Auto Update 2025/01/17 00:31:56

This commit is contained in:
motikan2010-bot 2025-01-17 09:31:56 +09:00
parent c31f3195a8
commit 0f86629107
20 changed files with 148 additions and 80 deletions

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1398,10 +1398,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2025-01-08T06:51:43Z",
"updated_at": "2025-01-16T21:33:50Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 542,
"watchers_count": 542,
"stargazers_count": 543,
"watchers_count": 543,
"has_discussions": false,
"forks_count": 171,
"allow_forking": true,
@ -1416,7 +1416,7 @@
],
"visibility": "public",
"forks": 171,
"watchers": 542,
"watchers": 543,
"score": 0,
"subscribers_count": 25
},

View file

@ -14,10 +14,10 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
"updated_at": "2025-01-07T15:40:47Z",
"updated_at": "2025-01-16T19:50:12Z",
"pushed_at": "2021-10-13T22:32:36Z",
"stargazers_count": 137,
"watchers_count": 137,
"stargazers_count": 138,
"watchers_count": 138,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 137,
"watchers": 138,
"score": 0,
"subscribers_count": 7
},

View file

@ -147,10 +147,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2025-01-03T19:15:26Z",
"updated_at": "2025-01-16T21:22:21Z",
"pushed_at": "2022-11-16T13:14:56Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -159,7 +159,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 113,
"watchers": 114,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2025-01-10T04:14:32Z",
"updated_at": "2025-01-16T19:49:51Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 996,
"watchers_count": 996,
"stargazers_count": 997,
"watchers_count": 997,
"has_discussions": false,
"forks_count": 192,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 192,
"watchers": 996,
"watchers": 997,
"score": 0,
"subscribers_count": 24
},
@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2025-01-15T03:54:18Z",
"updated_at": "2025-01-16T19:49:37Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 825,
"watchers_count": 825,
"stargazers_count": 826,
"watchers_count": 826,
"has_discussions": false,
"forks_count": 125,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 125,
"watchers": 825,
"watchers": 826,
"score": 0,
"subscribers_count": 13
},

View file

@ -277,10 +277,10 @@
"description": "Proof of concept for CVE-2022-31814",
"fork": false,
"created_at": "2025-01-16T13:59:45Z",
"updated_at": "2025-01-16T14:01:17Z",
"updated_at": "2025-01-16T20:31:41Z",
"pushed_at": "2025-01-16T14:01:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -289,7 +289,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -743,19 +743,50 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-16T06:54:15Z",
"updated_at": "2025-01-16T16:33:35Z",
"updated_at": "2025-01-17T00:22:01Z",
"pushed_at": "2025-01-16T09:56:36Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 7,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 21,
"forks": 10,
"watchers": 32,
"score": 0,
"subscribers_count": 0
},
{
"id": 917925392,
"name": "Fortigate-Leak-CVE-2022-40684",
"full_name": "Rofell0s\/Fortigate-Leak-CVE-2022-40684",
"owner": {
"login": "Rofell0s",
"id": 68858762,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68858762?v=4",
"html_url": "https:\/\/github.com\/Rofell0s",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Rofell0s\/Fortigate-Leak-CVE-2022-40684",
"description": null,
"fork": false,
"created_at": "2025-01-16T22:41:55Z",
"updated_at": "2025-01-16T22:44:31Z",
"pushed_at": "2025-01-16T22:44:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "MobSF Remote code execution (via CVE-2024-21633)",
"fork": false,
"created_at": "2024-01-07T21:34:09Z",
"updated_at": "2024-11-25T16:32:58Z",
"updated_at": "2025-01-16T19:54:10Z",
"pushed_at": "2024-01-07T21:34:51Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 79,
"watchers": 80,
"score": 0,
"subscribers_count": 1
}

View file

@ -81,13 +81,13 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 1

View file

@ -328,8 +328,8 @@
"description": "Bash script to automate Local File Inclusion (LFI) attacks on aiohttp server version 3.9.1.",
"fork": false,
"created_at": "2024-11-14T21:43:29Z",
"updated_at": "2025-01-08T15:21:06Z",
"pushed_at": "2025-01-08T15:21:02Z",
"updated_at": "2025-01-17T00:20:58Z",
"pushed_at": "2025-01-17T00:20:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -952,10 +952,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2025-01-16T01:31:12Z",
"updated_at": "2025-01-16T22:37:04Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3504,
"watchers_count": 3504,
"stargazers_count": 3505,
"watchers_count": 3505,
"has_discussions": false,
"forks_count": 239,
"allow_forking": true,
@ -964,7 +964,7 @@
"topics": [],
"visibility": "public",
"forks": 239,
"watchers": 3504,
"watchers": 3505,
"score": 0,
"subscribers_count": 38
},

View file

@ -420,10 +420,10 @@
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
"fork": false,
"created_at": "2024-08-31T13:56:26Z",
"updated_at": "2024-12-15T05:49:42Z",
"updated_at": "2025-01-16T21:39:23Z",
"pushed_at": "2024-12-15T05:49:39Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -432,7 +432,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-11-26T12:39:44Z",
"updated_at": "2025-01-16T17:55:03Z",
"updated_at": "2025-01-16T23:53:05Z",
"pushed_at": "2025-01-16T09:48:07Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 14,
"forks": 2,
"watchers": 24,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-16T15:33:13Z",
"updated_at": "2025-01-17T00:30:51Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 446,
"watchers_count": 446,
"stargazers_count": 447,
"watchers_count": 447,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 446,
"watchers": 447,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "POC exploit for CVE-2024-49138",
"fork": false,
"created_at": "2025-01-15T00:43:37Z",
"updated_at": "2025-01-16T18:11:13Z",
"updated_at": "2025-01-16T20:52:56Z",
"pushed_at": "2025-01-15T01:01:21Z",
"stargazers_count": 133,
"watchers_count": 133,
"stargazers_count": 136,
"watchers_count": 136,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 133,
"watchers": 136,
"score": 0,
"subscribers_count": 2
}

33
2024/CVE-2024-510.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 917869167,
"name": "CVE-2024-510T",
"full_name": "g0v3lla\/CVE-2024-510T",
"owner": {
"login": "g0v3lla",
"id": 185237270,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185237270?v=4",
"html_url": "https:\/\/github.com\/g0v3lla",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/g0v3lla\/CVE-2024-510T",
"description": null,
"fork": false,
"created_at": "2025-01-16T19:51:01Z",
"updated_at": "2025-01-16T19:57:24Z",
"pushed_at": "2025-01-16T19:57:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-16T07:26:15Z",
"updated_at": "2025-01-16T17:55:36Z",
"updated_at": "2025-01-16T22:27:04Z",
"pushed_at": "2025-01-16T08:58:49Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 22,
"watchers": 27,
"score": 0,
"subscribers_count": 0
}

View file

@ -1128,10 +1128,10 @@
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
"fork": false,
"created_at": "2024-07-02T14:41:43Z",
"updated_at": "2025-01-13T03:23:03Z",
"updated_at": "2025-01-16T21:30:44Z",
"pushed_at": "2024-07-02T15:16:04Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -1150,7 +1150,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 2
},

View file

@ -138,19 +138,19 @@
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
"fork": false,
"created_at": "2025-01-15T18:27:12Z",
"updated_at": "2025-01-16T16:04:14Z",
"updated_at": "2025-01-17T00:29:43Z",
"pushed_at": "2025-01-16T15:44:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"forks": 5,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},
@ -169,10 +169,10 @@
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
"fork": false,
"created_at": "2025-01-16T14:45:53Z",
"updated_at": "2025-01-16T17:53:02Z",
"pushed_at": "2025-01-16T17:25:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"updated_at": "2025-01-16T20:11:13Z",
"pushed_at": "2025-01-16T20:09:52Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 0
}

View file

@ -352,6 +352,9 @@
### CVE-2024-436
- [Julian-gmz/CVE-2024-436_Exploit](https://github.com/Julian-gmz/CVE-2024-436_Exploit)
### CVE-2024-510
- [g0v3lla/CVE-2024-510T](https://github.com/g0v3lla/CVE-2024-510T)
### CVE-2024-1071 (2024-03-13)
<code>The Ultimate Member User Profile, Registration, Login, Member Directory, Content Restriction &amp; Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'sorting' parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
@ -22520,6 +22523,7 @@
- [z-bool/CVE-2022-40684](https://github.com/z-bool/CVE-2022-40684)
- [Anthony1500/CVE-2022-40684](https://github.com/Anthony1500/CVE-2022-40684)
- [arsolutioner/fortigate-belsen-leak](https://github.com/arsolutioner/fortigate-belsen-leak)
- [Rofell0s/Fortigate-Leak-CVE-2022-40684](https://github.com/Rofell0s/Fortigate-Leak-CVE-2022-40684)
### CVE-2022-40687 (2022-11-18)