Auto Update 2025/01/21 00:32:02

This commit is contained in:
motikan2010-bot 2025-01-21 09:32:02 +09:00
parent afdbdbcdde
commit 54cc276b0e
23 changed files with 117 additions and 85 deletions

View file

@ -14,10 +14,10 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2025-01-19T07:23:08Z",
"updated_at": "2025-01-20T22:41:56Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2306,
"watchers_count": 2306,
"stargazers_count": 2308,
"watchers_count": 2308,
"has_discussions": false,
"forks_count": 462,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 462,
"watchers": 2306,
"watchers": 2308,
"score": 0,
"subscribers_count": 117
},

View file

@ -111,10 +111,10 @@
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
"fork": false,
"created_at": "2015-02-03T20:28:27Z",
"updated_at": "2024-11-16T14:27:56Z",
"updated_at": "2025-01-20T22:34:13Z",
"pushed_at": "2023-10-06T16:11:26Z",
"stargazers_count": 251,
"watchers_count": 251,
"stargazers_count": 252,
"watchers_count": 252,
"has_discussions": false,
"forks_count": 74,
"allow_forking": true,
@ -131,7 +131,7 @@
],
"visibility": "public",
"forks": 74,
"watchers": 251,
"watchers": 252,
"score": 0,
"subscribers_count": 17
},

View file

@ -107,10 +107,10 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2025-01-13T03:40:38Z",
"updated_at": "2025-01-20T21:03:10Z",
"pushed_at": "2020-11-09T07:33:12Z",
"stargazers_count": 290,
"watchers_count": 290,
"stargazers_count": 291,
"watchers_count": 291,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 290,
"watchers": 291,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,10 +14,10 @@
"description": "wpDiscuz 7.0.4 Remote Code Execution",
"fork": false,
"created_at": "2021-06-13T23:10:19Z",
"updated_at": "2025-01-04T08:47:10Z",
"updated_at": "2025-01-20T19:50:57Z",
"pushed_at": "2021-06-15T17:30:23Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -34,6 +34,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -81,7 +81,7 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -91,7 +91,7 @@
"path-traversal-exploitation"
],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 2,
"score": 0,
"subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2025-01-18T08:56:30Z",
"updated_at": "2025-01-20T19:16:43Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 998,
"watchers_count": 998,
"stargazers_count": 999,
"watchers_count": 999,
"has_discussions": false,
"forks_count": 192,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 192,
"watchers": 998,
"watchers": 999,
"score": 0,
"subscribers_count": 24
},

View file

@ -743,10 +743,10 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-16T06:54:15Z",
"updated_at": "2025-01-20T16:50:03Z",
"updated_at": "2025-01-20T19:00:43Z",
"pushed_at": "2025-01-16T09:56:36Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -755,7 +755,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 55,
"watchers": 56,
"score": 0,
"subscribers_count": 5
},
@ -805,8 +805,8 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-18T15:32:21Z",
"updated_at": "2025-01-20T18:09:34Z",
"pushed_at": "2025-01-20T18:09:32Z",
"updated_at": "2025-01-21T00:19:32Z",
"pushed_at": "2025-01-21T00:19:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-09-24T21:59:23Z",
"updated_at": "2024-11-20T13:36:51Z",
"updated_at": "2025-01-20T22:29:36Z",
"pushed_at": "2023-10-12T19:18:32Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 145,
"watchers_count": 145,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 144,
"watchers": 145,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Repository contains description for CVE-2023-35793",
"fork": false,
"created_at": "2023-09-26T11:39:05Z",
"updated_at": "2024-03-10T00:48:20Z",
"updated_at": "2025-01-20T20:02:46Z",
"pushed_at": "2023-09-26T17:24:01Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 0
}

View file

@ -193,5 +193,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 919718421,
"name": "CVE-2023-40028",
"full_name": "godylockz\/CVE-2023-40028",
"owner": {
"login": "godylockz",
"id": 81207744,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81207744?v=4",
"html_url": "https:\/\/github.com\/godylockz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/godylockz\/CVE-2023-40028",
"description": null,
"fork": false,
"created_at": "2025-01-20T22:01:38Z",
"updated_at": "2025-01-20T22:13:53Z",
"pushed_at": "2025-01-20T22:13:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -139,8 +139,8 @@
},
{
"id": 903915508,
"name": "CVE-2024-0582",
"full_name": "101010zyl\/CVE-2024-0582",
"name": "CVE-2024-0582-dataonly",
"full_name": "101010zyl\/CVE-2024-0582-dataonly",
"owner": {
"login": "101010zyl",
"id": 64526492,
@ -148,11 +148,11 @@
"html_url": "https:\/\/github.com\/101010zyl",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/101010zyl\/CVE-2024-0582",
"html_url": "https:\/\/github.com\/101010zyl\/CVE-2024-0582-dataonly",
"description": "A data-only attack based on CVE-2024-0582",
"fork": false,
"created_at": "2024-12-15T21:56:41Z",
"updated_at": "2024-12-15T22:21:17Z",
"updated_at": "2025-01-20T23:01:47Z",
"pushed_at": "2024-12-15T22:21:14Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -45,8 +45,8 @@
"description": null,
"fork": false,
"created_at": "2024-09-14T16:08:56Z",
"updated_at": "2025-01-03T23:35:25Z",
"pushed_at": "2024-09-15T15:53:50Z",
"updated_at": "2025-01-20T18:54:25Z",
"pushed_at": "2025-01-20T18:54:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -107,10 +107,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2025-01-14T19:52:07Z",
"updated_at": "2025-01-20T20:22:19Z",
"pushed_at": "2024-09-08T21:23:34Z",
"stargazers_count": 436,
"watchers_count": 436,
"stargazers_count": 437,
"watchers_count": 437,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 436,
"watchers": 437,
"score": 0,
"subscribers_count": 21
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-14T09:22:33Z",
"updated_at": "2025-01-15T07:15:08Z",
"updated_at": "2025-01-21T00:04:14Z",
"pushed_at": "2024-12-14T10:13:45Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit",
"fork": false,
"created_at": "2024-07-13T19:54:27Z",
"updated_at": "2025-01-20T16:26:53Z",
"updated_at": "2025-01-20T21:18:51Z",
"pushed_at": "2024-09-11T20:00:46Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 47,
"watchers": 49,
"score": 0,
"subscribers_count": 1
},
@ -45,10 +45,10 @@
"description": "Havoc SSRF to RCE",
"fork": false,
"created_at": "2025-01-19T14:48:41Z",
"updated_at": "2025-01-20T14:25:43Z",
"updated_at": "2025-01-21T00:29:26Z",
"pushed_at": "2025-01-20T01:32:54Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "InVesalius discovered CVE. CVE-2024-42845, CVE-2024-44825",
"fork": false,
"created_at": "2024-08-23T13:43:27Z",
"updated_at": "2024-12-31T10:26:10Z",
"updated_at": "2025-01-20T18:40:08Z",
"pushed_at": "2024-12-20T09:48:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 23,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"forks": 24,
"watchers": 81,
"score": 0,
"subscribers_count": 0

View file

@ -14,12 +14,12 @@
"description": "POC exploit for CVE-2024-49138",
"fork": false,
"created_at": "2025-01-15T00:43:37Z",
"updated_at": "2025-01-20T16:34:47Z",
"updated_at": "2025-01-21T00:31:01Z",
"pushed_at": "2025-01-20T12:16:52Z",
"stargazers_count": 170,
"watchers_count": 170,
"stargazers_count": 175,
"watchers_count": 175,
"has_discussions": false,
"forks_count": 32,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"windows"
],
"visibility": "public",
"forks": 32,
"watchers": 170,
"forks": 34,
"watchers": 175,
"score": 0,
"subscribers_count": 2
}

View file

@ -2,22 +2,22 @@
{
"id": 919623005,
"name": "CVE-2024-55511",
"full_name": "sleepingniko\/CVE-2024-55511",
"full_name": "nikosecurity\/CVE-2024-55511",
"owner": {
"login": "sleepingniko",
"login": "nikosecurity",
"id": 182184327,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/182184327?v=4",
"html_url": "https:\/\/github.com\/sleepingniko",
"html_url": "https:\/\/github.com\/nikosecurity",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sleepingniko\/CVE-2024-55511",
"html_url": "https:\/\/github.com\/nikosecurity\/CVE-2024-55511",
"description": "A null pointer dereference vulnerability in Macrium Reflect prior to 8.1.8017 allows an attacker to elevate their privileges via executing a specially crafted executable.",
"fork": false,
"created_at": "2025-01-20T18:23:10Z",
"updated_at": "2025-01-20T18:24:56Z",
"updated_at": "2025-01-20T18:48:53Z",
"pushed_at": "2025-01-20T18:24:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -45,8 +45,8 @@
"description": "Checks for authentication bypass vulnerability inFortinet's FortiOS, potentially exploited by remote attackers.",
"fork": false,
"created_at": "2025-01-18T15:17:07Z",
"updated_at": "2025-01-20T18:26:50Z",
"pushed_at": "2025-01-20T18:26:47Z",
"updated_at": "2025-01-21T00:19:33Z",
"pushed_at": "2025-01-21T00:19:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -263,7 +263,7 @@
- [Forsaken0129/CVE-2024-0582](https://github.com/Forsaken0129/CVE-2024-0582)
- [0ptyx/cve-2024-0582](https://github.com/0ptyx/cve-2024-0582)
- [geniuszly/CVE-2024-0582](https://github.com/geniuszly/CVE-2024-0582)
- [101010zyl/CVE-2024-0582](https://github.com/101010zyl/CVE-2024-0582)
- [101010zyl/CVE-2024-0582-dataonly](https://github.com/101010zyl/CVE-2024-0582-dataonly)
### CVE-2024-0588 (2024-04-09)
@ -8383,7 +8383,7 @@
<code>A null pointer dereference vulnerability in Macrium Reflect prior to 8.1.8017 allows an attacker to elevate their privileges via executing a specially crafted executable.
</code>
- [sleepingniko/CVE-2024-55511](https://github.com/sleepingniko/CVE-2024-55511)
- [nikosecurity/CVE-2024-55511](https://github.com/nikosecurity/CVE-2024-55511)
### CVE-2024-55557 (2024-12-16)
@ -14497,6 +14497,7 @@
- [sudlit/CVE-2023-40028](https://github.com/sudlit/CVE-2023-40028)
- [monke443/CVE-2023-40028-Ghost-Arbitrary-File-Read](https://github.com/monke443/CVE-2023-40028-Ghost-Arbitrary-File-Read)
- [rvizx/CVE-2023-40028](https://github.com/rvizx/CVE-2023-40028)
- [godylockz/CVE-2023-40028](https://github.com/godylockz/CVE-2023-40028)
### CVE-2023-40031 (2023-08-25)