Auto Update 2025/01/02 00:31:37

This commit is contained in:
motikan2010-bot 2025-01-02 09:31:37 +09:00
parent 6e13226640
commit 53679091e7
23 changed files with 157 additions and 117 deletions

View file

@ -236,13 +236,13 @@
"stargazers_count": 320,
"watchers_count": 320,
"has_discussions": false,
"forks_count": 80,
"forks_count": 79,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 80,
"forks": 79,
"watchers": 320,
"score": 0,
"subscribers_count": 32

View file

@ -2387,7 +2387,7 @@
"forks": 4,
"watchers": 12,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
},
{
"id": 196871345,

View file

@ -28,7 +28,7 @@
"forks": 19,
"watchers": 48,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 182577297,

View file

@ -28,6 +28,6 @@
"forks": 15,
"watchers": 68,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
}
]

View file

@ -28,6 +28,6 @@
"forks": 6,
"watchers": 14,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
}
]

View file

@ -236,13 +236,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 4,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
"updated_at": "2024-12-19T19:04:27Z",
"updated_at": "2025-01-01T18:54:51Z",
"pushed_at": "2021-10-13T22:32:36Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 136,
"watchers_count": 136,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 135,
"watchers": 136,
"score": 0,
"subscribers_count": 7
},

View file

@ -208,10 +208,10 @@
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
"updated_at": "2024-12-24T14:00:09Z",
"updated_at": "2025-01-01T19:14:43Z",
"pushed_at": "2024-07-12T14:17:27Z",
"stargazers_count": 247,
"watchers_count": 247,
"stargazers_count": 248,
"watchers_count": 248,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -224,7 +224,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 247,
"watchers": 248,
"score": 0,
"subscribers_count": 6
},

View file

@ -10002,10 +10002,10 @@
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
"fork": false,
"created_at": "2021-12-24T13:18:49Z",
"updated_at": "2024-12-29T11:42:11Z",
"updated_at": "2025-01-01T21:44:58Z",
"pushed_at": "2024-01-04T17:12:05Z",
"stargazers_count": 145,
"watchers_count": 145,
"stargazers_count": 146,
"watchers_count": 146,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -10014,7 +10014,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 145,
"watchers": 146,
"score": 0,
"subscribers_count": 6
},

View file

@ -1,35 +1,4 @@
[
{
"id": 587705478,
"name": "CVE-2022-23529-lab",
"full_name": "despossivel\/CVE-2022-23529-lab",
"owner": {
"login": "despossivel",
"id": 10657158,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10657158?v=4",
"html_url": "https:\/\/github.com\/despossivel",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/despossivel\/CVE-2022-23529-lab",
"description": null,
"fork": false,
"created_at": "2023-01-11T11:46:22Z",
"updated_at": "2023-01-11T11:46:22Z",
"pushed_at": "2023-01-11T11:46:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 598042130,
"name": "CVE-2022-23529-PoC",

View file

@ -1191,10 +1191,10 @@
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated Remote code execution (RCE)",
"fork": false,
"created_at": "2022-07-05T04:30:42Z",
"updated_at": "2024-12-06T23:57:31Z",
"updated_at": "2025-01-01T21:53:03Z",
"pushed_at": "2024-08-23T18:52:52Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -1208,7 +1208,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
"updated_at": "2024-12-26T05:57:27Z",
"updated_at": "2025-01-01T20:36:51Z",
"pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 302,
"watchers_count": 302,
"stargazers_count": 303,
"watchers_count": 303,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 302,
"watchers": 303,
"score": 0,
"subscribers_count": 6
},

View file

@ -29,5 +29,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 910957732,
"name": "CVE-2023-47668",
"full_name": "Nxploited\/CVE-2023-47668",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2023-47668",
"description": null,
"fork": false,
"created_at": "2025-01-01T22:42:41Z",
"updated_at": "2025-01-01T22:48:52Z",
"pushed_at": "2025-01-01T22:48:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -206,10 +206,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-16T17:33:13Z",
"updated_at": "2024-12-30T01:06:13Z",
"updated_at": "2025-01-01T22:17:58Z",
"pushed_at": "2024-12-16T17:38:23Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -218,7 +218,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -112,13 +112,13 @@
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 57,
"score": 0,
"subscribers_count": 1

View file

@ -184,36 +184,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 910901711,
"name": "Zabbix-CVE-2024-42327",
"full_name": "BridgerAlderson\/Zabbix-CVE-2024-42327",
"owner": {
"login": "BridgerAlderson",
"id": 139403792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139403792?v=4",
"html_url": "https:\/\/github.com\/BridgerAlderson",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BridgerAlderson\/Zabbix-CVE-2024-42327",
"description": null,
"fork": false,
"created_at": "2025-01-01T18:25:44Z",
"updated_at": "2025-01-01T18:25:48Z",
"pushed_at": "2025-01-01T18:25:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-12-15T22:43:58Z",
"updated_at": "2025-01-01T18:38:42Z",
"pushed_at": "2024-06-07T03:28:00Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 141,
"watchers_count": 141,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 140,
"watchers": 141,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Makes IDA (most versions) to crash upon opening it. ",
"fork": false,
"created_at": "2024-08-25T12:33:14Z",
"updated_at": "2024-12-23T17:17:33Z",
"updated_at": "2025-01-01T21:38:09Z",
"pushed_at": "2024-08-30T09:58:12Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 73,
"watchers": 74,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-46310.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 848997153,
"name": "CVE-2024-46310",
"full_name": "PRX5Y\/CVE-2024-46310",
"owner": {
"login": "PRX5Y",
"id": 35628281,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35628281?v=4",
"html_url": "https:\/\/github.com\/PRX5Y",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PRX5Y\/CVE-2024-46310",
"description": "POC for CVE-2024-46310 For FXServer version's v9601 and prior, Incorrect Access Control in FXServer version's v9601 and prior, for CFX.re FiveM, allows unauthenticated users to modify and read userdata via exposed api endpoint",
"fork": false,
"created_at": "2024-08-28T19:36:52Z",
"updated_at": "2025-01-01T22:30:32Z",
"pushed_at": "2024-10-07T13:09:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -76,19 +76,19 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49112",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-01T18:16:48Z",
"pushed_at": "2025-01-01T18:15:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2025-01-02T00:23:02Z",
"pushed_at": "2025-01-01T21:57:56Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 0
}

33
2024/CVE-2024-53522.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 910931392,
"name": "CVE-2024-53522",
"full_name": "Safecloudth\/CVE-2024-53522",
"owner": {
"login": "Safecloudth",
"id": 192949182,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192949182?v=4",
"html_url": "https:\/\/github.com\/Safecloudth",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Safecloudth\/CVE-2024-53522",
"description": "PoC for CVE-2024-53522 affecting HOSxP XE 4",
"fork": false,
"created_at": "2025-01-01T20:30:58Z",
"updated_at": "2025-01-01T20:32:48Z",
"pushed_at": "2025-01-01T20:32:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-30T01:07:48Z",
"updated_at": "2024-12-31T20:49:57Z",
"updated_at": "2025-01-01T20:52:35Z",
"pushed_at": "2024-12-30T01:08:00Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -6318,7 +6318,6 @@
- [watchdog1337/CVE-2024-42327_Zabbix_SQLI](https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI)
- [itform-fr/Zabbix---CVE-2024-42327](https://github.com/itform-fr/Zabbix---CVE-2024-42327)
- [igorbf495/CVE-2024-42327](https://github.com/igorbf495/CVE-2024-42327)
- [BridgerAlderson/Zabbix-CVE-2024-42327](https://github.com/BridgerAlderson/Zabbix-CVE-2024-42327)
### CVE-2024-42346 (2024-09-20)
@ -6805,6 +6804,9 @@
- [ayato-shitomi/CVE-2024-46278-teedy_1.11_account-takeover](https://github.com/ayato-shitomi/CVE-2024-46278-teedy_1.11_account-takeover)
### CVE-2024-46310
- [PRX5Y/CVE-2024-46310](https://github.com/PRX5Y/CVE-2024-46310)
### CVE-2024-46377 (2024-09-18)
<code>Best House Rental Management System 1.0 contains an arbitrary file upload vulnerability in the save_settings() function of the file rental/admin_class.php.
@ -7695,6 +7697,9 @@
- [AbdullahAlmutawa/CVE-2024-53476](https://github.com/AbdullahAlmutawa/CVE-2024-53476)
### CVE-2024-53522
- [Safecloudth/CVE-2024-53522](https://github.com/Safecloudth/CVE-2024-53522)
### CVE-2024-53617 (2024-12-02)
<code>A Cross Site Scripting vulnerability in LibrePhotos before commit 32237 allows attackers to takeover any account via uploading an HTML file on behalf of the admin user using IDOR in file upload.
@ -15431,6 +15436,7 @@
</code>
- [RandomRobbieBF/CVE-2023-47668](https://github.com/RandomRobbieBF/CVE-2023-47668)
- [Nxploited/CVE-2023-47668](https://github.com/Nxploited/CVE-2023-47668)
### CVE-2023-47840 (2023-12-29)
@ -18484,7 +18490,6 @@
- [TheGetch/CVE-2022-23378](https://github.com/TheGetch/CVE-2022-23378)
### CVE-2022-23529
- [despossivel/CVE-2022-23529-lab](https://github.com/despossivel/CVE-2022-23529-lab)
- [hackintoanetwork/CVE-2022-23529-PoC](https://github.com/hackintoanetwork/CVE-2022-23529-PoC)
### CVE-2022-23614 (2022-02-04)