cvemon icon indicating copy to clipboard operation
cvemon copied to clipboard

Monitoring exploits & references for CVEs

CVEMON - Monitoring exploits & references for CVEs

Latest CVE Additions

CVE-2022-38766 (1)

  • https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766

CVE-2022-38463 (1)

  • https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-38463.yaml

CVE-2022-1481 (1)

  • https://medium.com/@747_FiRM/30-new-security-problems-for-chrome-users-93cc38ef90fa

CVE-2022-0372 (1)

  • https://github.com/1d8/publications

CVE-2022-0083 (1)

  • https://github.com/1d8/publications

CVE-2021-45024 (1)

  • https://github.com/cptsticky/zena

CVE-2021-30147 (1)

  • https://github.com/1d8/publications

CVE-2021-29012 (1)

  • https://github.com/1d8/publications

CVE-2021-29011 (1)

  • https://github.com/1d8/publications

CVE-2021-25642 (1)

  • https://github.com/safe3s/CVE-2021-25642

CVE-2020-35669 (1)

  • https://github.com/n0npax/CVE-2020-35669

CVE-2020-1473 (1)

  • https://github.com/30579096/CVE-2020-1473

Latest Exploit Additions

CVE-2022-37153 (1)

  • https://github.com/5l1v3r1/CVE-2022-37153

CVE-2022-32250 (1)

  • https://github.com/Mr-xn/Penetration_Testing_POC

CVE-2022-30525 (1)

  • https://github.com/PyterSmithDarkGhost/EXPLOITCVE202230525

CVE-2022-30190 (2)

  • https://github.com/oyMarcel/Windows-0-Day-Automated-fix
  • https://github.com/mikeHack23/KB-Vulnerabilidad-FOLLINA

CVE-2022-27925 (1)

  • https://medium.com/@tutorialboy24/a-mass-exploitation-of-unauthenticated-zimbra-rce-cve-2022-27925-23c86524383

CVE-2022-27254 (1)

  • https://medium.com/bugbountywriteup/exploiting-printnightmare-cve-2021-34527-10c6e0f5b83f

CVE-2022-26923 (1)

  • https://medium.com/@TheCoachChris_/2017-nba-offseason-review-golden-state-warriors-9dbd3b9f8f95

CVE-2022-26134 (2)

  • https://medium.com/@theCTIGuy/windows-api-highlight-createprocess-ec1ec0915b9c
  • https://github.com/1337in/CVE-2022-26134web

CVE-2022-22965 (2)

  • https://medium.com/@upvcexperts/bespoke-conservatories-in-water-end-upvc-conservatory-design-water-end-https-t-co-9q7ho7g0he-439dc744bbd1
  • https://medium.com/@cxzero/spring4shell-cve-2022-22965-vulnerability-analysis-and-exploitation-fae244dfd3eb

CVE-2022-20142 (1)

  • https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142

CVE-2022-20007 (2)

  • https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007
  • https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007

CVE-2022-1813 (1)

  • https://medium.com/bugbountywriteup/privilege-escalation-via-account-takeover-on-nodebb-forum-software-512-a593a7b1b4a4

CVE-2022-0847 (1)

  • https://medium.com/@christoph.schroth/free-usb-flash-drives-at-exhibitions-events-e1d6999e340b

CVE-2021-45026 (1)

  • https://github.com/cptsticky/zena

CVE-2021-45025 (1)

  • https://github.com/cptsticky/zena

CVE-2021-44228 (2)

  • https://medium.com/@brammaputram/20-hours-ago-6a2cf1a29e30
  • https://github.com/eurogig/jankybank

CVE-2021-4177 (1)

  • https://github.com/1d8/publications

CVE-2021-34527 (1)

  • https://medium.com/bugbountywriteup/exploiting-printnightmare-cve-2021-34527-10c6e0f5b83f

CVE-2020-36518 (1)

  • https://github.com/Azure/kafka-sink-azure-kusto

CVE-2020-14882 (1)

  • https://medium.com/@alexrobsen60/equity-and-diversity-in-the-nations-cyber-workforce-policy-recommendations-for-addressing-data-e4922f3b8d2c

CVE-2020-0416 (1)

  • https://github.com/Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2020-0416

CVE-2008-0166 (1)

  • https://github.com/demining/Vulnerable-to-Debian-OpenSSL-bug-CVE-2008-0166