Update recent feed data
This commit is contained in:
parent
cff6eaf1f9
commit
2ebe31c703
8 changed files with 133 additions and 0 deletions
29
exploits/2015/CVE-2015-1701.json
Normal file
29
exploits/2015/CVE-2015-1701.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2015-1701",
|
||||
"full_name": "hfiref0x/CVE-2015-1701",
|
||||
"html_url": "https://github.com/hfiref0x/CVE-2015-1701",
|
||||
"description": "Win32k LPE vulnerability used in APT attack",
|
||||
"stargazers_count": 287,
|
||||
"forks_count": 176,
|
||||
"created_at": "2015-05-12T18:04:48Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2015-1701",
|
||||
"full_name": "Anonymous-Family/CVE-2015-1701",
|
||||
"html_url": "https://github.com/Anonymous-Family/CVE-2015-1701",
|
||||
"description": "Unspecified vulnerability in Microsoft Windows before 8 allows local users to gain privileges via unknown vectors, as exploited in the wild in April 2015 (Base Score: 7.2 HIGH) Current Description Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka \"Win32k Elevation of Privilege Vulnerability ",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-03-21T06:26:21Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2015-1701-download",
|
||||
"full_name": "Anonymous-Family/CVE-2015-1701-download",
|
||||
"html_url": "https://github.com/Anonymous-Family/CVE-2015-1701-download",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-03-21T06:39:18Z"
|
||||
}
|
||||
]
|
11
exploits/2015/CVE-2015-4495.json
Normal file
11
exploits/2015/CVE-2015-4495.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2015-4495",
|
||||
"full_name": "vincd/CVE-2015-4495",
|
||||
"html_url": "https://github.com/vincd/CVE-2015-4495",
|
||||
"description": "Exploit for CVE-2015-4495 / mfsa2015-78",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2015-08-10T22:46:46Z"
|
||||
}
|
||||
]
|
29
exploits/2016/CVE-2016-9079.json
Normal file
29
exploits/2016/CVE-2016-9079.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2016-9079",
|
||||
"full_name": "dangokyo/CVE-2016-9079",
|
||||
"html_url": "https://github.com/dangokyo/CVE-2016-9079",
|
||||
"description": "A demo exploit of CVE-2016-9079 on Ubuntu x64",
|
||||
"stargazers_count": 7,
|
||||
"forks_count": 1,
|
||||
"created_at": "2018-07-29T12:55:27Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2016-9079",
|
||||
"full_name": "LakshmiDesai/CVE-2016-9079",
|
||||
"html_url": "https://github.com/LakshmiDesai/CVE-2016-9079",
|
||||
"description": "CVE-2016-9079 exploit code as it appeared on https://lists.torproject.org/pipermail/tor-talk/2016-November/042639.html",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 2,
|
||||
"created_at": "2017-02-08T07:41:37Z"
|
||||
},
|
||||
{
|
||||
"name": "Firefox-CVE-2016-9079",
|
||||
"full_name": "Tau-hub/Firefox-CVE-2016-9079",
|
||||
"html_url": "https://github.com/Tau-hub/Firefox-CVE-2016-9079",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2021-10-08T21:44:13Z"
|
||||
}
|
||||
]
|
11
exploits/2022/CVE-2022-4546.json
Normal file
11
exploits/2022/CVE-2022-4546.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2022-45460",
|
||||
"full_name": "born0monday/CVE-2022-45460",
|
||||
"html_url": "https://github.com/born0monday/CVE-2022-45460",
|
||||
"description": "Proof of Concept for CVE-2022-45460",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 2,
|
||||
"created_at": "2025-01-30T16:16:01Z"
|
||||
}
|
||||
]
|
11
exploits/2022/CVE-2022-4551.json
Normal file
11
exploits/2022/CVE-2022-4551.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "cve-2022-45511",
|
||||
"full_name": "kinderscsaa/cve-2022-45511",
|
||||
"html_url": "https://github.com/kinderscsaa/cve-2022-45511",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-12-21T14:06:20Z"
|
||||
}
|
||||
]
|
11
exploits/2024/CVE-2024-1346.json
Normal file
11
exploits/2024/CVE-2024-1346.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-1346",
|
||||
"full_name": "PeterGabaldon/CVE-2024-1346",
|
||||
"html_url": "https://github.com/PeterGabaldon/CVE-2024-1346",
|
||||
"description": "Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-02-25T11:51:03Z"
|
||||
}
|
||||
]
|
11
exploits/2024/CVE-2024-44133.json
Normal file
11
exploits/2024/CVE-2024-44133.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "prevent_cve_2024_44133",
|
||||
"full_name": "Ununp3ntium115/prevent_cve_2024_44133",
|
||||
"html_url": "https://github.com/Ununp3ntium115/prevent_cve_2024_44133",
|
||||
"description": "prevent_cve_2024_44133",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-11-09T21:30:04Z"
|
||||
}
|
||||
]
|
20
exploits/2025/CVE-2025-2679.json
Normal file
20
exploits/2025/CVE-2025-2679.json
Normal file
|
@ -0,0 +1,20 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2025-26794",
|
||||
"full_name": "OscarBataille/CVE-2025-26794",
|
||||
"html_url": "https://github.com/OscarBataille/CVE-2025-26794",
|
||||
"description": "CVE-2025-26794: Blind SQL injection in Exim 4.98 (SQLite DBM)- exploit writeup",
|
||||
"stargazers_count": 7,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-02-22T14:14:59Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-26794-Exim-Mail-SQLi",
|
||||
"full_name": "ishwardeepp/CVE-2025-26794-Exim-Mail-SQLi",
|
||||
"html_url": "https://github.com/ishwardeepp/CVE-2025-26794-Exim-Mail-SQLi",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-05T07:34:50Z"
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue