diff --git a/exploits/2023/CVE-2023-20943.json b/exploits/2023/CVE-2023-20943.json new file mode 100644 index 0000000..6188144 --- /dev/null +++ b/exploits/2023/CVE-2023-20943.json @@ -0,0 +1,20 @@ +[ + { + "name": "frameworks_base_CVE-2023-20943", + "full_name": "Trinadh465/frameworks_base_CVE-2023-20943", + "html_url": "https://github.com/Trinadh465/frameworks_base_CVE-2023-20943", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-04-03T11:32:21Z" + }, + { + "name": "platform_frameworks_base_AOSP10_r33_CVE-2023-20943", + "full_name": "hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2023-20943", + "html_url": "https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2023-20943", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-04-05T11:24:29Z" + } +] \ No newline at end of file diff --git a/exploits/2023/CVE-2023-20944.json b/exploits/2023/CVE-2023-20944.json new file mode 100644 index 0000000..9975db8 --- /dev/null +++ b/exploits/2023/CVE-2023-20944.json @@ -0,0 +1,20 @@ +[ + { + "name": "frameworks_base_CVE-2023-20944", + "full_name": "Trinadh465/frameworks_base_CVE-2023-20944", + "html_url": "https://github.com/Trinadh465/frameworks_base_CVE-2023-20944", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-04-03T12:12:17Z" + }, + { + "name": "platform_frameworks_base_AOSP10_r33_CVE-2023-20944", + "full_name": "hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2023-20944", + "html_url": "https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2023-20944", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-04-04T12:07:19Z" + } +] \ No newline at end of file diff --git a/exploits/2023/CVE-2023-20945.json b/exploits/2023/CVE-2023-20945.json new file mode 100644 index 0000000..7a527e5 --- /dev/null +++ b/exploits/2023/CVE-2023-20945.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2023-20945", + "full_name": "Ailenchick/CVE-2023-20945", + "html_url": "https://github.com/Ailenchick/CVE-2023-20945", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-07-05T15:03:40Z" + } +] \ No newline at end of file diff --git a/exploits/2023/CVE-2023-20963.json b/exploits/2023/CVE-2023-20963.json new file mode 100644 index 0000000..dd71317 --- /dev/null +++ b/exploits/2023/CVE-2023-20963.json @@ -0,0 +1,20 @@ +[ + { + "name": "CVE-2023-20963", + "full_name": "Ailenchick/CVE-2023-20963", + "html_url": "https://github.com/Ailenchick/CVE-2023-20963", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-07-05T15:02:07Z" + }, + { + "name": "frameworks_base_AOSP10_r33_CVE-2023-20963", + "full_name": "Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20963", + "html_url": "https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20963", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-10-20T09:11:00Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-10441.json b/exploits/2024/CVE-2024-10441.json new file mode 100644 index 0000000..04df7a9 --- /dev/null +++ b/exploits/2024/CVE-2024-10441.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-10441", + "full_name": "hazzzein/CVE-2024-10441", + "html_url": "https://github.com/hazzzein/CVE-2024-10441", + "description": null, + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-04-01T08:27:24Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-25227.json b/exploits/2024/CVE-2024-25227.json new file mode 100644 index 0000000..046537d --- /dev/null +++ b/exploits/2024/CVE-2024-25227.json @@ -0,0 +1,20 @@ +[ + { + "name": "ABO.CMS-Login-SQLi-CVE-2024-25227", + "full_name": "thetrueartist/ABO.CMS-Login-SQLi-CVE-2024-25227", + "html_url": "https://github.com/thetrueartist/ABO.CMS-Login-SQLi-CVE-2024-25227", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-02-23T16:46:54Z" + }, + { + "name": "ABO.CMS-EXPLOIT-Unauthenticated-Login-Bypass-CVE-2024-25227", + "full_name": "thetrueartist/ABO.CMS-EXPLOIT-Unauthenticated-Login-Bypass-CVE-2024-25227", + "html_url": "https://github.com/thetrueartist/ABO.CMS-EXPLOIT-Unauthenticated-Login-Bypass-CVE-2024-25227", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-03-13T17:58:41Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-25291.json b/exploits/2024/CVE-2024-25291.json new file mode 100644 index 0000000..2470816 --- /dev/null +++ b/exploits/2024/CVE-2024-25291.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-25291", + "full_name": "EQSTLab/CVE-2024-25291", + "html_url": "https://github.com/EQSTLab/CVE-2024-25291", + "description": "deskfiler 1.2.3 Open Redirect exploit", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-09-06T06:15:35Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-25292.json b/exploits/2024/CVE-2024-25292.json new file mode 100644 index 0000000..7f249d0 --- /dev/null +++ b/exploits/2024/CVE-2024-25292.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-25292", + "full_name": "EQSTLab/CVE-2024-25292", + "html_url": "https://github.com/EQSTLab/CVE-2024-25292", + "description": "XXE to RCE in RenderTune v1.1.4 exploit", + "stargazers_count": 1, + "forks_count": 2, + "created_at": "2024-09-06T06:16:29Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-25466.json b/exploits/2024/CVE-2024-25466.json new file mode 100644 index 0000000..c584dcd --- /dev/null +++ b/exploits/2024/CVE-2024-25466.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-25466", + "full_name": "FixedOctocat/CVE-2024-25466", + "html_url": "https://github.com/FixedOctocat/CVE-2024-25466", + "description": "Description for CVE-2024-25466", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-02-15T07:47:14Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-25832.json b/exploits/2024/CVE-2024-25832.json new file mode 100644 index 0000000..8af519f --- /dev/null +++ b/exploits/2024/CVE-2024-25832.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-25832-PoC", + "full_name": "0xNslabs/CVE-2024-25832-PoC", + "html_url": "https://github.com/0xNslabs/CVE-2024-25832-PoC", + "description": "PoC Script for CVE-2024-25832: Exploit chain reverse shell, information disclosure (root password leak) + unrestricted file upload in DataCube3", + "stargazers_count": 3, + "forks_count": 1, + "created_at": "2024-03-06T04:11:59Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2783.json b/exploits/2025/CVE-2025-2783.json index b8243eb..58901b1 100644 --- a/exploits/2025/CVE-2025-2783.json +++ b/exploits/2025/CVE-2025-2783.json @@ -7,5 +7,14 @@ "stargazers_count": 1, "forks_count": 0, "created_at": "2025-03-28T20:33:42Z" + }, + { + "name": "CVE-2025-2783", + "full_name": "Alchemist3dot14/CVE-2025-2783", + "html_url": "https://github.com/Alchemist3dot14/CVE-2025-2783", + "description": "Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and logging. Safe for red team demos, detection engineering, and educational use.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-06T03:49:01Z" } ] \ No newline at end of file