d6208945056c/
|
|
CVE-2024-3941 - https://wpscan.com/vulnerability/6e09e922-983c-4406-8053-747d839995d1/
|
|
CVE-2024-3948 - https://github.com/xuanluansec/vul/issues/5
|
|
CVE-2024-3979 - https://github.com/COVESA/vsomeip/files/14904610/details.zip
|
|
CVE-2024-3979 - https://github.com/COVESA/vsomeip/issues/663
|
|
CVE-2024-4019 - https://github.com/scausoft/cve/blob/main/rce.md
|
|
CVE-2024-4040 - https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/
|
|
CVE-2024-4040 - https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/
|
|
CVE-2024-4061 - https://wpscan.com/vulnerability/175a9f3a-1f8d-44d1-8a12-e037251b025d/
|
|
CVE-2024-4064 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/R7WebsSecurityHandler.md
|
|
CVE-2024-4065 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/formSetRebootTimer.md
|
|
CVE-2024-4066 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md
|
|
CVE-2024-4111 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/SetLEDCfg.md
|
|
CVE-2024-4112 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/formSetVirtualSer.md
|
|
CVE-2024-4113 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/fromSetSysTime.md
|
|
CVE-2024-4114 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/setSmartPowerManagement.md
|
|
CVE-2024-4115 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formAddDnsForward.md
|
|
CVE-2024-4116 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formDelDhcpRule.md
|
|
CVE-2024-4117 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formDelPortMapping.md
|
|
CVE-2024-4118 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindAdd.md
|
|
CVE-2024-4119 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindDel.md
|
|
CVE-2024-4119 - https://vuldb.com/?id.261862
|
|
CVE-2024-4120 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindModify.md
|
|
CVE-2024-4121 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formQOSRuleDel.md
|
|
CVE-2024-4122 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetDebugCfg.md
|
|
CVE-2024-4123 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetPortMapping.md
|
|
CVE-2024-4124 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetRemoteWebManage.md
|
|
CVE-2024-4125 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetStaticRoute.md
|
|
CVE-2024-4126 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetSysTime.md
|
|
CVE-2024-4127 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/guestWifiRuleRefresh.md
|
|
CVE-2024-4140 - https://github.com/rjbs/Email-MIME/issues/66
|
|
CVE-2024-4164 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/formModifyPppAuthWhiteMac.md
|
|
CVE-2024-4165 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/modifyDhcpRule.md
|
|
CVE-2024-4166 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md
|
|
CVE-2024-4167 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_422AA4.md
|
|
CVE-2024-4168 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_4260F0.md
|
|
CVE-2024-4169 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_42775C.md
|
|
CVE-2024-4170 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_429A30.md
|
|
CVE-2024-4171 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromWizardHandle.md
|
|
CVE-2024-4172 - https://github.com/bigbigbigbaby/cms2/blob/main/1.md
|
|
CVE-2024-4236 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1803/formSetSysToolDDNS.md
|
|
CVE-2024-4237 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/R7WebsSecurityHandler.md
|
|
CVE-2024-4238 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/formSetDeviceName_devName.md
|
|
CVE-2024-4239 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/formSetRebootTimer.md
|
|
CVE-2024-4240 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_auto.md
|
|
CVE-2024-4241 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_user.md
|
|
CVE-2024-4242 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDget.md
|
|
CVE-2024-4243 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDset.md
|
|
CVE-2024-4244 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/fromDhcpSetSer.md
|
|
CVE-2024-4246 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManageDouble_user.md
|
|
CVE-2024-4247 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_auto.md
|
|
CVE-2024-4248 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_user.md
|
|
CVE-2024-4249 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formwrlSSIDget.md
|
|
CVE-2024-4250 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formwrlSSIDset.md
|
|
CVE-2024-4251 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/fromDhcpSetSer.md
|
|
CVE-2024-4252 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md
|
|
CVE-2024-4257 - https://github.com/GAO-UNO/cve/blob/main/sql.md
|
|
CVE-2024-4289 - https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/
|
|
CVE-2024-4290 - https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/
|
|
CVE-2024-4291 - https://github.com/L1ziang/Vulnerability/blob/main/formAddMacfilterRule.md
|
|
CVE-2024-4293 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_xss.md
|
|
CVE-2024-4294 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_idor.md
|
|
CVE-2024-4340 - https://github.com/advisories/GHSA-2m57-hf25-phgg
|
|
CVE-2024-4340 - https://research.jfrog.com/vulnerabilities/sqlparse-stack-exhaustion-dos-jfsa-2024-001031292/
|
|
CVE-2024-4348 - https://vuldb.com/?submit.320855
|
|
CVE-2024-4349 - https://github.com/CveSecLook/cve/issues/19
|
|
CVE-2024-4372 - https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/
|
|
CVE-2024-4388 - https://wpscan.com/vulnerability/5c791747-f60a-40a7-94fd-e4b9bb5ea2b0/
|
|
CVE-2024-4399 - https://wpscan.com/vulnerability/0690327e-da60-4d71-8b3c-ac9533d82302/
|
|
CVE-2024-4491 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formGetDiagnoseInfo.md
|
|
CVE-2024-4492 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formOfflineSet.md
|
|
CVE-2024-4493 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetAutoPing.md
|
|
CVE-2024-4494 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetUplinkInfo.md
|
|
CVE-2024-4495 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formWifiMacFilterGet.md
|
|
CVE-2024-4497 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formexeCommand.md
|
|
CVE-2024-4512 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss.md
|
|
CVE-2024-4528 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md
|
|
CVE-2024-4536 - https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/198
|
|
CVE-2024-4542 - https://research.cleantalk.org/cve-2024-3548/
|
|
CVE-2024-4542 - https://wpscan.com/vulnerability/9eef8b29-2c62-4daa-ae90-467ff9be18d8/
|
|
CVE-2024-4547 - https://www.tenable.com/security/research/tra-2024-13
|
|
CVE-2024-4548 - https://www.tenable.com/security/research/tra-2024-13
|
|
CVE-2024-4549 - https://www.tenable.com/security/research/tra-2024-13
|
|
CVE-2024-4585 - https://github.com/Hckwzh/cms/blob/main/16.md
|
|
CVE-2024-4586 - https://github.com/Hckwzh/cms/blob/main/17.md
|
|
CVE-2024-4587 - https://github.com/Hckwzh/cms/blob/main/18.md
|
|
CVE-2024-4588 - https://github.com/Hckwzh/cms/blob/main/19.md
|
|
CVE-2024-4589 - https://github.com/Hckwzh/cms/blob/main/20.md
|
|
CVE-2024-4590 - https://github.com/Hckwzh/cms/blob/main/21.md
|
|
CVE-2024-4591 - https://github.com/Hckwzh/cms/blob/main/22.md
|
|
CVE-2024-4592 - https://github.com/Hckwzh/cms/blob/main/23.md
|
|
CVE-2024-4593 - https://github.com/Hckwzh/cms/blob/main/24.md
|
|
CVE-2024-4594 - https://github.com/Hckwzh/cms/blob/main/25.md
|
|
CVE-2024-4645 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss4.md
|
|
CVE-2024-4653 - https://github.com/Hefei-Coffee/cve/blob/main/sql.md
|
|
CVE-2024-4654 - https://github.com/Hefei-Coffee/cve/blob/main/sql2.md
|
|
CVE-2024-4723 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_case-status.md
|
|
CVE-2024-4725 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_client_user.md
|
|
CVE-2024-4726 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_clients.md
|
|
CVE-2024-4727 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_court-type.md
|
|
CVE-2024-4728 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_court.md
|
|
CVE-2024-4730 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_judge.md
|
|
CVE-2024-4732 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_service.md
|
|
CVE-2024-4735 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_tasks.md
|
|
CVE-2024-4738 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_appointment.md
|
|
CVE-2024-4792 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_action.md
|
|
CVE-2024-4793 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_laundry.md
|
|
CVE-2024-4794 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_receiving.md
|
|
CVE-2024-4795 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_user.md
|
|
CVE-2024-4796 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_inv.md
|
|
CVE-2024-4797 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/xss_action.md
|
|
CVE-2024-4798 - https://github.com/Hefei-Coffee/cve/blob/main/sql5.md
|
|
CVE-2024-4817 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR_manage_user.md
|
|
CVE-2024-4818 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/LFI.md
|
|
CVE-2024-4819 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR.md
|
|
CVE-2024-4853 - https://gitlab.com/wireshark/wireshark/-/issues/19724
|
|
CVE-2024-4855 - https://gitlab.com/wireshark/wireshark/-/issues/19782
|
|
CVE-2024-4855 - https://gitlab.com/wireshark/wireshark/-/issues/19783
|
|
CVE-2024-4855 - https://gitlab.com/wireshark/wireshark/-/issues/19784
|
|
CVE-2024-4860 - https://www.tenable.com/security/research/tra-2024-16
|
|
CVE-2024-4966 - https://github.com/CveSecLook/cve/issues/30
|
|
CVE-2024-5046 - https://github.com/CveSecLook/cve/issues/32
|
|
CVE-2024-5047 - https://github.com/I-Schnee-I/cev/blob/main/SourceCodester%20Student%20Management%20System%201.0%20controller.php%20Unrestricted%20Upload.md
|
|
CVE-2024-5048 - https://github.com/BurakSevben/CVEs/blob/main/Budget%20Management%20App/Budget%20Management%20App%20-%20SQL%20Injection%20-%201.md
|
|
CVE-2024-5049 - https://github.com/polaris0x1/CVE/issues/2
|
|
CVE-2024-5051 - https://vuldb.com/?id.264748
|
|
CVE-2024-5063 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20Authentication%20Bypass.md
|
|
CVE-2024-5064 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%202%20(Unauthenticated).md
|
|
CVE-2024-5064 - https://vuldb.com/?id.264923
|
|
CVE-2024-5065 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%203%20(Unauthenticated).md
|
|
CVE-2024-5066 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%204.md
|
|
CVE-2024-5069 - https://vuldb.com/?id.264926
|
|
CVE-2024-5093 - https://github.com/BurakSevben/CVEs/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20Authentication%20Bypass.md
|
|
CVE-2024-5094 - https://github.com/BurakSevben/CVEs/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20SQL%20Injection%20-%202.md
|
|
CVE-2024-5097 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20CSRF.md
|
|
CVE-2024-5098 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-1.md
|
|
CVE-2024-5099 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-2.md
|
|
CVE-2024-5100 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-3.md
|
|
CVE-2024-5101 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-4.md
|
|
CVE-2024-5116 - https://github.com/polaris0x1/CVE/issues/3
|
|
CVE-2024-5117 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md
|
|
CVE-2024-5118 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md
|
|
CVE-2024-5119 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%202.md
|
|
CVE-2024-5120 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%203.md
|
|
CVE-2024-5121 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%202.md
|
|
CVE-2024-5122 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%204.md
|
|
CVE-2024-5123 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%201.md
|
|
CVE-2024-5134 - https://github.com/BurakSevben/CVEs/blob/main/Electricity%20Consumption%20Monitoring%20Tool/Electricity%20Consumption%20Monitoring%20Tool%20-%20SQL%20Injection.md
|
|
CVE-2024-5135 - https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20SQL%20Injection%20-%201.md
|
|
CVE-2024-5136 - https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%201.md
|
|
CVE-2024-5137 - https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%202.md
|
|
CVE-2024-5145 - https://github.com/CveSecLook/cve/issues/38 |