Auto Update 2025/05/24 18:33:43

This commit is contained in:
motikan2010-bot 2025-05-25 03:33:43 +09:00
commit d3d8109d85
25 changed files with 195 additions and 78 deletions

View file

@ -60,5 +60,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 989631009,
"name": "final-CVE-2016-5180",
"full_name": "pouriam23\/final-CVE-2016-5180",
"owner": {
"login": "pouriam23",
"id": 174950792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174950792?v=4",
"html_url": "https:\/\/github.com\/pouriam23",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pouriam23\/final-CVE-2016-5180",
"description": null,
"fork": false,
"created_at": "2025-05-24T13:54:55Z",
"updated_at": "2025-05-24T13:57:00Z",
"pushed_at": "2025-05-24T13:56:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -50,13 +50,13 @@
"stargazers_count": 215,
"watchers_count": 215,
"has_discussions": false,
"forks_count": 45,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 45,
"forks": 46,
"watchers": 215,
"score": 0,
"subscribers_count": 2

View file

@ -19,13 +19,13 @@
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 20,
"forks": 21,
"watchers": 11,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
"updated_at": "2025-05-13T16:18:52Z",
"updated_at": "2025-05-24T16:48:12Z",
"pushed_at": "2021-10-13T22:32:36Z",
"stargazers_count": 151,
"watchers_count": 151,
"stargazers_count": 152,
"watchers_count": 152,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 151,
"watchers": 152,
"score": 0,
"subscribers_count": 7
},

View file

@ -107,10 +107,10 @@
"description": "Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207",
"fork": false,
"created_at": "2021-09-04T15:34:03Z",
"updated_at": "2025-04-17T02:17:06Z",
"updated_at": "2025-05-24T12:43:29Z",
"pushed_at": "2023-08-25T22:42:24Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 112,
"watchers": 113,
"score": 0,
"subscribers_count": 3
},

View file

@ -213,8 +213,8 @@
"description": "CVE-2021-42287\/CVE-2021-42278\/OTHER Scanner & Exploiter.",
"fork": false,
"created_at": "2025-04-29T11:39:11Z",
"updated_at": "2025-05-24T11:51:13Z",
"pushed_at": "2025-05-24T11:51:10Z",
"updated_at": "2025-05-24T17:52:04Z",
"pushed_at": "2025-05-24T17:52:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -627,13 +627,13 @@
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,
"forks_count": 35,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 35,
"forks": 36,
"watchers": 154,
"score": 0,
"subscribers_count": 14

View file

@ -14,10 +14,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2025-05-24T05:35:27Z",
"updated_at": "2025-05-24T14:09:32Z",
"pushed_at": "2025-02-21T14:10:58Z",
"stargazers_count": 377,
"watchers_count": 377,
"stargazers_count": 378,
"watchers_count": 378,
"has_discussions": true,
"forks_count": 57,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 57,
"watchers": 377,
"watchers": 378,
"score": 0,
"subscribers_count": 8
},

View file

@ -19,7 +19,7 @@
"stargazers_count": 308,
"watchers_count": 308,
"has_discussions": false,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"proxy"
],
"visibility": "public",
"forks": 39,
"forks": 40,
"watchers": 308,
"score": 0,
"subscribers_count": 6

View file

@ -19,7 +19,7 @@
"stargazers_count": 215,
"watchers_count": 215,
"has_discussions": false,
"forks_count": 34,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,7 +27,7 @@
"cve-2023-4357"
],
"visibility": "public",
"forks": 34,
"forks": 35,
"watchers": 215,
"score": 0,
"subscribers_count": 3

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-05-24T00:01:37Z",
"updated_at": "2025-05-24T13:42:52Z",
"pushed_at": "2025-05-06T07:35:36Z",
"stargazers_count": 1527,
"watchers_count": 1527,
"stargazers_count": 1528,
"watchers_count": 1528,
"has_discussions": false,
"forks_count": 261,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 261,
"watchers": 1527,
"watchers": 1528,
"score": 0,
"subscribers_count": 27
},

View file

@ -215,5 +215,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 989682547,
"name": "CVE-2023-50564",
"full_name": "glynzr\/CVE-2023-50564",
"owner": {
"login": "glynzr",
"id": 97050713,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97050713?v=4",
"html_url": "https:\/\/github.com\/glynzr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/glynzr\/CVE-2023-50564",
"description": "Pluck v4.7.18 - Remote Code Execution (RCE)",
"fork": false,
"created_at": "2025-05-24T15:55:45Z",
"updated_at": "2025-05-24T16:18:18Z",
"pushed_at": "2025-05-24T16:18:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Exploit POC for CVE-2024-22026 affecting Ivanti EPMM \"MobileIron Core\"",
"fork": false,
"created_at": "2024-05-15T11:20:45Z",
"updated_at": "2025-03-18T17:59:17Z",
"updated_at": "2025-05-24T18:06:28Z",
"pushed_at": "2024-05-15T11:40:29Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
}

View file

@ -452,8 +452,8 @@
"description": "Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.",
"fork": false,
"created_at": "2025-04-03T13:54:25Z",
"updated_at": "2025-05-24T11:32:59Z",
"pushed_at": "2025-05-24T11:32:56Z",
"updated_at": "2025-05-24T17:34:05Z",
"pushed_at": "2025-05-24T17:34:02Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -424,19 +424,19 @@
"description": "CVE-2024-36401-GeoServer Property 表达式注入 Rce woodpecker-framework 插件",
"fork": false,
"created_at": "2024-11-22T03:57:12Z",
"updated_at": "2025-04-28T11:10:53Z",
"updated_at": "2025-05-24T13:46:29Z",
"pushed_at": "2024-11-23T08:24:26Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 12,
"forks": 2,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -145,8 +145,8 @@
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
"fork": false,
"created_at": "2025-03-13T19:53:22Z",
"updated_at": "2025-05-24T11:21:38Z",
"pushed_at": "2025-05-24T11:21:35Z",
"updated_at": "2025-05-24T17:22:28Z",
"pushed_at": "2025-05-24T17:22:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -14,19 +14,19 @@
"description": "Basic customization app using CVE-2025-24203. Patched in iOS 18.4.",
"fork": false,
"created_at": "2025-05-09T07:18:55Z",
"updated_at": "2025-05-24T09:41:04Z",
"pushed_at": "2025-05-24T04:04:34Z",
"stargazers_count": 128,
"watchers_count": 128,
"updated_at": "2025-05-24T16:12:58Z",
"pushed_at": "2025-05-24T16:12:55Z",
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 128,
"forks": 16,
"watchers": 130,
"score": 0,
"subscribers_count": 5
},
@ -76,8 +76,8 @@
"description": "Basic customization app using CVE-2025-24203. Patched in iOS 18.4.",
"fork": false,
"created_at": "2025-05-10T22:38:58Z",
"updated_at": "2025-05-24T12:01:15Z",
"pushed_at": "2025-05-24T12:01:12Z",
"updated_at": "2025-05-24T18:02:25Z",
"pushed_at": "2025-05-24T18:02:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

33
2025/CVE-2025-25014.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 989650635,
"name": "CVE-2025-25014",
"full_name": "davidxbors\/CVE-2025-25014",
"owner": {
"login": "davidxbors",
"id": 22767204,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22767204?v=4",
"html_url": "https:\/\/github.com\/davidxbors",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/davidxbors\/CVE-2025-25014",
"description": null,
"fork": false,
"created_at": "2025-05-24T14:40:13Z",
"updated_at": "2025-05-24T14:43:58Z",
"pushed_at": "2025-05-24T14:43:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1136,15 +1136,15 @@
{
"id": 955434542,
"name": "CVE-2025-29927",
"full_name": "w3shi\/CVE-2025-29927",
"full_name": "hyperledger-web3j\/CVE-2025-29927",
"owner": {
"login": "w3shi",
"login": "hyperledger-web3j",
"id": 169062599,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169062599?v=4",
"html_url": "https:\/\/github.com\/w3shi",
"html_url": "https:\/\/github.com\/hyperledger-web3j",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/w3shi\/CVE-2025-29927",
"html_url": "https:\/\/github.com\/hyperledger-web3j\/CVE-2025-29927",
"description": "A touch of security",
"fork": false,
"created_at": "2025-03-26T16:24:15Z",
@ -1520,7 +1520,7 @@
"description": "NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js",
"fork": false,
"created_at": "2025-03-28T11:09:25Z",
"updated_at": "2025-05-20T10:26:34Z",
"updated_at": "2025-05-24T14:08:33Z",
"pushed_at": "2025-04-12T10:55:01Z",
"stargazers_count": 37,
"watchers_count": 37,
@ -1529,7 +1529,20 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"anonymous",
"authentication-bypass",
"automation",
"cve-2025-29927",
"ethical-hacking",
"hacking",
"middleware-bypass",
"nextjs",
"penetration-testing",
"python",
"security-testing",
"vulnerability-scanner"
],
"visibility": "public",
"forks": 12,
"watchers": 37,

View file

@ -50,13 +50,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -14,19 +14,19 @@
"description": "1day practice - Escape macOS sandbox (partial) using RemoteViewServices",
"fork": false,
"created_at": "2025-05-12T23:51:04Z",
"updated_at": "2025-05-20T11:10:04Z",
"updated_at": "2025-05-24T14:26:43Z",
"pushed_at": "2025-05-12T23:52:30Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 35,
"forks": 6,
"watchers": 36,
"score": 0,
"subscribers_count": 2
},
@ -45,8 +45,8 @@
"description": "1day practice - Escape macOS sandbox (partial) using RemoteViewServices",
"fork": false,
"created_at": "2025-05-15T00:55:10Z",
"updated_at": "2025-05-24T12:05:35Z",
"pushed_at": "2025-05-24T12:05:31Z",
"updated_at": "2025-05-24T18:06:56Z",
"pushed_at": "2025-05-24T18:06:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -419,8 +419,8 @@
"description": "CVE-2025-32433 https:\/\/github.com\/erlang\/otp\/security\/advisories\/GHSA-37cp-fgq5-7wc2",
"fork": false,
"created_at": "2025-04-24T21:14:12Z",
"updated_at": "2025-05-24T11:44:38Z",
"pushed_at": "2025-05-24T11:44:35Z",
"updated_at": "2025-05-24T17:45:20Z",
"pushed_at": "2025-05-24T17:45:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Artefacts for blog post on finding CVE-2025-37899 with o3",
"fork": false,
"created_at": "2025-05-22T10:36:18Z",
"updated_at": "2025-05-24T11:26:32Z",
"updated_at": "2025-05-24T13:36:34Z",
"pushed_at": "2025-05-22T10:37:04Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,8 +14,8 @@
"description": "Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.",
"fork": false,
"created_at": "2025-05-01T16:35:56Z",
"updated_at": "2025-05-24T11:54:26Z",
"pushed_at": "2025-05-24T11:54:23Z",
"updated_at": "2025-05-24T17:56:32Z",
"pushed_at": "2025-05-24T17:56:28Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
@ -66,8 +66,8 @@
"description": "Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.",
"fork": false,
"created_at": "2025-05-01T16:35:56Z",
"updated_at": "2025-05-24T11:56:43Z",
"pushed_at": "2025-05-24T11:56:40Z",
"updated_at": "2025-05-24T17:55:08Z",
"pushed_at": "2025-05-24T17:55:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -995,6 +995,13 @@
- [airbus-cert/cve-2025-24985](https://github.com/airbus-cert/cve-2025-24985)
### CVE-2025-25014 (2025-05-06)
<code>A Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting endpoints.
</code>
- [davidxbors/CVE-2025-25014](https://github.com/davidxbors/CVE-2025-25014)
### CVE-2025-25062 (2025-02-03)
<code>An XSS issue was discovered in Backdrop CMS 1.28.x before 1.28.5 and 1.29.x before 1.29.3. It doesn't sufficiently isolate long text content when the CKEditor 5 rich text editor is used. This allows a potential attacker to craft specialized HTML and JavaScript that may be executed when an administrator attempts to edit a piece of content. This vulnerability is mitigated by the fact that an attacker must have the ability to create long text content (such as through the node or comment forms) and an administrator must edit (not view) the content that contains the malicious content. This problem only exists when using the CKEditor 5 module.
@ -1590,7 +1597,7 @@
- [kOaDT/poc-cve-2025-29927](https://github.com/kOaDT/poc-cve-2025-29927)
- [yugo-eliatrope/test-cve-2025-29927](https://github.com/yugo-eliatrope/test-cve-2025-29927)
- [emadshanab/CVE-2025-29927](https://github.com/emadshanab/CVE-2025-29927)
- [w3shi/CVE-2025-29927](https://github.com/w3shi/CVE-2025-29927)
- [hyperledger-web3j/CVE-2025-29927](https://github.com/hyperledger-web3j/CVE-2025-29927)
- [aleongx/CVE-2025-29927](https://github.com/aleongx/CVE-2025-29927)
- [nicknisi/next-attack](https://github.com/nicknisi/next-attack)
- [jmbowes/NextSecureScan](https://github.com/jmbowes/NextSecureScan)
@ -20816,6 +20823,7 @@
- [Mrterrestrial/CVE-2023-50564](https://github.com/Mrterrestrial/CVE-2023-50564)
- [0xDTC/Pluck-CMS-v4.7.18-Remote-Code-Execution-CVE-2023-50564](https://github.com/0xDTC/Pluck-CMS-v4.7.18-Remote-Code-Execution-CVE-2023-50564)
- [xpltive/CVE-2023-50564](https://github.com/xpltive/CVE-2023-50564)
- [glynzr/CVE-2023-50564](https://github.com/glynzr/CVE-2023-50564)
### CVE-2023-50596
- [chandraprarikraj/CVE-2023-50596](https://github.com/chandraprarikraj/CVE-2023-50596)
@ -50957,6 +50965,7 @@
- [pouriam23/CVE-2016-5180](https://github.com/pouriam23/CVE-2016-5180)
- [pouriam23/CVE-2016-5180-docker-](https://github.com/pouriam23/CVE-2016-5180-docker-)
- [pouriam23/final-CVE-2016-5180](https://github.com/pouriam23/final-CVE-2016-5180)
### CVE-2016-5195 (2016-11-10)