Auto Update 2025/01/11 18:31:41

This commit is contained in:
motikan2010-bot 2025-01-12 03:31:41 +09:00
parent 3eebab1abf
commit 7eeffd2ec4
23 changed files with 202 additions and 98 deletions

View file

@ -50,13 +50,13 @@
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 17,
"score": 0,
"subscribers_count": 2

View file

@ -2499,7 +2499,7 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -2507,7 +2507,7 @@
"cve-2018-6574"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -257,5 +257,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 915363496,
"name": "Bludit-3.9.2-Auth-Bruteforce-Bypass-CVE-2019-17240",
"full_name": "0xDTC\/Bludit-3.9.2-Auth-Bruteforce-Bypass-CVE-2019-17240",
"owner": {
"login": "0xDTC",
"id": 95960398,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95960398?v=4",
"html_url": "https:\/\/github.com\/0xDTC",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xDTC\/Bludit-3.9.2-Auth-Bruteforce-Bypass-CVE-2019-17240",
"description": "Bludit 3.9.2 - Auth Bruteforce Bypass CVE:2019-17240 Refurbish In bash",
"fork": false,
"created_at": "2025-01-11T16:48:45Z",
"updated_at": "2025-01-11T18:01:02Z",
"pushed_at": "2025-01-11T18:00:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -50,19 +50,19 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2025-01-10T12:02:40Z",
"updated_at": "2025-01-11T17:36:36Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 821,
"watchers_count": 821,
"stargazers_count": 822,
"watchers_count": 822,
"has_discussions": false,
"forks_count": 124,
"forks_count": 125,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 124,
"watchers": 821,
"forks": 125,
"watchers": 822,
"score": 0,
"subscribers_count": 13
},

View file

@ -381,12 +381,12 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2024-12-31T02:58:20Z",
"updated_at": "2025-01-11T13:37:38Z",
"pushed_at": "2024-04-26T03:16:26Z",
"stargazers_count": 1110,
"watchers_count": 1110,
"stargazers_count": 1111,
"watchers_count": 1111,
"has_discussions": false,
"forks_count": 534,
"forks_count": 535,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -394,8 +394,8 @@
"log4shell"
],
"visibility": "public",
"forks": 534,
"watchers": 1110,
"forks": 535,
"watchers": 1111,
"score": 0,
"subscribers_count": 23
},

View file

@ -233,8 +233,8 @@
"description": "Refurbish",
"fork": false,
"created_at": "2024-10-27T20:26:47Z",
"updated_at": "2025-01-07T12:53:41Z",
"pushed_at": "2025-01-07T12:53:38Z",
"updated_at": "2025-01-11T13:26:28Z",
"pushed_at": "2025-01-11T13:26:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -107,10 +107,10 @@
"description": "lpe poc for cve-2022-21882 ",
"fork": false,
"created_at": "2022-02-07T03:45:36Z",
"updated_at": "2024-12-27T14:20:04Z",
"updated_at": "2025-01-11T15:17:37Z",
"pushed_at": "2022-02-07T03:49:37Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -123,7 +123,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 48,
"watchers": 49,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2025-01-06T20:22:58Z",
"updated_at": "2025-01-11T15:10:41Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 778,
"watchers_count": 778,
"stargazers_count": 779,
"watchers_count": 779,
"has_discussions": false,
"forks_count": 160,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 160,
"watchers": 778,
"watchers": 779,
"score": 0,
"subscribers_count": 15
}

View file

@ -14,10 +14,10 @@
"description": "pocs & exploit for CVE-2023-24871 (rce + lpe)",
"fork": false,
"created_at": "2024-06-21T15:01:15Z",
"updated_at": "2025-01-06T14:33:13Z",
"updated_at": "2025-01-11T14:55:08Z",
"pushed_at": "2024-07-17T12:34:16Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 2
}

View file

@ -60,5 +60,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 915373751,
"name": "poc-cve",
"full_name": "bluefish3r\/poc-cve",
"owner": {
"login": "bluefish3r",
"id": 194559845,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/194559845?v=4",
"html_url": "https:\/\/github.com\/bluefish3r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bluefish3r\/poc-cve",
"description": "poc-cve-2023-3824",
"fork": false,
"created_at": "2025-01-11T17:19:21Z",
"updated_at": "2025-01-11T17:43:19Z",
"pushed_at": "2025-01-11T17:42:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 1380,
"watchers_count": 1380,
"has_discussions": false,
"forks_count": 236,
"forks_count": 237,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 236,
"forks": 237,
"watchers": 1380,
"score": 0,
"subscribers_count": 21

View file

@ -107,10 +107,10 @@
"description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ",
"fork": false,
"created_at": "2023-11-03T22:06:09Z",
"updated_at": "2025-01-05T08:55:50Z",
"updated_at": "2025-01-11T15:47:48Z",
"pushed_at": "2024-01-20T16:59:23Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 111,
"watchers": 112,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2025-01-09T00:32:45Z",
"updated_at": "2025-01-11T16:06:28Z",
"pushed_at": "2024-12-02T06:29:52Z",
"stargazers_count": 275,
"watchers_count": 275,
"stargazers_count": 276,
"watchers_count": 276,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 275,
"watchers": 276,
"score": 0,
"subscribers_count": 7
},

33
2024/CVE-2024-12856.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 915391325,
"name": "CVE-2024-12856",
"full_name": "nu113d\/CVE-2024-12856",
"owner": {
"login": "nu113d",
"id": 103531438,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103531438?v=4",
"html_url": "https:\/\/github.com\/nu113d",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nu113d\/CVE-2024-12856",
"description": "An exploit for Four-Faith routers to get a reverse shell",
"fork": false,
"created_at": "2025-01-11T18:14:03Z",
"updated_at": "2025-01-11T18:14:08Z",
"pushed_at": "2025-01-11T18:14:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -952,10 +952,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2025-01-10T22:49:48Z",
"updated_at": "2025-01-11T16:47:54Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3505,
"watchers_count": 3505,
"stargazers_count": 3506,
"watchers_count": 3506,
"has_discussions": false,
"forks_count": 240,
"allow_forking": true,
@ -964,7 +964,7 @@
"topics": [],
"visibility": "public",
"forks": 240,
"watchers": 3505,
"watchers": 3506,
"score": 0,
"subscribers_count": 38
},

View file

@ -2015,36 +2015,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 915273115,
"name": "CVE-2024-32002",
"full_name": "Katherine-song\/CVE-2024-32002",
"owner": {
"login": "Katherine-song",
"id": 64319718,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64319718?v=4",
"html_url": "https:\/\/github.com\/Katherine-song",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Katherine-song\/CVE-2024-32002",
"description": null,
"fork": false,
"created_at": "2025-01-11T12:25:07Z",
"updated_at": "2025-01-11T12:27:34Z",
"pushed_at": "2025-01-11T12:27:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation \/ Arbitrary Code Execution Vulnerability",
"fork": false,
"created_at": "2024-08-24T08:51:08Z",
"updated_at": "2024-12-25T03:22:50Z",
"updated_at": "2025-01-11T16:49:41Z",
"pushed_at": "2024-11-05T02:57:25Z",
"stargazers_count": 182,
"watchers_count": 182,
"stargazers_count": 183,
"watchers_count": 183,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 182,
"watchers": 183,
"score": 0,
"subscribers_count": 8
}

View file

@ -14,10 +14,10 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-11T10:39:27Z",
"updated_at": "2025-01-11T18:08:53Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 426,
"watchers_count": 426,
"stargazers_count": 428,
"watchers_count": 428,
"has_discussions": false,
"forks_count": 101,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 101,
"watchers": 426,
"watchers": 428,
"score": 0,
"subscribers_count": 3
},

View file

@ -29,5 +29,36 @@
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 915393828,
"name": "CVE-2024-49328-exploit",
"full_name": "Nxploited\/CVE-2024-49328-exploit",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-49328-exploit",
"description": null,
"fork": false,
"created_at": "2025-01-11T18:22:25Z",
"updated_at": "2025-01-11T18:22:28Z",
"pushed_at": "2025-01-11T18:22:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
"updated_at": "2025-01-09T10:06:44Z",
"updated_at": "2025-01-11T17:38:38Z",
"pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 65,
"watchers": 66,
"score": 0,
"subscribers_count": 3
},

View file

@ -11,11 +11,11 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nscan9\/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection",
"description": null,
"description": "CVE-2024-54761 PoC",
"fork": false,
"created_at": "2024-11-15T05:55:29Z",
"updated_at": "2025-01-08T05:15:44Z",
"pushed_at": "2025-01-08T05:15:40Z",
"updated_at": "2025-01-11T15:06:28Z",
"pushed_at": "2025-01-11T15:06:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -107,19 +107,19 @@
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
"fork": false,
"created_at": "2025-01-11T02:06:51Z",
"updated_at": "2025-01-11T12:19:20Z",
"pushed_at": "2025-01-11T02:23:27Z",
"stargazers_count": 4,
"watchers_count": 4,
"updated_at": "2025-01-11T17:36:23Z",
"pushed_at": "2025-01-11T17:36:20Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"forks": 1,
"watchers": 10,
"score": 0,
"subscribers_count": 0
}

View file

@ -2568,6 +2568,13 @@
- [RandomRobbieBF/CVE-2024-12849](https://github.com/RandomRobbieBF/CVE-2024-12849)
- [Nxploited/CVE-2024-12849-Poc](https://github.com/Nxploited/CVE-2024-12849-Poc)
### CVE-2024-12856 (2024-12-27)
<code>The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue.
</code>
- [nu113d/CVE-2024-12856](https://github.com/nu113d/CVE-2024-12856)
### CVE-2024-12883 (2024-12-21)
<code>In code-projects Job Recruitment 1.0 wurde eine problematische Schwachstelle ausgemacht. Das betrifft eine unbekannte Funktionalität der Datei /_email.php. Mittels Manipulieren des Arguments email mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
@ -4981,7 +4988,6 @@
- [grecosamuel/CVE-2024-32002](https://github.com/grecosamuel/CVE-2024-32002)
- [XiaomingX/cve-2024-32002-poc](https://github.com/XiaomingX/cve-2024-32002-poc)
- [jolibb55/donald](https://github.com/jolibb55/donald)
- [Katherine-song/CVE-2024-32002](https://github.com/Katherine-song/CVE-2024-32002)
### CVE-2024-32004 (2024-05-14)
@ -7380,6 +7386,7 @@
</code>
- [RandomRobbieBF/CVE-2024-49328](https://github.com/RandomRobbieBF/CVE-2024-49328)
- [Nxploited/CVE-2024-49328-exploit](https://github.com/Nxploited/CVE-2024-49328-exploit)
### CVE-2024-49368 (2024-10-21)
@ -9032,6 +9039,7 @@
- [jhonnybonny/CVE-2023-3824](https://github.com/jhonnybonny/CVE-2023-3824)
- [fr33c0d3/poc-cve-2023-3824](https://github.com/fr33c0d3/poc-cve-2023-3824)
- [bluefish3r/poc-cve](https://github.com/bluefish3r/poc-cve)
### CVE-2023-3836 (2023-07-22)
@ -39025,6 +39033,7 @@
- [brunosergi/bloodit](https://github.com/brunosergi/bloodit)
- [spyx/cve-2019-17240](https://github.com/spyx/cve-2019-17240)
- [mind2hex/CVE-2019-17240](https://github.com/mind2hex/CVE-2019-17240)
- [0xDTC/Bludit-3.9.2-Auth-Bruteforce-Bypass-CVE-2019-17240](https://github.com/0xDTC/Bludit-3.9.2-Auth-Bruteforce-Bypass-CVE-2019-17240)
### CVE-2019-17382 (2019-10-09)