Auto Update 2025/01/18 00:31:48

This commit is contained in:
motikan2010-bot 2025-01-18 09:31:48 +09:00
parent 37bb376d06
commit afff2d0063
26 changed files with 127 additions and 119 deletions

View file

@ -188,15 +188,15 @@
{
"id": 887626775,
"name": "CVE-2013-0156",
"full_name": "oxBEN10\/CVE-2013-0156",
"full_name": "oxben10\/CVE-2013-0156",
"owner": {
"login": "oxBEN10",
"login": "oxben10",
"id": 119909271,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119909271?v=4",
"html_url": "https:\/\/github.com\/oxBEN10",
"html_url": "https:\/\/github.com\/oxben10",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/oxBEN10\/CVE-2013-0156",
"html_url": "https:\/\/github.com\/oxben10\/CVE-2013-0156",
"description": "This script is specifically designed to solve the challenge on PentesterLab for the CVE-2013-0156 exploit",
"fork": false,
"created_at": "2024-11-13T02:10:20Z",

View file

@ -182,7 +182,7 @@
"fork": false,
"created_at": "2024-11-14T04:35:59Z",
"updated_at": "2025-01-05T15:26:10Z",
"pushed_at": "2025-01-17T14:30:14Z",
"pushed_at": "2025-01-17T19:35:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -76,10 +76,10 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2025-01-12T12:20:05Z",
"updated_at": "2025-01-17T21:46:03Z",
"pushed_at": "2022-12-27T20:25:09Z",
"stargazers_count": 383,
"watchers_count": 383,
"stargazers_count": 382,
"watchers_count": 382,
"has_discussions": false,
"forks_count": 100,
"allow_forking": true,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 100,
"watchers": 383,
"watchers": 382,
"score": 0,
"subscribers_count": 10
},

View file

@ -76,10 +76,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2025-01-17T12:15:05Z",
"updated_at": "2025-01-17T21:05:43Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 226,
"watchers_count": 226,
"stargazers_count": 227,
"watchers_count": 227,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 226,
"watchers": 227,
"score": 0,
"subscribers_count": 10
}

View file

@ -83,10 +83,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2024-12-20T22:43:48Z",
"updated_at": "2025-01-17T20:51:12Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 583,
"watchers_count": 583,
"stargazers_count": 584,
"watchers_count": 584,
"has_discussions": false,
"forks_count": 173,
"allow_forking": true,
@ -105,7 +105,7 @@
],
"visibility": "public",
"forks": 173,
"watchers": 583,
"watchers": 584,
"score": 0,
"subscribers_count": 23
},

View file

@ -14,10 +14,10 @@
"description": "A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc",
"fork": false,
"created_at": "2020-02-07T02:41:44Z",
"updated_at": "2024-08-12T19:57:26Z",
"updated_at": "2025-01-17T23:33:01Z",
"pushed_at": "2020-02-19T03:47:33Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 57,
"watchers": 58,
"score": 0,
"subscribers_count": 5
},

View file

@ -233,10 +233,10 @@
"description": "Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215",
"fork": false,
"created_at": "2020-06-07T15:03:07Z",
"updated_at": "2025-01-08T09:10:38Z",
"updated_at": "2025-01-17T23:21:37Z",
"pushed_at": "2022-09-04T14:16:50Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -250,7 +250,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 59,
"watchers": 60,
"score": 0,
"subscribers_count": 3
},

View file

@ -76,10 +76,10 @@
"description": "An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files and all non-administator passwords, private keys and High Availability passwords.",
"fork": false,
"created_at": "2023-12-08T11:00:40Z",
"updated_at": "2025-01-17T12:43:47Z",
"updated_at": "2025-01-17T18:25:19Z",
"pushed_at": "2023-12-19T16:39:37Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}

View file

@ -424,10 +424,10 @@
"description": "cve-2020-1472 复现利用及其exp",
"fork": false,
"created_at": "2020-09-16T03:40:47Z",
"updated_at": "2024-12-12T02:02:00Z",
"updated_at": "2025-01-17T19:29:09Z",
"pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 107,
"watchers_count": 107,
"stargazers_count": 108,
"watchers_count": 108,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -436,7 +436,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 107,
"watchers": 108,
"score": 0,
"subscribers_count": 3
},

View file

@ -1046,6 +1046,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -2151,7 +2151,7 @@
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 452919328,

View file

@ -50,13 +50,13 @@
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 34,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 34,
"forks": 36,
"watchers": 87,
"score": 0,
"subscribers_count": 3
@ -500,13 +500,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 2
@ -562,13 +562,13 @@
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 14,
"score": 0,
"subscribers_count": 3
@ -743,19 +743,19 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-16T06:54:15Z",
"updated_at": "2025-01-17T18:21:22Z",
"updated_at": "2025-01-17T18:43:45Z",
"pushed_at": "2025-01-16T09:56:36Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 41,
"forks": 16,
"watchers": 43,
"score": 0,
"subscribers_count": 5
},

View file

@ -200,10 +200,10 @@
"description": "JeecgBoot SQLCVE-2023-1454sqlmap 注入不出来的情况可以使用该脚本",
"fork": false,
"created_at": "2023-12-31T06:47:01Z",
"updated_at": "2024-09-08T04:48:34Z",
"updated_at": "2025-01-17T23:35:44Z",
"pushed_at": "2024-01-10T08:09:11Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-17T11:20:55Z",
"updated_at": "2025-01-17T19:06:51Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1389,
"watchers_count": 1389,
"stargazers_count": 1390,
"watchers_count": 1390,
"has_discussions": false,
"forks_count": 238,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 238,
"watchers": 1389,
"watchers": 1390,
"score": 0,
"subscribers_count": 21
},

View file

@ -200,10 +200,10 @@
"description": "EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It features automated ADB connection checks, APK pushing, UID extraction, payload generation, and real-time progress updates, providing a seamless and professional user experience.",
"fork": false,
"created_at": "2024-08-04T13:14:10Z",
"updated_at": "2024-12-21T23:23:19Z",
"updated_at": "2025-01-17T23:20:08Z",
"pushed_at": "2024-08-05T14:13:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-21683 Confluence Post Auth RCE",
"fork": false,
"created_at": "2024-05-23T09:05:40Z",
"updated_at": "2024-12-06T09:40:41Z",
"updated_at": "2025-01-17T21:08:15Z",
"pushed_at": "2024-05-27T03:47:36Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 122,
"watchers": 123,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"forks": 16,
"watchers": 95,
"score": 0,
"subscribers_count": 6

View file

@ -50,19 +50,19 @@
"description": "Unauthenticated Remote Code Execution via Angular-Base64-Upload Library (npm:bower)",
"fork": false,
"created_at": "2024-11-19T23:54:30Z",
"updated_at": "2024-11-21T03:18:25Z",
"updated_at": "2025-01-17T22:37:04Z",
"pushed_at": "2024-11-20T22:15:11Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-26T12:39:44Z",
"updated_at": "2025-01-17T18:21:50Z",
"updated_at": "2025-01-17T21:41:13Z",
"pushed_at": "2025-01-16T09:48:07Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 36,
"watchers": 39,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,10 +14,10 @@
"description": "POC exploit for CVE-2024-49138",
"fork": false,
"created_at": "2025-01-15T00:43:37Z",
"updated_at": "2025-01-17T14:04:02Z",
"pushed_at": "2025-01-15T01:01:21Z",
"stargazers_count": 145,
"watchers_count": 145,
"updated_at": "2025-01-17T21:52:04Z",
"pushed_at": "2025-01-17T22:40:51Z",
"stargazers_count": 146,
"watchers_count": 146,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 145,
"watchers": 146,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-53691",
"fork": false,
"created_at": "2025-01-13T10:07:25Z",
"updated_at": "2025-01-17T03:02:45Z",
"updated_at": "2025-01-17T22:24:19Z",
"pushed_at": "2025-01-13T10:16:58Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2025-01-16T07:26:15Z",
"updated_at": "2025-01-17T18:16:57Z",
"updated_at": "2025-01-17T20:19:59Z",
"pushed_at": "2025-01-16T08:58:49Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 36,
"forks": 9,
"watchers": 37,
"score": 0,
"subscribers_count": 1
}

View file

@ -1715,8 +1715,8 @@
},
{
"id": 823899223,
"name": "sshd-logingracetime0",
"full_name": "liqhtnd\/sshd-logingracetime0",
"name": "sshd-logingracetime",
"full_name": "liqhtnd\/sshd-logingracetime",
"owner": {
"login": "liqhtnd",
"id": 88907425,
@ -1724,11 +1724,11 @@
"html_url": "https:\/\/github.com\/liqhtnd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/liqhtnd\/sshd-logingracetime0",
"html_url": "https:\/\/github.com\/liqhtnd\/sshd-logingracetime",
"description": "Script to address CVE-2024-6387 by changing the LoginGraceTime in sshd.",
"fork": false,
"created_at": "2024-07-04T01:02:34Z",
"updated_at": "2024-07-13T18:45:36Z",
"updated_at": "2025-01-17T18:49:12Z",
"pushed_at": "2024-07-13T18:43:04Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -138,10 +138,10 @@
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
"fork": false,
"created_at": "2025-01-15T18:27:12Z",
"updated_at": "2025-01-17T10:17:32Z",
"updated_at": "2025-01-17T21:52:43Z",
"pushed_at": "2025-01-16T15:44:15Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 0
},
@ -169,19 +169,19 @@
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
"fork": false,
"created_at": "2025-01-16T14:45:53Z",
"updated_at": "2025-01-17T12:35:08Z",
"updated_at": "2025-01-17T18:40:56Z",
"pushed_at": "2025-01-16T20:09:52Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 17,
"forks": 2,
"watchers": 18,
"score": 0,
"subscribers_count": 0
}

View file

@ -1,8 +1,8 @@
[
{
"id": 917869167,
"name": "CVE-2024-510T",
"full_name": "g0v3lla\/CVE-2024-510T",
"id": 918359148,
"name": "CVE-2025-510T",
"full_name": "g0v3lla\/CVE-2025-510T",
"owner": {
"login": "g0v3lla",
"id": 185237270,
@ -10,12 +10,12 @@
"html_url": "https:\/\/github.com\/g0v3lla",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/g0v3lla\/CVE-2024-510T",
"html_url": "https:\/\/github.com\/g0v3lla\/CVE-2025-510T",
"description": null,
"fork": false,
"created_at": "2025-01-16T19:51:01Z",
"updated_at": "2025-01-17T10:12:45Z",
"pushed_at": "2025-01-17T13:36:30Z",
"created_at": "2025-01-17T19:08:52Z",
"updated_at": "2025-01-17T19:59:01Z",
"pushed_at": "2025-01-17T19:59:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

View file

@ -13,6 +13,9 @@
- [watchtowrlabs/CVE-2025-0282](https://github.com/watchtowrlabs/CVE-2025-0282)
- [sfewer-r7/CVE-2025-0282](https://github.com/sfewer-r7/CVE-2025-0282)
### CVE-2025-510
- [g0v3lla/CVE-2025-510T](https://github.com/g0v3lla/CVE-2025-510T)
### CVE-2025-21385 (2025-01-09)
<code>A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network.
@ -352,9 +355,6 @@
### CVE-2024-436
- [Julian-gmz/CVE-2024-436_Exploit](https://github.com/Julian-gmz/CVE-2024-436_Exploit)
### CVE-2024-510
- [g0v3lla/CVE-2024-510T](https://github.com/g0v3lla/CVE-2024-510T)
### CVE-2024-1071 (2024-03-13)
<code>The Ultimate Member User Profile, Registration, Login, Member Directory, Content Restriction &amp; Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'sorting' parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
@ -1508,7 +1508,7 @@
- [harshinsecurity/sentinelssh](https://github.com/harshinsecurity/sentinelssh)
- [t3rry327/cve-2024-6387-poc](https://github.com/t3rry327/cve-2024-6387-poc)
- [jocker2410/CVE-2024-6387_poc](https://github.com/jocker2410/CVE-2024-6387_poc)
- [liqhtnd/sshd-logingracetime0](https://github.com/liqhtnd/sshd-logingracetime0)
- [liqhtnd/sshd-logingracetime](https://github.com/liqhtnd/sshd-logingracetime)
- [JackSparrowhk/ssh-CVE-2024-6387-poc](https://github.com/JackSparrowhk/ssh-CVE-2024-6387-poc)
- [turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker](https://github.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker)
- [sms2056/CVE-2024-6387](https://github.com/sms2056/CVE-2024-6387)
@ -8488,7 +8488,11 @@
- [absholi7ly/CVE-2024-56512-Apache-NiFi-Exploit](https://github.com/absholi7ly/CVE-2024-56512-Apache-NiFi-Exploit)
### CVE-2024-57252
### CVE-2024-57252 (2025-01-17)
<code>OtCMS &lt;=V7.46 is vulnerable to Server-Side Request Forgery (SSRF) in /admin/read.php, which can Read system files arbitrarily.
</code>
- [J-0k3r/CVE-2024-57252](https://github.com/J-0k3r/CVE-2024-57252)
### CVE-2024-57487 (2025-01-13)
@ -41751,7 +41755,11 @@
- [andyfeili/CVE-2018-9276](https://github.com/andyfeili/CVE-2018-9276)
- [alvinsmith-eroad/CVE-2018-9276](https://github.com/alvinsmith-eroad/CVE-2018-9276)
### CVE-2018-9375
### CVE-2018-9375 (2025-01-17)
<code>In multiple functions of UserDictionaryProvider.java, there is a possible way to add and delete words in the user dictionary due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
</code>
- [IOActive/AOSP-ExploitUserDictionary](https://github.com/IOActive/AOSP-ExploitUserDictionary)
### CVE-2018-9411 (2024-11-19)
@ -49018,7 +49026,7 @@
- [bsodmike/rails-exploit-cve-2013-0156](https://github.com/bsodmike/rails-exploit-cve-2013-0156)
- [R3dKn33-zz/CVE-2013-0156](https://github.com/R3dKn33-zz/CVE-2013-0156)
- [Jjdt12/kuang_grade_mk11](https://github.com/Jjdt12/kuang_grade_mk11)
- [oxBEN10/CVE-2013-0156](https://github.com/oxBEN10/CVE-2013-0156)
- [oxben10/CVE-2013-0156](https://github.com/oxben10/CVE-2013-0156)
### CVE-2013-0212 (2013-02-24)