Auto Update 2025/01/16 18:32:45

This commit is contained in:
motikan2010-bot 2025-01-17 03:32:45 +09:00
parent cb967ee197
commit c31f3195a8
22 changed files with 268 additions and 130 deletions

View file

@ -543,6 +543,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -250,36 +250,5 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 728154421,
"name": "CVE-2020-25213",
"full_name": "Nguyen-id\/CVE-2020-25213",
"owner": {
"login": "Nguyen-id",
"id": 145361899,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145361899?v=4",
"html_url": "https:\/\/github.com\/Nguyen-id",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nguyen-id\/CVE-2020-25213",
"description": null,
"fork": false,
"created_at": "2023-12-06T10:47:11Z",
"updated_at": "2023-12-06T10:47:54Z",
"pushed_at": "2023-12-06T10:47:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -29,42 +29,5 @@
"watchers": 54,
"score": 0,
"subscribers_count": 4
},
{
"id": 808546624,
"name": "jhviw.github.io",
"full_name": "JHVIW\/jhviw.github.io",
"owner": {
"login": "JHVIW",
"id": 37812681,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37812681?v=4",
"html_url": "https:\/\/github.com\/JHVIW",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JHVIW\/jhviw.github.io",
"description": "Results of my research I have done on CVE-2021-30481 and on wallhacks in the videogame Counter-Strike 2",
"fork": false,
"created_at": "2024-05-31T09:43:39Z",
"updated_at": "2025-01-16T01:26:56Z",
"pushed_at": "2025-01-16T01:26:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cheats",
"counter-strike-2",
"cs2",
"research-paper",
"research-project"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -138,10 +138,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Exploiter",
"fork": false,
"created_at": "2022-12-22T06:39:07Z",
"updated_at": "2025-01-07T06:04:22Z",
"updated_at": "2025-01-16T16:44:49Z",
"pushed_at": "2023-01-12T09:05:52Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}

View file

@ -29,5 +29,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 448079716,
"name": "CVE-2021-46071",
"full_name": "plsanu\/CVE-2021-46071",
"owner": {
"login": "plsanu",
"id": 61007700,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
"html_url": "https:\/\/github.com\/plsanu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46071",
"description": "CVE-2021-46071 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Category List Section in login panel.",
"fork": false,
"created_at": "2022-01-14T19:09:36Z",
"updated_at": "2023-12-30T08:24:20Z",
"pushed_at": "2022-01-14T19:10:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -261,5 +261,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 917709059,
"name": "CVE-2022-31814",
"full_name": "Inplex-sys\/CVE-2022-31814",
"owner": {
"login": "Inplex-sys",
"id": 69421356,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4",
"html_url": "https:\/\/github.com\/Inplex-sys",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Inplex-sys\/CVE-2022-31814",
"description": "Proof of concept for CVE-2022-31814",
"fork": false,
"created_at": "2025-01-16T13:59:45Z",
"updated_at": "2025-01-16T14:01:17Z",
"pushed_at": "2025-01-16T14:01:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "u think that it doesnt but it do",
"fork": false,
"created_at": "2022-10-15T00:29:38Z",
"updated_at": "2024-10-29T11:15:07Z",
"updated_at": "2025-01-16T16:17:49Z",
"pushed_at": "2022-10-15T00:46:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
"fork": false,
"created_at": "2022-10-13T14:24:12Z",
"updated_at": "2024-11-07T04:30:05Z",
"updated_at": "2025-01-16T13:12:41Z",
"pushed_at": "2022-10-13T15:25:00Z",
"stargazers_count": 341,
"watchers_count": 341,
"stargazers_count": 342,
"watchers_count": 342,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 90,
"watchers": 341,
"watchers": 342,
"score": 0,
"subscribers_count": 7
},
@ -743,19 +743,19 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-16T06:54:15Z",
"updated_at": "2025-01-16T12:17:09Z",
"updated_at": "2025-01-16T16:33:35Z",
"pushed_at": "2025-01-16T09:56:36Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 3,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"forks": 7,
"watchers": 21,
"score": 0,
"subscribers_count": 0
}

View file

@ -112,13 +112,13 @@
"stargazers_count": 885,
"watchers_count": 885,
"has_discussions": false,
"forks_count": 74,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 74,
"forks": 75,
"watchers": 885,
"score": 0,
"subscribers_count": 25

View file

@ -76,19 +76,19 @@
"description": "GameOver(lay) Ubuntu Privilege Escalation",
"fork": false,
"created_at": "2023-10-09T22:02:42Z",
"updated_at": "2024-12-07T15:13:21Z",
"updated_at": "2025-01-16T15:20:27Z",
"pushed_at": "2023-10-09T22:44:21Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 121,
"watchers_count": 121,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 120,
"forks": 19,
"watchers": 121,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "Exploit for CVE-2023-27532 against Veeam Backup & Replication",
"fork": false,
"created_at": "2023-03-23T16:08:43Z",
"updated_at": "2024-12-23T19:54:11Z",
"updated_at": "2025-01-16T18:21:07Z",
"pushed_at": "2023-03-23T18:03:27Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 104,
"watchers": 105,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering them ineffective, working for both x32 and x64(CVE-2023-44976).",
"fork": false,
"created_at": "2023-10-01T18:24:38Z",
"updated_at": "2025-01-13T16:43:49Z",
"updated_at": "2025-01-16T13:36:24Z",
"pushed_at": "2024-12-26T13:43:18Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 92,
"watchers": 93,
"score": 0,
"subscribers_count": 2
}

View file

@ -112,13 +112,13 @@
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 60,
"score": 0,
"subscribers_count": 1

33
2024/CVE-2024-43468.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 894482678,
"name": "CVE-2024-43468",
"full_name": "synacktiv\/CVE-2024-43468",
"owner": {
"login": "synacktiv",
"id": 50145679,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50145679?v=4",
"html_url": "https:\/\/github.com\/synacktiv",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/synacktiv\/CVE-2024-43468",
"description": null,
"fork": false,
"created_at": "2024-11-26T12:39:44Z",
"updated_at": "2025-01-16T17:55:03Z",
"pushed_at": "2025-01-16T09:48:07Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 14,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-16T07:01:01Z",
"updated_at": "2025-01-16T15:33:13Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 445,
"watchers_count": 445,
"stargazers_count": 446,
"watchers_count": 446,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 445,
"watchers": 446,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,12 +14,12 @@
"description": "POC exploit for CVE-2024-49138",
"fork": false,
"created_at": "2025-01-15T00:43:37Z",
"updated_at": "2025-01-16T12:10:35Z",
"updated_at": "2025-01-16T18:11:13Z",
"pushed_at": "2025-01-15T01:01:21Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 133,
"watchers_count": 133,
"has_discussions": false,
"forks_count": 21,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"windows"
],
"visibility": "public",
"forks": 21,
"watchers": 119,
"forks": 24,
"watchers": 133,
"score": 0,
"subscribers_count": 2
}

33
2024/CVE-2024-50967.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 917699084,
"name": "CVE-2024-50967",
"full_name": "0xByteHunter\/CVE-2024-50967",
"owner": {
"login": "0xByteHunter",
"id": 174806873,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174806873?v=4",
"html_url": "https:\/\/github.com\/0xByteHunter",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xByteHunter\/CVE-2024-50967",
"description": "DATAGERRY Broken Access Control",
"fork": false,
"created_at": "2025-01-16T13:38:20Z",
"updated_at": "2025-01-16T13:39:48Z",
"pushed_at": "2025-01-16T13:39:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2025-01-16T07:26:15Z",
"updated_at": "2025-01-16T12:29:03Z",
"updated_at": "2025-01-16T17:55:36Z",
"pushed_at": "2025-01-16T08:58:49Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 3,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"forks": 6,
"watchers": 22,
"score": 0,
"subscribers_count": 0
}

View file

@ -112,13 +112,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection",
"fork": false,
"created_at": "2024-09-16T15:33:46Z",
"updated_at": "2025-01-01T13:11:11Z",
"updated_at": "2025-01-16T18:11:43Z",
"pushed_at": "2024-09-16T15:43:44Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 5
}

View file

@ -122,5 +122,67 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 917304934,
"name": "CVE-2025-0282",
"full_name": "watchtowrlabs\/CVE-2025-0282",
"owner": {
"login": "watchtowrlabs",
"id": 99977116,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
"html_url": "https:\/\/github.com\/watchtowrlabs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/watchtowrlabs\/CVE-2025-0282",
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
"fork": false,
"created_at": "2025-01-15T18:27:12Z",
"updated_at": "2025-01-16T16:04:14Z",
"pushed_at": "2025-01-16T15:44:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 917731595,
"name": "CVE-2025-0282",
"full_name": "sfewer-r7\/CVE-2025-0282",
"owner": {
"login": "sfewer-r7",
"id": 122022313,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122022313?v=4",
"html_url": "https:\/\/github.com\/sfewer-r7",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sfewer-r7\/CVE-2025-0282",
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
"fork": false,
"created_at": "2025-01-16T14:45:53Z",
"updated_at": "2025-01-16T17:53:02Z",
"pushed_at": "2025-01-16T17:25:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -10,6 +10,8 @@
- [absholi7ly/CVE-2025-0282-Ivanti-exploit](https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit)
- [AnonStorks/CVE-2025-0282-Full-version](https://github.com/AnonStorks/CVE-2025-0282-Full-version)
- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter)
- [watchtowrlabs/CVE-2025-0282](https://github.com/watchtowrlabs/CVE-2025-0282)
- [sfewer-r7/CVE-2025-0282](https://github.com/sfewer-r7/CVE-2025-0282)
### CVE-2025-21385 (2025-01-09)
@ -6785,6 +6787,13 @@
- [RedTeamPentesting/moodle-rce-calculatedquestions](https://github.com/RedTeamPentesting/moodle-rce-calculatedquestions)
### CVE-2024-43468 (2024-10-08)
<code>Microsoft Configuration Manager Remote Code Execution Vulnerability
</code>
- [synacktiv/CVE-2024-43468](https://github.com/synacktiv/CVE-2024-43468)
### CVE-2024-43532 (2024-10-08)
<code>Remote Registry Service Elevation of Privilege Vulnerability
@ -7753,7 +7762,11 @@
- [verylazytech/CVE-2024-50623](https://github.com/verylazytech/CVE-2024-50623)
- [iSee857/Cleo-CVE-2024-50623-PoC](https://github.com/iSee857/Cleo-CVE-2024-50623-PoC)
### CVE-2024-50633
### CVE-2024-50633 (2025-01-16)
<code>A Broken Object Level Authorization (BOLA) vulnerability in Indico v3.2.9 allows attackers to access sensitive information via sending a crafted POST request to the component /api/principals.
</code>
- [cetinpy/CVE-2024-50633](https://github.com/cetinpy/CVE-2024-50633)
### CVE-2024-50657 (2024-11-22)
@ -7821,6 +7834,9 @@
### CVE-2024-50964
- [fdzdev/CVE-2024-50964](https://github.com/fdzdev/CVE-2024-50964)
### CVE-2024-50967
- [0xByteHunter/CVE-2024-50967](https://github.com/0xByteHunter/CVE-2024-50967)
### CVE-2024-50968 (2024-11-14)
<code>A business logic vulnerability exists in the Add to Cart function of itsourcecode Agri-Trading Online Shopping System 1.0, which allows remote attackers to manipulate the quant parameter when adding a product to the cart. By setting the quantity value to -0, an attacker can exploit a flaw in the application's total price calculation logic. This vulnerability causes the total price to be reduced to zero, allowing the attacker to add items to the cart and proceed to checkout.
@ -21305,6 +21321,7 @@
- [dkstar11q/CVE-2022-31814](https://github.com/dkstar11q/CVE-2022-31814)
- [Laburity/CVE-2022-31814](https://github.com/Laburity/CVE-2022-31814)
- [ArunHAtter/CVE-2022-31814](https://github.com/ArunHAtter/CVE-2022-31814)
- [Inplex-sys/CVE-2022-31814](https://github.com/Inplex-sys/CVE-2022-31814)
### CVE-2022-31854 (2022-07-07)
@ -26892,7 +26909,6 @@
</code>
- [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481)
- [JHVIW/jhviw.github.io](https://github.com/JHVIW/jhviw.github.io)
### CVE-2021-30551 (2021-06-15)
@ -30360,6 +30376,7 @@
</code>
- [plsanu/Vehicle-Service-Management-System-Category-List-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Category-List-Stored-Cross-Site-Scripting-XSS)
- [plsanu/CVE-2021-46071](https://github.com/plsanu/CVE-2021-46071)
### CVE-2021-46072 (2022-01-06)
@ -34913,7 +34930,6 @@
- [b1ackros337/CVE-2020-25213](https://github.com/b1ackros337/CVE-2020-25213)
- [BLY-Coder/Python-exploit-CVE-2020-25213](https://github.com/BLY-Coder/Python-exploit-CVE-2020-25213)
- [E1tex/Python-CVE-2020-25213](https://github.com/E1tex/Python-CVE-2020-25213)
- [Nguyen-id/CVE-2020-25213](https://github.com/Nguyen-id/CVE-2020-25213)
### CVE-2020-25223 (2020-09-25)