Auto Update 2025/01/19 06:31:42

This commit is contained in:
motikan2010-bot 2025-01-19 15:31:42 +09:00
parent a95fdb0548
commit 9c1dec1ee1
34 changed files with 167 additions and 95 deletions

View file

@ -50,7 +50,7 @@
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 17,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -61,7 +61,7 @@
"saltstack"
],
"visibility": "public",
"forks": 17,
"forks": 15,
"watchers": 107,
"score": 0,
"subscribers_count": 8

View file

@ -176,10 +176,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2025-01-15T05:57:38Z",
"updated_at": "2025-01-19T02:03:08Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 645,
"watchers_count": 645,
"stargazers_count": 646,
"watchers_count": 646,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
@ -188,7 +188,7 @@
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 645,
"watchers": 646,
"score": 0,
"subscribers_count": 12
},

View file

@ -33,19 +33,19 @@
{
"id": 584128166,
"name": "CVE-2020-17382",
"full_name": "houseofxyz\/CVE-2020-17382",
"full_name": "houseofint3\/CVE-2020-17382",
"owner": {
"login": "houseofxyz",
"id": 121667935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121667935?v=4",
"html_url": "https:\/\/github.com\/houseofxyz",
"login": "houseofint3",
"id": 138196270,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138196270?v=4",
"html_url": "https:\/\/github.com\/houseofint3",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/houseofxyz\/CVE-2020-17382",
"html_url": "https:\/\/github.com\/houseofint3\/CVE-2020-17382",
"description": "CVE-2020-17382 Windows 10 x64 2004 Build 19041.264 Exploit",
"fork": false,
"created_at": "2023-01-01T13:49:07Z",
"updated_at": "2024-06-21T00:10:39Z",
"updated_at": "2025-01-19T05:28:03Z",
"pushed_at": "2023-01-01T13:49:25Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -424,10 +424,10 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2025-01-11T06:52:53Z",
"updated_at": "2025-01-19T02:19:58Z",
"pushed_at": "2022-04-14T11:51:18Z",
"stargazers_count": 432,
"watchers_count": 432,
"stargazers_count": 433,
"watchers_count": 433,
"has_discussions": false,
"forks_count": 110,
"allow_forking": true,
@ -436,7 +436,7 @@
"topics": [],
"visibility": "public",
"forks": 110,
"watchers": 432,
"watchers": 433,
"score": 0,
"subscribers_count": 9
},

View file

@ -14,10 +14,10 @@
"description": "A Proof of concept scenario for exploitation of CVE2021-38297 GO WASM buffer-overflow",
"fork": false,
"created_at": "2023-11-15T20:52:36Z",
"updated_at": "2024-10-08T11:25:29Z",
"updated_at": "2025-01-19T01:46:43Z",
"pushed_at": "2023-12-05T21:38:17Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},

View file

@ -935,10 +935,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2025-01-13T14:46:25Z",
"updated_at": "2025-01-19T03:50:29Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1815,
"watchers_count": 1815,
"stargazers_count": 1816,
"watchers_count": 1816,
"has_discussions": false,
"forks_count": 530,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 530,
"watchers": 1815,
"watchers": 1816,
"score": 0,
"subscribers_count": 26
},

View file

@ -805,8 +805,8 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-18T15:32:21Z",
"updated_at": "2025-01-19T00:17:26Z",
"pushed_at": "2025-01-19T00:17:24Z",
"updated_at": "2025-01-19T06:07:44Z",
"pushed_at": "2025-01-19T06:07:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -823,6 +823,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -2,15 +2,15 @@
{
"id": 597871098,
"name": "CVE-2022-45544",
"full_name": "tristao-marinho\/CVE-2022-45544",
"full_name": "tristao-io\/CVE-2022-45544",
"owner": {
"login": "tristao-marinho",
"login": "tristao-io",
"id": 101610912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
"html_url": "https:\/\/github.com\/tristao-marinho",
"html_url": "https:\/\/github.com\/tristao-io",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2022-45544",
"html_url": "https:\/\/github.com\/tristao-io\/CVE-2022-45544",
"description": "SCHLIX CMS 2.2.7-2 arbitrary File Upload",
"fork": false,
"created_at": "2023-02-05T21:45:37Z",

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -2,15 +2,15 @@
{
"id": 614934943,
"name": "CVE-2023-27842",
"full_name": "tristao-marinho\/CVE-2023-27842",
"full_name": "tristao-io\/CVE-2023-27842",
"owner": {
"login": "tristao-marinho",
"login": "tristao-io",
"id": 101610912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
"html_url": "https:\/\/github.com\/tristao-marinho",
"html_url": "https:\/\/github.com\/tristao-io",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-27842",
"html_url": "https:\/\/github.com\/tristao-io\/CVE-2023-27842",
"description": null,
"fork": false,
"created_at": "2023-03-16T15:59:39Z",

View file

@ -28,7 +28,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
},
{
"id": 755572375,

View file

@ -2,15 +2,15 @@
{
"id": 686063462,
"name": "CVE-2023-41646",
"full_name": "tristao-marinho\/CVE-2023-41646",
"full_name": "tristao-io\/CVE-2023-41646",
"owner": {
"login": "tristao-marinho",
"login": "tristao-io",
"id": 101610912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
"html_url": "https:\/\/github.com\/tristao-marinho",
"html_url": "https:\/\/github.com\/tristao-io",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-41646",
"html_url": "https:\/\/github.com\/tristao-io\/CVE-2023-41646",
"description": null,
"fork": false,
"created_at": "2023-09-01T16:46:07Z",

View file

@ -498,6 +498,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -231,10 +231,10 @@
"description": null,
"fork": false,
"created_at": "2023-12-18T23:12:25Z",
"updated_at": "2024-12-28T12:49:29Z",
"updated_at": "2025-01-19T04:57:41Z",
"pushed_at": "2024-05-13T17:40:58Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -243,7 +243,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 3
},

View file

@ -2,15 +2,15 @@
{
"id": 737775658,
"name": "CVE-2023-48981",
"full_name": "tristao-marinho\/CVE-2023-48981",
"full_name": "tristao-io\/CVE-2023-48981",
"owner": {
"login": "tristao-marinho",
"login": "tristao-io",
"id": 101610912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
"html_url": "https:\/\/github.com\/tristao-marinho",
"html_url": "https:\/\/github.com\/tristao-io",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48981",
"html_url": "https:\/\/github.com\/tristao-io\/CVE-2023-48981",
"description": "POC CVE-2023-48981",
"fork": false,
"created_at": "2024-01-01T13:06:39Z",

View file

@ -2,15 +2,15 @@
{
"id": 737777512,
"name": "CVE-2023-48982",
"full_name": "tristao-marinho\/CVE-2023-48982",
"full_name": "tristao-io\/CVE-2023-48982",
"owner": {
"login": "tristao-marinho",
"login": "tristao-io",
"id": 101610912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
"html_url": "https:\/\/github.com\/tristao-marinho",
"html_url": "https:\/\/github.com\/tristao-io",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48982",
"html_url": "https:\/\/github.com\/tristao-io\/CVE-2023-48982",
"description": "POC CVE-2023-48982",
"fork": false,
"created_at": "2024-01-01T13:14:49Z",

View file

@ -2,15 +2,15 @@
{
"id": 737778720,
"name": "CVE-2023-48983",
"full_name": "tristao-marinho\/CVE-2023-48983",
"full_name": "tristao-io\/CVE-2023-48983",
"owner": {
"login": "tristao-marinho",
"login": "tristao-io",
"id": 101610912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
"html_url": "https:\/\/github.com\/tristao-marinho",
"html_url": "https:\/\/github.com\/tristao-io",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48983",
"html_url": "https:\/\/github.com\/tristao-io\/CVE-2023-48983",
"description": "POC CVE-2023-48983",
"fork": false,
"created_at": "2024-01-01T13:19:54Z",

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -400,10 +400,10 @@
"description": "Shell scripts to identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6) or upgrading to latest version. Added Ansible Playbook",
"fork": false,
"created_at": "2024-03-30T19:23:30Z",
"updated_at": "2024-08-04T13:52:01Z",
"updated_at": "2025-01-19T05:21:56Z",
"pushed_at": "2024-04-07T07:40:48Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -428,7 +428,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 4
},

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit",
"fork": false,
"created_at": "2024-07-13T19:54:27Z",
"updated_at": "2025-01-18T19:34:03Z",
"updated_at": "2025-01-19T02:19:25Z",
"pushed_at": "2024-09-11T20:00:46Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-26T12:39:44Z",
"updated_at": "2025-01-18T17:26:14Z",
"updated_at": "2025-01-19T05:19:28Z",
"pushed_at": "2025-01-16T09:48:07Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 41,
"watchers": 42,
"score": 0,
"subscribers_count": 0
},

View file

@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-53691",
"fork": false,
"created_at": "2025-01-13T10:07:25Z",
"updated_at": "2025-01-18T02:20:21Z",
"updated_at": "2025-01-19T02:03:26Z",
"pushed_at": "2025-01-13T10:16:58Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

33
2024/CVE-2024-55504.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 918841666,
"name": "CVE-2024-55504",
"full_name": "SyFi\/CVE-2024-55504",
"owner": {
"login": "SyFi",
"id": 26314806,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314806?v=4",
"html_url": "https:\/\/github.com\/SyFi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SyFi\/CVE-2024-55504",
"description": "CVE-2024-55504",
"fork": false,
"created_at": "2025-01-19T01:58:38Z",
"updated_at": "2025-01-19T02:12:29Z",
"pushed_at": "2025-01-19T02:12:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,8 +45,8 @@
"description": "Checks for authentication bypass vulnerability inFortinet's FortiOS, potentially exploited by remote attackers.",
"fork": false,
"created_at": "2025-01-18T15:17:07Z",
"updated_at": "2025-01-19T00:17:18Z",
"pushed_at": "2025-01-19T00:17:15Z",
"updated_at": "2025-01-19T06:24:49Z",
"pushed_at": "2025-01-19T06:24:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -152,6 +152,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -112,13 +112,13 @@
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 13,
"score": 0,
"subscribers_count": 0

33
2025/CVE-2025-22620.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 918881461,
"name": "checkout-index",
"full_name": "EliahKagan\/checkout-index",
"owner": {
"login": "EliahKagan",
"id": 1771172,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1771172?v=4",
"html_url": "https:\/\/github.com\/EliahKagan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/EliahKagan\/checkout-index",
"description": "Reproducer for CVE-2025-22620",
"fork": false,
"created_at": "2025-01-19T05:31:13Z",
"updated_at": "2025-01-19T05:31:30Z",
"pushed_at": "2025-01-19T05:32:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -36,6 +36,9 @@
- [DoTTak/CVE-2025-22510](https://github.com/DoTTak/CVE-2025-22510)
### CVE-2025-22620
- [EliahKagan/checkout-index](https://github.com/EliahKagan/checkout-index)
### CVE-2025-22710
- [DoTTak/CVE-2025-22710](https://github.com/DoTTak/CVE-2025-22710)
@ -8334,6 +8337,9 @@
- [SyFi/CVE-2024-55503](https://github.com/SyFi/CVE-2024-55503)
### CVE-2024-55504
- [SyFi/CVE-2024-55504](https://github.com/SyFi/CVE-2024-55504)
### CVE-2024-55557 (2024-12-16)
<code>ui/pref/ProxyPrefView.java in weasis-core in Weasis 4.5.1 has a hardcoded key for symmetric encryption of proxy credentials.
@ -11742,7 +11748,7 @@
<code>Insecure Permissions vulnerability found in Extplorer File manager eXtplorer v.2.1.15 allows a remote attacker to execute arbitrary code via the index.php compenent
</code>
- [tristao-marinho/CVE-2023-27842](https://github.com/tristao-marinho/CVE-2023-27842)
- [tristao-io/CVE-2023-27842](https://github.com/tristao-io/CVE-2023-27842)
- [cowsecurity/CVE-2023-27842](https://github.com/cowsecurity/CVE-2023-27842)
### CVE-2023-27997 (2023-06-13)
@ -14821,7 +14827,7 @@
<code>Buttercup v2.20.3 allows attackers to obtain the hash of the master password for the password manager via accessing the file /vaults.json/
</code>
- [tristao-marinho/CVE-2023-41646](https://github.com/tristao-marinho/CVE-2023-41646)
- [tristao-io/CVE-2023-41646](https://github.com/tristao-io/CVE-2023-41646)
### CVE-2023-41652 (2023-11-03)
@ -16385,13 +16391,13 @@
- [vinnie1717/CVE-2023-48974](https://github.com/vinnie1717/CVE-2023-48974)
### CVE-2023-48981
- [tristao-marinho/CVE-2023-48981](https://github.com/tristao-marinho/CVE-2023-48981)
- [tristao-io/CVE-2023-48981](https://github.com/tristao-io/CVE-2023-48981)
### CVE-2023-48982
- [tristao-marinho/CVE-2023-48982](https://github.com/tristao-marinho/CVE-2023-48982)
- [tristao-io/CVE-2023-48982](https://github.com/tristao-io/CVE-2023-48982)
### CVE-2023-48983
- [tristao-marinho/CVE-2023-48983](https://github.com/tristao-marinho/CVE-2023-48983)
- [tristao-io/CVE-2023-48983](https://github.com/tristao-io/CVE-2023-48983)
### CVE-2023-49002 (2023-12-27)
@ -23393,7 +23399,7 @@
<code>Insecure Permission vulnerability in Schlix Web Inc SCHLIX CMS 2.2.7-2 allows attacker to upload arbitrary files and execute arbitrary code via the tristao parameter. NOTE: this is disputed by the vendor because an admin is intentionally allowed to upload new executable PHP code, such as a theme that was obtained from a trusted source or was developed for their own website. Only an admin can upload such code, not someone else in an &quot;attacker&quot; role.
</code>
- [tristao-marinho/CVE-2022-45544](https://github.com/tristao-marinho/CVE-2022-45544)
- [tristao-io/CVE-2022-45544](https://github.com/tristao-io/CVE-2022-45544)
### CVE-2022-45599 (2023-02-22)
@ -34513,7 +34519,7 @@
</code>
- [uf0o/CVE-2020-17382](https://github.com/uf0o/CVE-2020-17382)
- [houseofxyz/CVE-2020-17382](https://github.com/houseofxyz/CVE-2020-17382)
- [houseofint3/CVE-2020-17382](https://github.com/houseofint3/CVE-2020-17382)
### CVE-2020-17453 (2021-04-05)