Auto Update 2025/01/02 06:31:48

This commit is contained in:
motikan2010-bot 2025-01-02 15:31:48 +09:00
parent 53679091e7
commit a90410985e
27 changed files with 187 additions and 83 deletions

View file

@ -76,10 +76,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-12-29T07:42:19Z",
"updated_at": "2025-01-02T03:01:47Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 216,
"watchers_count": 216,
"stargazers_count": 217,
"watchers_count": 217,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 216,
"watchers": 217,
"score": 0,
"subscribers_count": 10
}

View file

@ -271,13 +271,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -157,10 +157,10 @@
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
"fork": false,
"created_at": "2021-02-24T16:31:34Z",
"updated_at": "2024-12-03T03:14:01Z",
"updated_at": "2025-01-02T02:56:12Z",
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 250,
"watchers_count": 250,
"stargazers_count": 252,
"watchers_count": 252,
"has_discussions": false,
"forks_count": 87,
"allow_forking": true,
@ -169,7 +169,7 @@
"topics": [],
"visibility": "public",
"forks": 87,
"watchers": 250,
"watchers": 252,
"score": 0,
"subscribers_count": 9
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -244,10 +244,10 @@
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2024-12-24T16:03:15Z",
"updated_at": "2025-01-02T00:37:03Z",
"pushed_at": "2024-05-19T16:25:52Z",
"stargazers_count": 788,
"watchers_count": 788,
"stargazers_count": 789,
"watchers_count": 789,
"has_discussions": false,
"forks_count": 123,
"allow_forking": true,
@ -256,7 +256,7 @@
"topics": [],
"visibility": "public",
"forks": 123,
"watchers": 788,
"watchers": 789,
"score": 0,
"subscribers_count": 10
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2024-12-30T11:29:55Z",
"updated_at": "2025-01-02T04:02:56Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1348,
"watchers_count": 1348,
"stargazers_count": 1349,
"watchers_count": 1349,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 323,
"watchers": 1348,
"watchers": 1349,
"score": 0,
"subscribers_count": 27
},

View file

@ -266,10 +266,10 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
"updated_at": "2024-12-17T08:11:23Z",
"updated_at": "2025-01-02T03:21:47Z",
"pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 395,
"watchers_count": 395,
"stargazers_count": 396,
"watchers_count": 396,
"has_discussions": false,
"forks_count": 82,
"allow_forking": true,
@ -278,7 +278,7 @@
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 395,
"watchers": 396,
"score": 0,
"subscribers_count": 2
},

View file

@ -19,7 +19,7 @@
"stargazers_count": 157,
"watchers_count": 157,
"has_discussions": false,
"forks_count": 57,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 57,
"forks": 55,
"watchers": 157,
"score": 0,
"subscribers_count": 4

View file

@ -14,10 +14,10 @@
"description": "CVE-2022-32947 walkthough and demo",
"fork": false,
"created_at": "2023-09-17T08:21:47Z",
"updated_at": "2024-12-11T07:24:31Z",
"updated_at": "2025-01-02T03:48:32Z",
"pushed_at": "2023-09-18T03:04:48Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 157,
"watchers": 158,
"score": 0,
"subscribers_count": 5
}

View file

@ -14,10 +14,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-12-31T14:43:42Z",
"updated_at": "2025-01-02T02:48:11Z",
"pushed_at": "2024-08-01T15:09:15Z",
"stargazers_count": 314,
"watchers_count": 314,
"stargazers_count": 315,
"watchers_count": 315,
"has_discussions": true,
"forks_count": 46,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 46,
"watchers": 314,
"watchers": 315,
"score": 0,
"subscribers_count": 8
},

View file

@ -264,10 +264,10 @@
"description": "iOS customization app powered by CVE-2022-46689",
"fork": false,
"created_at": "2023-01-12T14:31:30Z",
"updated_at": "2024-07-31T07:07:18Z",
"updated_at": "2025-01-02T00:29:20Z",
"pushed_at": "2023-02-12T01:37:16Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -286,7 +286,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 2
},
@ -305,10 +305,10 @@
"description": "Simple iOS bootlooper using CVE-2022-46689.",
"fork": false,
"created_at": "2023-01-23T23:58:00Z",
"updated_at": "2023-03-03T18:05:25Z",
"updated_at": "2025-01-02T03:19:23Z",
"pushed_at": "2023-01-24T18:25:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -317,7 +317,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Plesk Obsidian <=18.0.49 - Open Redirect",
"fork": false,
"created_at": "2024-05-26T06:56:05Z",
"updated_at": "2024-09-18T15:02:55Z",
"updated_at": "2025-01-02T02:37:15Z",
"pushed_at": "2024-06-24T09:03:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-40429: An app may be able to access sensitive user data.",
"fork": false,
"created_at": "2023-10-09T21:52:56Z",
"updated_at": "2024-04-14T18:03:42Z",
"updated_at": "2025-01-02T03:19:02Z",
"pushed_at": "2023-10-09T22:21:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false,
"created_at": "2023-10-10T14:20:42Z",
"updated_at": "2024-11-22T12:42:49Z",
"updated_at": "2025-01-02T01:39:15Z",
"pushed_at": "2024-01-08T11:12:08Z",
"stargazers_count": 225,
"watchers_count": 225,
"stargazers_count": 226,
"watchers_count": 226,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 225,
"watchers": 226,
"score": 0,
"subscribers_count": 6
},

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-01T16:26:11Z",
"updated_at": "2025-01-02T05:43:30Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1315,
"watchers_count": 1315,
"stargazers_count": 1317,
"watchers_count": 1317,
"has_discussions": false,
"forks_count": 225,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 225,
"watchers": 1315,
"watchers": 1317,
"score": 0,
"subscribers_count": 21
},

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

33
2024/CVE-2024-10400.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 910972988,
"name": "CVE-2024-10400",
"full_name": "k0ns0l\/CVE-2024-10400",
"owner": {
"login": "k0ns0l",
"id": 55334728,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55334728?v=4",
"html_url": "https:\/\/github.com\/k0ns0l",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/k0ns0l\/CVE-2024-10400",
"description": null,
"fork": false,
"created_at": "2025-01-02T00:12:53Z",
"updated_at": "2025-01-02T00:32:28Z",
"pushed_at": "2025-01-02T00:31:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
"fork": false,
"created_at": "2024-11-29T06:13:36Z",
"updated_at": "2024-12-22T00:37:10Z",
"updated_at": "2025-01-02T02:40:25Z",
"pushed_at": "2024-12-04T01:01:28Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 1
}

View file

@ -1075,5 +1075,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 911010933,
"name": "jenkins-lfi",
"full_name": "Marouane133\/jenkins-lfi",
"owner": {
"login": "Marouane133",
"id": 164184419,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164184419?v=4",
"html_url": "https:\/\/github.com\/Marouane133",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Marouane133\/jenkins-lfi",
"description": "Jenkins CVE-2024-23897 POC : Arbitrary File Read Vulnerability Leading to RCE",
"fork": false,
"created_at": "2025-01-02T03:28:56Z",
"updated_at": "2025-01-02T03:41:54Z",
"pushed_at": "2025-01-02T03:41:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "Windows LPE",
"fork": false,
"created_at": "2024-06-11T08:03:29Z",
"updated_at": "2024-12-18T02:05:23Z",
"updated_at": "2025-01-02T06:02:52Z",
"pushed_at": "2024-06-11T20:41:59Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 111,
"watchers": 112,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-31T15:50:29Z",
"updated_at": "2025-01-02T00:58:20Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 115,
"watchers": 116,
"score": 0,
"subscribers_count": 2
},

View file

@ -76,19 +76,50 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49112",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-02T00:23:02Z",
"updated_at": "2025-01-02T06:31:19Z",
"pushed_at": "2025-01-01T21:57:56Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 1,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"forks": 11,
"watchers": 58,
"score": 0,
"subscribers_count": 2
},
{
"id": 911024680,
"name": "CVE-2024-49112-RCE-PoC",
"full_name": "BOl1o\/CVE-2024-49112-RCE-PoC",
"owner": {
"login": "BOl1o",
"id": 192742679,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192742679?v=4",
"html_url": "https:\/\/github.com\/BOl1o",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BOl1o\/CVE-2024-49112-RCE-PoC",
"description": "CVE-2024-49112 Windows LDAP RCE PoC and Metasploit Module",
"fork": false,
"created_at": "2025-01-02T04:29:47Z",
"updated_at": "2025-01-02T04:30:53Z",
"pushed_at": "2025-01-02T04:30:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}

View file

@ -1,6 +1,6 @@
[
{
"id": 910931392,
"id": 911020987,
"name": "CVE-2024-53522",
"full_name": "Safecloudth\/CVE-2024-53522",
"owner": {
@ -13,9 +13,9 @@
"html_url": "https:\/\/github.com\/Safecloudth\/CVE-2024-53522",
"description": "PoC for CVE-2024-53522 affecting HOSxP XE 4",
"fork": false,
"created_at": "2025-01-01T20:30:58Z",
"updated_at": "2025-01-01T20:32:48Z",
"pushed_at": "2025-01-01T20:32:45Z",
"created_at": "2025-01-02T04:13:37Z",
"updated_at": "2025-01-02T04:16:45Z",
"pushed_at": "2025-01-02T04:16:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -2076,6 +2076,13 @@
- [K1nakoo/CVE-2024-10355](https://github.com/K1nakoo/CVE-2024-10355)
### CVE-2024-10400 (2024-11-21)
<code>The Tutor LMS plugin for WordPress is vulnerable to SQL Injection via the rating_filter parameter in all versions up to, and including, 2.7.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
</code>
- [k0ns0l/CVE-2024-10400](https://github.com/k0ns0l/CVE-2024-10400)
### CVE-2024-10410 (2024-10-27)
<code>In SourceCodester Online Hotel Reservation System 1.0 wurde eine kritische Schwachstelle entdeckt. Dabei geht es um die Funktion upload der Datei /admin/mod_room/controller.php?action=add. Dank Manipulation des Arguments image mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
@ -3323,6 +3330,7 @@
- [ShieldAuth-PHP/PBL05-CVE-Analsys](https://github.com/ShieldAuth-PHP/PBL05-CVE-Analsys)
- [verylazytech/CVE-2024-23897](https://github.com/verylazytech/CVE-2024-23897)
- [D1se0/CVE-2024-23897-Vulnerabilidad-Jenkins](https://github.com/D1se0/CVE-2024-23897-Vulnerabilidad-Jenkins)
- [Marouane133/jenkins-lfi](https://github.com/Marouane133/jenkins-lfi)
### CVE-2024-23995 (2024-04-29)
@ -7120,6 +7128,7 @@
- [tnkr/poc_monitor](https://github.com/tnkr/poc_monitor)
- [BOl1o/CVE-2024-49112-PoC](https://github.com/BOl1o/CVE-2024-49112-PoC)
- [SafeBreach-Labs/CVE-2024-49112](https://github.com/SafeBreach-Labs/CVE-2024-49112)
- [BOl1o/CVE-2024-49112-RCE-PoC](https://github.com/BOl1o/CVE-2024-49112-RCE-PoC)
### CVE-2024-49117 (2024-12-10)