Auto Update 2025/01/18 12:31:39

This commit is contained in:
motikan2010-bot 2025-01-18 21:31:39 +09:00
parent 77c3492f13
commit b728142901
16 changed files with 178 additions and 42 deletions

View file

@ -182,7 +182,7 @@
"fork": false,
"created_at": "2024-11-14T04:35:59Z",
"updated_at": "2025-01-05T15:26:10Z",
"pushed_at": "2025-01-18T05:35:58Z",
"pushed_at": "2025-01-18T07:52:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2025-01-16T19:49:51Z",
"updated_at": "2025-01-18T08:56:30Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 997,
"watchers_count": 997,
"stargazers_count": 998,
"watchers_count": 998,
"has_discussions": false,
"forks_count": 192,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 192,
"watchers": 997,
"watchers": 998,
"score": 0,
"subscribers_count": 24
},

View file

@ -743,10 +743,10 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-16T06:54:15Z",
"updated_at": "2025-01-18T06:03:34Z",
"updated_at": "2025-01-18T12:02:37Z",
"pushed_at": "2025-01-16T09:56:36Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -755,7 +755,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 5
},

View file

@ -468,5 +468,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 918591329,
"name": "CVE-2023-44487",
"full_name": "aulauniversal\/CVE-2023-44487",
"owner": {
"login": "aulauniversal",
"id": 168633732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168633732?v=4",
"html_url": "https:\/\/github.com\/aulauniversal",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/aulauniversal\/CVE-2023-44487",
"description": "RapidResetClient",
"fork": false,
"created_at": "2025-01-18T10:39:58Z",
"updated_at": "2025-01-18T11:39:56Z",
"pushed_at": "2025-01-18T11:39:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-18T04:12:03Z",
"updated_at": "2025-01-18T10:47:32Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1391,
"watchers_count": 1391,
"stargazers_count": 1392,
"watchers_count": 1392,
"has_discussions": false,
"forks_count": 238,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 238,
"watchers": 1391,
"watchers": 1392,
"score": 0,
"subscribers_count": 21
},

33
2024/CVE-2024-13375.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 918590212,
"name": "CVE-2024-13375",
"full_name": "McTavishSue\/CVE-2024-13375",
"owner": {
"login": "McTavishSue",
"id": 186207823,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186207823?v=4",
"html_url": "https:\/\/github.com\/McTavishSue",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/McTavishSue\/CVE-2024-13375",
"description": "CVE-2024-13375 Unverified Password Change",
"fork": false,
"created_at": "2025-01-18T10:35:47Z",
"updated_at": "2025-01-18T10:50:25Z",
"pushed_at": "2025-01-18T10:48:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -952,10 +952,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2025-01-18T05:18:06Z",
"updated_at": "2025-01-18T11:28:51Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3506,
"watchers_count": 3506,
"stargazers_count": 3505,
"watchers_count": 3505,
"has_discussions": false,
"forks_count": 239,
"allow_forking": true,
@ -964,7 +964,7 @@
"topics": [],
"visibility": "public",
"forks": 239,
"watchers": 3506,
"watchers": 3505,
"score": 0,
"subscribers_count": 38
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-26T12:39:44Z",
"updated_at": "2025-01-17T21:41:13Z",
"updated_at": "2025-01-18T11:54:10Z",
"pushed_at": "2025-01-16T09:48:07Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,10 +14,10 @@
"description": "POC for CVE-2024-46310 For FXServer version's v9601 and prior, Incorrect Access Control in FXServer version's v9601 and prior, for CFX.re FiveM, allows unauthenticated users to modify and read userdata via exposed api endpoint",
"fork": false,
"created_at": "2024-08-28T19:36:52Z",
"updated_at": "2025-01-13T21:52:23Z",
"updated_at": "2025-01-18T08:37:33Z",
"pushed_at": "2024-10-07T13:09:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-17T09:02:57Z",
"updated_at": "2025-01-18T12:25:04Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 448,
"watchers_count": 448,
"stargazers_count": 449,
"watchers_count": 449,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 448,
"watchers": 449,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,12 +14,12 @@
"description": "POC exploit for CVE-2024-49138",
"fork": false,
"created_at": "2025-01-15T00:43:37Z",
"updated_at": "2025-01-18T03:57:24Z",
"pushed_at": "2025-01-17T22:40:51Z",
"stargazers_count": 149,
"watchers_count": 149,
"updated_at": "2025-01-18T08:57:10Z",
"pushed_at": "2025-01-18T11:08:28Z",
"stargazers_count": 152,
"watchers_count": 152,
"has_discussions": false,
"forks_count": 27,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"windows"
],
"visibility": "public",
"forks": 27,
"watchers": 149,
"forks": 30,
"watchers": 152,
"score": 0,
"subscribers_count": 2
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -29,5 +29,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 918594689,
"name": "CVE-2024-54369-PoC",
"full_name": "Nxploited\/CVE-2024-54369-PoC",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-54369-PoC",
"description": "PoC: Plugin: Zita Site Builder <= 1.0.2 - Arbitrary Plugin Installation",
"fork": false,
"created_at": "2025-01-18T10:52:03Z",
"updated_at": "2025-01-18T11:22:40Z",
"pushed_at": "2025-01-18T11:22:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-16T07:26:15Z",
"updated_at": "2025-01-18T04:27:04Z",
"updated_at": "2025-01-18T10:18:13Z",
"pushed_at": "2025-01-16T08:58:49Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 38,
"watchers": 40,
"score": 0,
"subscribers_count": 1
}

View file

@ -122,5 +122,36 @@
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 917875317,
"name": "CVE-2024-9474",
"full_name": "aratane\/CVE-2024-9474",
"owner": {
"login": "aratane",
"id": 76691705,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76691705?v=4",
"html_url": "https:\/\/github.com\/aratane",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/aratane\/CVE-2024-9474",
"description": "Palo Alto RCE Vuln",
"fork": false,
"created_at": "2025-01-16T20:07:14Z",
"updated_at": "2025-01-18T12:14:08Z",
"pushed_at": "2025-01-16T20:35:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -2046,6 +2046,7 @@
- [k4nfr3/CVE-2024-9474](https://github.com/k4nfr3/CVE-2024-9474)
- [deathvu/CVE-2024-9474](https://github.com/deathvu/CVE-2024-9474)
- [coskper-papa/PAN-OS_CVE-2024-9474](https://github.com/coskper-papa/PAN-OS_CVE-2024-9474)
- [aratane/CVE-2024-9474](https://github.com/aratane/CVE-2024-9474)
### CVE-2024-9570 (2024-10-07)
@ -2686,6 +2687,13 @@
- [Aether-0/CVE-2024-12986](https://github.com/Aether-0/CVE-2024-12986)
### CVE-2024-13375 (2025-01-18)
<code>The Adifier System plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.1.7. This is due to the plugin not properly validating a user's identity prior to updating their details like password through the adifier_recover() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
</code>
- [McTavishSue/CVE-2024-13375](https://github.com/McTavishSue/CVE-2024-13375)
### CVE-2024-20017 (2024-03-04)
<code>In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132.
@ -8234,6 +8242,7 @@
</code>
- [RandomRobbieBF/CVE-2024-54369](https://github.com/RandomRobbieBF/CVE-2024-54369)
- [Nxploited/CVE-2024-54369-PoC](https://github.com/Nxploited/CVE-2024-54369-PoC)
### CVE-2024-54374 (2024-12-16)
@ -15434,6 +15443,7 @@
- [TYuan0816/cve-2023-44487](https://github.com/TYuan0816/cve-2023-44487)
- [sn130hk/CVE-2023-44487](https://github.com/sn130hk/CVE-2023-44487)
- [threatlabindonesia/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC](https://github.com/threatlabindonesia/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC)
- [aulauniversal/CVE-2023-44487](https://github.com/aulauniversal/CVE-2023-44487)
### CVE-2023-44758 (2023-10-06)