diff --git a/exploits/2023/CVE-2023-20933.json b/exploits/2023/CVE-2023-20933.json index dc62881..add8a8e 100644 --- a/exploits/2023/CVE-2023-20933.json +++ b/exploits/2023/CVE-2023-20933.json @@ -7,14 +7,5 @@ "stargazers_count": 0, "forks_count": 0, "created_at": "2023-04-03T06:41:47Z" - }, - { - "name": "platform_frameworks_av_AOSP10_r33_CVE-2023-20933", - "full_name": "hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933", - "html_url": "https://github.com/hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933", - "description": null, - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2023-04-05T06:04:42Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2479.json b/exploits/2025/CVE-2025-2479.json index 3b7154a..63a260d 100644 --- a/exploits/2025/CVE-2025-2479.json +++ b/exploits/2025/CVE-2025-2479.json @@ -5,7 +5,7 @@ "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799", "description": null, "stargazers_count": 24, - "forks_count": 6, + "forks_count": 7, "created_at": "2025-04-03T16:55:11Z" }, { @@ -13,8 +13,8 @@ "full_name": "MatheuZSecurity/Exploit-CVE-2025-24799", "html_url": "https://github.com/MatheuZSecurity/Exploit-CVE-2025-24799", "description": "CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection", - "stargazers_count": 15, - "forks_count": 12, + "stargazers_count": 21, + "forks_count": 15, "created_at": "2025-04-15T04:57:39Z" }, { @@ -26,6 +26,15 @@ "forks_count": 0, "created_at": "2025-04-16T19:04:44Z" }, + { + "name": "CVE-2025-24799", + "full_name": "galletitaconpate/CVE-2025-24799", + "html_url": "https://github.com/galletitaconpate/CVE-2025-24799", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-05-22T20:49:43Z" + }, { "name": "CVE-2025-24799-PoC", "full_name": "realcodeb0ss/CVE-2025-24799-PoC", diff --git a/exploits/2025/CVE-2025-2480.json b/exploits/2025/CVE-2025-2480.json index a83f5ad..c249940 100644 --- a/exploits/2025/CVE-2025-2480.json +++ b/exploits/2025/CVE-2025-2480.json @@ -1,4 +1,13 @@ [ + { + "name": "CVE-2025-24801", + "full_name": "fatkz/CVE-2025-24801", + "html_url": "https://github.com/fatkz/CVE-2025-24801", + "description": "CVE-2025-24801 Exploit ", + "stargazers_count": 2, + "forks_count": 1, + "created_at": "2025-05-05T23:22:18Z" + }, { "name": "CVE-2025-24801", "full_name": "r1beirin/CVE-2025-24801", @@ -7,14 +16,5 @@ "stargazers_count": 0, "forks_count": 0, "created_at": "2025-04-19T01:59:30Z" - }, - { - "name": "CVE-2025-24801", - "full_name": "fatkz/CVE-2025-24801", - "html_url": "https://github.com/fatkz/CVE-2025-24801", - "description": "CVE-2025-24801 Exploit ", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-05-05T23:22:18Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2481.json b/exploits/2025/CVE-2025-2481.json index 0875330..c3ff686 100644 --- a/exploits/2025/CVE-2025-2481.json +++ b/exploits/2025/CVE-2025-2481.json @@ -62,6 +62,15 @@ "forks_count": 2, "created_at": "2025-05-25T13:34:18Z" }, + { + "name": "CVE-2025-24813-Scanner", + "full_name": "Mattb709/CVE-2025-24813-Scanner", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", + "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", + "stargazers_count": 5, + "forks_count": 0, + "created_at": "2025-04-12T19:12:39Z" + }, { "name": "CVE-2025-24813-Exploit", "full_name": "msadeghkarimi/CVE-2025-24813-Exploit", @@ -90,13 +99,13 @@ "created_at": "2025-04-05T09:07:13Z" }, { - "name": "CVE-2025-24813-Scanner", - "full_name": "Mattb709/CVE-2025-24813-Scanner", - "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", - "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", - "stargazers_count": 4, + "name": "CVE-2025-24813-vulhub", + "full_name": "Erosion2020/CVE-2025-24813-vulhub", + "html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub", + "description": "CVE-2025-24813的vulhub环境的POC脚本", + "stargazers_count": 3, "forks_count": 0, - "created_at": "2025-04-12T19:12:39Z" + "created_at": "2025-04-18T11:03:33Z" }, { "name": "CVE-2025-24813_POC", @@ -125,15 +134,6 @@ "forks_count": 0, "created_at": "2025-03-24T17:47:10Z" }, - { - "name": "CVE-2025-24813-vulhub", - "full_name": "Erosion2020/CVE-2025-24813-vulhub", - "html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub", - "description": "CVE-2025-24813的vulhub环境的POC脚本", - "stargazers_count": 2, - "forks_count": 0, - "created_at": "2025-04-18T11:03:33Z" - }, { "name": "CVE-2025-24813-Scanner", "full_name": "issamjr/CVE-2025-24813-Scanner", diff --git a/exploits/2025/CVE-2025-24813.json b/exploits/2025/CVE-2025-24813.json index 49dbe32..1df24a7 100644 --- a/exploits/2025/CVE-2025-24813.json +++ b/exploits/2025/CVE-2025-24813.json @@ -62,6 +62,15 @@ "forks_count": 2, "created_at": "2025-05-25T13:34:18Z" }, + { + "name": "CVE-2025-24813-Scanner", + "full_name": "Mattb709/CVE-2025-24813-Scanner", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", + "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", + "stargazers_count": 5, + "forks_count": 0, + "created_at": "2025-04-12T19:12:39Z" + }, { "name": "CVE-2025-24813-Exploit", "full_name": "msadeghkarimi/CVE-2025-24813-Exploit", @@ -90,13 +99,13 @@ "created_at": "2025-04-05T09:07:13Z" }, { - "name": "CVE-2025-24813-Scanner", - "full_name": "Mattb709/CVE-2025-24813-Scanner", - "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", - "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", - "stargazers_count": 4, + "name": "CVE-2025-24813-vulhub", + "full_name": "Erosion2020/CVE-2025-24813-vulhub", + "html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub", + "description": "CVE-2025-24813的vulhub环境的POC脚本", + "stargazers_count": 3, "forks_count": 0, - "created_at": "2025-04-12T19:12:39Z" + "created_at": "2025-04-18T11:03:33Z" }, { "name": "CVE-2025-24813_POC", @@ -125,15 +134,6 @@ "forks_count": 0, "created_at": "2025-03-24T17:47:10Z" }, - { - "name": "CVE-2025-24813-vulhub", - "full_name": "Erosion2020/CVE-2025-24813-vulhub", - "html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub", - "description": "CVE-2025-24813的vulhub环境的POC脚本", - "stargazers_count": 2, - "forks_count": 0, - "created_at": "2025-04-18T11:03:33Z" - }, { "name": "CVE-2025-24813-POC", "full_name": "Alaatk/CVE-2025-24813-POC", diff --git a/exploits/2025/CVE-2025-2835.json b/exploits/2025/CVE-2025-2835.json new file mode 100644 index 0000000..69159a6 --- /dev/null +++ b/exploits/2025/CVE-2025-2835.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2025-28355", + "full_name": "abbisQQ/CVE-2025-28355", + "html_url": "https://github.com/abbisQQ/CVE-2025-28355", + "description": "It was identified that the https://github.com/Volmarg/personal-management-system application is vulnerable to CSRF attacks.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-18T07:43:41Z" + } +] \ No newline at end of file