Auto Update 2025/01/14 00:32:31

This commit is contained in:
motikan2010-bot 2025-01-14 09:32:31 +09:00
parent 8411bc01c9
commit 7dc8a3fde9
23 changed files with 75 additions and 71 deletions

View file

@ -182,7 +182,7 @@
"fork": false,
"created_at": "2024-11-14T04:35:59Z",
"updated_at": "2025-01-05T15:26:10Z",
"pushed_at": "2025-01-13T17:07:41Z",
"pushed_at": "2025-01-13T19:05:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "💀 Linux local root exploit for CVE-2018-18955",
"fork": false,
"created_at": "2022-01-19T14:47:47Z",
"updated_at": "2024-10-19T10:10:39Z",
"updated_at": "2025-01-13T23:18:29Z",
"pushed_at": "2022-01-20T21:05:38Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2025-01-11T08:24:05Z",
"updated_at": "2025-01-13T20:12:17Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4154,
"watchers_count": 4154,
"stargazers_count": 4153,
"watchers_count": 4153,
"has_discussions": false,
"forks_count": 1101,
"allow_forking": true,
@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1101,
"watchers": 4154,
"watchers": 4153,
"score": 0,
"subscribers_count": 149
},

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2025-01-11T08:24:05Z",
"updated_at": "2025-01-13T20:12:17Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4154,
"watchers_count": 4154,
"stargazers_count": 4153,
"watchers_count": 4153,
"has_discussions": false,
"forks_count": 1101,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1101,
"watchers": 4154,
"watchers": 4153,
"score": 0,
"subscribers_count": 149
},

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2025-01-13T02:23:25Z",
"updated_at": "2025-01-13T20:12:48Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1365,
"watchers_count": 1365,
"stargazers_count": 1364,
"watchers_count": 1364,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 1365,
"watchers": 1364,
"score": 0,
"subscribers_count": 15
}

View file

@ -218,6 +218,6 @@
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -972,7 +972,7 @@
"stargazers_count": 1105,
"watchers_count": 1105,
"has_discussions": false,
"forks_count": 193,
"forks_count": 194,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -980,7 +980,7 @@
"cve-2021-4034"
],
"visibility": "public",
"forks": 193,
"forks": 194,
"watchers": 1105,
"score": 0,
"subscribers_count": 14

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2025-01-13T02:23:25Z",
"updated_at": "2025-01-13T20:12:48Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1365,
"watchers_count": 1365,
"stargazers_count": 1364,
"watchers_count": 1364,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 1365,
"watchers": 1364,
"score": 0,
"subscribers_count": 15
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-10T15:59:26Z",
"updated_at": "2024-12-31T20:57:04Z",
"updated_at": "2025-01-13T21:46:03Z",
"pushed_at": "2023-01-13T09:01:20Z",
"stargazers_count": 308,
"watchers_count": 308,
"stargazers_count": 309,
"watchers_count": 309,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 308,
"watchers": 309,
"score": 0,
"subscribers_count": 5
},

View file

@ -49,10 +49,10 @@
"description": "Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler \/ Citrix ADC to CVE-2023-3519",
"fork": false,
"created_at": "2023-07-20T16:05:07Z",
"updated_at": "2024-11-15T16:32:41Z",
"updated_at": "2025-01-13T21:11:50Z",
"pushed_at": "2023-07-23T03:54:44Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -66,7 +66,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 81,
"watchers": 82,
"score": 0,
"subscribers_count": 1
},

View file

@ -703,7 +703,7 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -712,7 +712,7 @@
"go-exploit"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -11,11 +11,11 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/osmancanvural\/CVE-2024-12970",
"description": null,
"description": "Pardus My Computer Os Command Injection",
"fork": false,
"created_at": "2025-01-03T10:23:44Z",
"updated_at": "2025-01-03T10:23:47Z",
"pushed_at": "2025-01-03T10:23:44Z",
"updated_at": "2025-01-13T22:41:32Z",
"pushed_at": "2025-01-13T22:27:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698.",
"fork": false,
"created_at": "2024-03-29T04:11:06Z",
"updated_at": "2024-12-06T09:40:39Z",
"updated_at": "2025-01-13T22:58:50Z",
"pushed_at": "2024-03-29T04:31:31Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 9,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2025-01-08T16:57:04Z",
"updated_at": "2025-01-13T20:14:32Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 709,
"watchers_count": 709,
"stargazers_count": 708,
"watchers_count": 708,
"has_discussions": false,
"forks_count": 155,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 155,
"watchers": 709,
"watchers": 708,
"score": 0,
"subscribers_count": 10
},

View file

@ -200,10 +200,10 @@
"description": "exploit for ivanti",
"fork": false,
"created_at": "2024-01-20T19:15:23Z",
"updated_at": "2024-07-05T09:57:14Z",
"updated_at": "2025-01-13T20:01:27Z",
"pushed_at": "2024-01-20T19:20:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,12 +76,12 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2025-01-09T05:59:41Z",
"updated_at": "2025-01-13T20:13:25Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 522,
"watchers_count": 522,
"stargazers_count": 520,
"watchers_count": 520,
"has_discussions": false,
"forks_count": 145,
"forks_count": 146,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -92,8 +92,8 @@
"rce"
],
"visibility": "public",
"forks": 145,
"watchers": 522,
"forks": 146,
"watchers": 520,
"score": 0,
"subscribers_count": 3
},

View file

@ -111,8 +111,8 @@
"description": "CVE-2024-35250 PoC - Optimized & Condensed Form of Varwara's PoC",
"fork": false,
"created_at": "2025-01-13T18:24:48Z",
"updated_at": "2025-01-13T18:25:14Z",
"pushed_at": "2025-01-13T18:25:10Z",
"updated_at": "2025-01-13T18:37:11Z",
"pushed_at": "2025-01-13T18:38:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,8 +14,8 @@
"description": "CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability",
"fork": false,
"created_at": "2024-09-24T19:24:55Z",
"updated_at": "2025-01-12T18:24:25Z",
"pushed_at": "2024-12-09T22:58:22Z",
"updated_at": "2025-01-13T21:21:33Z",
"pushed_at": "2025-01-13T21:21:30Z",
"stargazers_count": 136,
"watchers_count": 136,
"has_discussions": false,

View file

@ -14,7 +14,7 @@
"description": "POC for CVE-2024-46310 For FXServer version's v9601 and prior, Incorrect Access Control in FXServer version's v9601 and prior, for CFX.re FiveM, allows unauthenticated users to modify and read userdata via exposed api endpoint",
"fork": false,
"created_at": "2024-08-28T19:36:52Z",
"updated_at": "2025-01-01T22:30:32Z",
"updated_at": "2025-01-13T21:52:23Z",
"pushed_at": "2024-10-07T13:09:33Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -14,10 +14,10 @@
"description": "Escape macOS Sandbox using sharedfilelistd exploit",
"fork": false,
"created_at": "2025-01-08T09:55:44Z",
"updated_at": "2025-01-13T18:15:27Z",
"updated_at": "2025-01-13T23:31:23Z",
"pushed_at": "2025-01-09T06:34:50Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 31,
"watchers": 34,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Safely detect if an Ivanti server is vulnerable to CVE-2025-0282",
"fork": false,
"created_at": "2025-01-09T18:43:08Z",
"updated_at": "2025-01-13T13:21:23Z",
"updated_at": "2025-01-13T22:15:51Z",
"pushed_at": "2025-01-10T21:27:47Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},

View file

@ -7045,7 +7045,11 @@
- [ayato-shitomi/CVE-2024-46278-teedy_1.11_account-takeover](https://github.com/ayato-shitomi/CVE-2024-46278-teedy_1.11_account-takeover)
### CVE-2024-46310
### CVE-2024-46310 (2025-01-13)
<code>Incorrect Access Control in Cfx.re FXServer v9601 and earlier allows unauthenticated users to modify and read arbitrary user data via exposed API endpoint
</code>
- [PRX5Y/CVE-2024-46310](https://github.com/PRX5Y/CVE-2024-46310)
### CVE-2024-46377 (2024-09-18)