Auto Update 2025/01/06 00:31:31

This commit is contained in:
motikan2010-bot 2025-01-06 09:31:31 +09:00
parent 36fb76d460
commit db5430013f
25 changed files with 121 additions and 89 deletions

View file

@ -107,10 +107,10 @@
"description": null,
"fork": false,
"created_at": "2020-08-17T19:54:11Z",
"updated_at": "2024-06-10T09:47:16Z",
"updated_at": "2025-01-05T23:20:28Z",
"pushed_at": "2020-08-17T20:16:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},

View file

@ -81,7 +81,7 @@
"stargazers_count": 133,
"watchers_count": 133,
"has_discussions": false,
"forks_count": 53,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -94,7 +94,7 @@
"vulnerable-container"
],
"visibility": "public",
"forks": 53,
"forks": 52,
"watchers": 133,
"score": 0,
"subscribers_count": 3

View file

@ -14,10 +14,10 @@
"description": "An implementation of CVE-2016-0974 for the Nintendo Wii.",
"fork": false,
"created_at": "2018-04-01T00:39:28Z",
"updated_at": "2024-02-08T14:30:31Z",
"updated_at": "2025-01-05T22:29:17Z",
"pushed_at": "2024-02-21T17:35:59Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 3
}

View file

@ -462,10 +462,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-12-26T06:36:05Z",
"updated_at": "2025-01-05T22:50:49Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 867,
"watchers_count": 867,
"stargazers_count": 868,
"watchers_count": 868,
"has_discussions": false,
"forks_count": 426,
"allow_forking": true,
@ -478,7 +478,7 @@
],
"visibility": "public",
"forks": 426,
"watchers": 867,
"watchers": 868,
"score": 0,
"subscribers_count": 9
},

View file

@ -14,10 +14,10 @@
"description": "Synaptics Audio Driver LPE",
"fork": false,
"created_at": "2019-04-14T06:16:34Z",
"updated_at": "2024-12-09T01:44:01Z",
"updated_at": "2025-01-05T19:39:19Z",
"pushed_at": "2019-04-15T11:17:39Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 4
}

View file

@ -95,6 +95,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Android kernel exploitation for CVE-2022-20409",
"fork": false,
"created_at": "2022-11-21T22:42:50Z",
"updated_at": "2024-12-14T16:01:56Z",
"updated_at": "2025-01-05T19:20:06Z",
"pushed_at": "2024-10-17T16:26:39Z",
"stargazers_count": 163,
"watchers_count": 163,
"stargazers_count": 164,
"watchers_count": 164,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 163,
"watchers": 164,
"score": 0,
"subscribers_count": 5
}

View file

@ -14,10 +14,10 @@
"description": "POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox",
"fork": false,
"created_at": "2022-08-09T14:16:40Z",
"updated_at": "2024-08-12T20:26:01Z",
"updated_at": "2025-01-05T21:06:50Z",
"pushed_at": "2022-08-09T14:28:48Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 20,
"watchers": 19,
"score": 0,
"subscribers_count": 3
}

View file

@ -14,10 +14,10 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false,
"created_at": "2022-08-09T15:53:48Z",
"updated_at": "2024-12-30T21:26:37Z",
"updated_at": "2025-01-05T19:08:04Z",
"pushed_at": "2023-09-27T06:44:27Z",
"stargazers_count": 318,
"watchers_count": 318,
"stargazers_count": 317,
"watchers_count": 317,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 61,
"watchers": 318,
"watchers": 317,
"score": 0,
"subscribers_count": 11
},
@ -84,10 +84,10 @@
"description": "An implementation of baton drop (CVE-2022-21894) for armv7 (MSM8960)",
"fork": false,
"created_at": "2023-03-11T14:38:13Z",
"updated_at": "2024-10-14T17:11:20Z",
"updated_at": "2025-01-05T19:08:06Z",
"pushed_at": "2023-03-11T14:46:39Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -96,7 +96,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 11,
"watchers": 10,
"score": 0,
"subscribers_count": 4
},

View file

@ -2542,10 +2542,10 @@
"description": "Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. Its a high-severity vulnerability that hackers can leverage for remote code execution (RCE) attacks.",
"fork": false,
"created_at": "2023-05-14T13:38:43Z",
"updated_at": "2024-10-09T04:32:05Z",
"updated_at": "2025-01-05T21:18:32Z",
"pushed_at": "2023-05-14T13:45:18Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -2554,7 +2554,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 8,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-21554 Windows MessageQueuing PoC分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
"fork": false,
"created_at": "2023-05-18T10:30:49Z",
"updated_at": "2024-12-26T10:57:27Z",
"updated_at": "2025-01-05T23:28:20Z",
"pushed_at": "2023-05-18T10:38:57Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 57,
"watchers": 56,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-18T11:14:08Z",
"updated_at": "2024-11-15T16:29:04Z",
"updated_at": "2025-01-05T21:11:25Z",
"pushed_at": "2023-06-18T11:51:54Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 159,
"watchers_count": 159,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 160,
"watchers": 159,
"score": 0,
"subscribers_count": 4
}

View file

@ -14,10 +14,10 @@
"description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2",
"fork": false,
"created_at": "2023-08-09T19:56:07Z",
"updated_at": "2024-12-19T17:34:11Z",
"updated_at": "2025-01-05T23:48:35Z",
"pushed_at": "2024-11-09T16:38:20Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 36,
"watchers": 35,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-05T17:27:45Z",
"updated_at": "2025-01-05T23:29:00Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1358,
"watchers_count": 1358,
"stargazers_count": 1361,
"watchers_count": 1361,
"has_discussions": false,
"forks_count": 229,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 229,
"watchers": 1358,
"watchers": 1361,
"score": 0,
"subscribers_count": 21
},

View file

@ -29,5 +29,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 912532095,
"name": "CVE-2024-10124-Poc",
"full_name": "Nxploited\/CVE-2024-10124-Poc",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-10124-Poc",
"description": null,
"fork": false,
"created_at": "2025-01-05T20:42:10Z",
"updated_at": "2025-01-05T21:12:38Z",
"pushed_at": "2025-01-05T21:12:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -113,10 +113,10 @@
"description": "Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924).",
"fork": false,
"created_at": "2024-11-19T10:07:28Z",
"updated_at": "2024-12-22T19:11:03Z",
"updated_at": "2025-01-05T19:08:18Z",
"pushed_at": "2024-11-19T12:20:16Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -134,7 +134,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 19,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -200,10 +200,10 @@
"description": "Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırılan bu güvenlik açığı, yerel NTLM bilgilerinin potansiyel sızıntısı ve uzaktan kod çalıştırma olasılığı dahil olmak üzere geniş kapsamlı etkilere sahiptir.",
"fork": false,
"created_at": "2024-02-23T12:13:11Z",
"updated_at": "2024-10-12T07:56:40Z",
"updated_at": "2025-01-06T00:08:37Z",
"pushed_at": "2024-02-24T15:36:22Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -362,10 +362,10 @@
"description": "geoserver图形化漏洞利用工具",
"fork": false,
"created_at": "2024-10-05T10:08:55Z",
"updated_at": "2024-12-31T08:29:17Z",
"updated_at": "2025-01-06T00:26:18Z",
"pushed_at": "2024-10-08T03:16:26Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -374,7 +374,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},

View file

@ -200,10 +200,10 @@
"description": "Zabbix CVE-2024-42327 PoC",
"fork": false,
"created_at": "2025-01-01T18:25:44Z",
"updated_at": "2025-01-05T14:59:02Z",
"updated_at": "2025-01-05T19:18:37Z",
"pushed_at": "2025-01-03T13:49:03Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -340,8 +340,8 @@
"description": "CVE-2024-4367 is a critical vulnerability (CVSS 9.8) in PDF.js, allowing arbitrary JavaScript code execution due to insufficient type checks on the FontMatrix object within PDF files.",
"fork": false,
"created_at": "2025-01-05T14:44:01Z",
"updated_at": "2025-01-05T15:09:38Z",
"pushed_at": "2025-01-05T15:09:35Z",
"updated_at": "2025-01-05T19:21:53Z",
"pushed_at": "2025-01-05T19:21:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -138,19 +138,19 @@
"description": "CVE POC Exploit",
"fork": false,
"created_at": "2025-01-05T02:54:01Z",
"updated_at": "2025-01-05T03:06:04Z",
"updated_at": "2025-01-05T23:19:02Z",
"pushed_at": "2025-01-05T03:06:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-05T14:27:28Z",
"updated_at": "2025-01-05T21:47:07Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 344,
"watchers_count": 344,
"stargazers_count": 347,
"watchers_count": 347,
"has_discussions": false,
"forks_count": 79,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 79,
"watchers": 344,
"watchers": 347,
"score": 0,
"subscribers_count": 3
},

View file

@ -973,7 +973,7 @@
"description": "CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure.",
"fork": false,
"created_at": "2024-07-02T11:55:39Z",
"updated_at": "2024-09-16T07:16:49Z",
"updated_at": "2025-01-05T23:59:18Z",
"pushed_at": "2024-07-08T20:39:03Z",
"stargazers_count": 13,
"watchers_count": 13,
@ -1159,10 +1159,10 @@
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
"fork": false,
"created_at": "2024-07-02T14:41:43Z",
"updated_at": "2025-01-05T15:39:31Z",
"updated_at": "2025-01-05T23:07:03Z",
"pushed_at": "2024-07-02T15:16:04Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -1181,7 +1181,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 32,
"watchers": 31,
"score": 0,
"subscribers_count": 2
},

View file

@ -2047,6 +2047,7 @@
</code>
- [RandomRobbieBF/CVE-2024-10124](https://github.com/RandomRobbieBF/CVE-2024-10124)
- [Nxploited/CVE-2024-10124-Poc](https://github.com/Nxploited/CVE-2024-10124-Poc)
### CVE-2024-10140 (2024-10-19)