From 2ebe31c703b98b7f9b6b7effaf7f557aec26dd38 Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Fri, 28 Mar 2025 14:21:12 +0000 Subject: [PATCH] Update recent feed data --- exploits/2015/CVE-2015-1701.json | 29 +++++++++++++++++++++++++++++ exploits/2015/CVE-2015-4495.json | 11 +++++++++++ exploits/2016/CVE-2016-9079.json | 29 +++++++++++++++++++++++++++++ exploits/2022/CVE-2022-4546.json | 11 +++++++++++ exploits/2022/CVE-2022-4551.json | 11 +++++++++++ exploits/2024/CVE-2024-1346.json | 11 +++++++++++ exploits/2024/CVE-2024-44133.json | 11 +++++++++++ exploits/2025/CVE-2025-2679.json | 20 ++++++++++++++++++++ 8 files changed, 133 insertions(+) create mode 100644 exploits/2015/CVE-2015-1701.json create mode 100644 exploits/2015/CVE-2015-4495.json create mode 100644 exploits/2016/CVE-2016-9079.json create mode 100644 exploits/2022/CVE-2022-4546.json create mode 100644 exploits/2022/CVE-2022-4551.json create mode 100644 exploits/2024/CVE-2024-1346.json create mode 100644 exploits/2024/CVE-2024-44133.json create mode 100644 exploits/2025/CVE-2025-2679.json diff --git a/exploits/2015/CVE-2015-1701.json b/exploits/2015/CVE-2015-1701.json new file mode 100644 index 0000000..5a7ecea --- /dev/null +++ b/exploits/2015/CVE-2015-1701.json @@ -0,0 +1,29 @@ +[ + { + "name": "CVE-2015-1701", + "full_name": "hfiref0x/CVE-2015-1701", + "html_url": "https://github.com/hfiref0x/CVE-2015-1701", + "description": "Win32k LPE vulnerability used in APT attack", + "stargazers_count": 287, + "forks_count": 176, + "created_at": "2015-05-12T18:04:48Z" + }, + { + "name": "CVE-2015-1701", + "full_name": "Anonymous-Family/CVE-2015-1701", + "html_url": "https://github.com/Anonymous-Family/CVE-2015-1701", + "description": "Unspecified vulnerability in Microsoft Windows before 8 allows local users to gain privileges via unknown vectors, as exploited in the wild in April 2015 (Base Score: 7.2 HIGH) Current Description Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka \"Win32k Elevation of Privilege Vulnerability ", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2022-03-21T06:26:21Z" + }, + { + "name": "CVE-2015-1701-download", + "full_name": "Anonymous-Family/CVE-2015-1701-download", + "html_url": "https://github.com/Anonymous-Family/CVE-2015-1701-download", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2022-03-21T06:39:18Z" + } +] \ No newline at end of file diff --git a/exploits/2015/CVE-2015-4495.json b/exploits/2015/CVE-2015-4495.json new file mode 100644 index 0000000..6fc3c12 --- /dev/null +++ b/exploits/2015/CVE-2015-4495.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2015-4495", + "full_name": "vincd/CVE-2015-4495", + "html_url": "https://github.com/vincd/CVE-2015-4495", + "description": "Exploit for CVE-2015-4495 / mfsa2015-78", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2015-08-10T22:46:46Z" + } +] \ No newline at end of file diff --git a/exploits/2016/CVE-2016-9079.json b/exploits/2016/CVE-2016-9079.json new file mode 100644 index 0000000..5c916c0 --- /dev/null +++ b/exploits/2016/CVE-2016-9079.json @@ -0,0 +1,29 @@ +[ + { + "name": "CVE-2016-9079", + "full_name": "dangokyo/CVE-2016-9079", + "html_url": "https://github.com/dangokyo/CVE-2016-9079", + "description": "A demo exploit of CVE-2016-9079 on Ubuntu x64", + "stargazers_count": 7, + "forks_count": 1, + "created_at": "2018-07-29T12:55:27Z" + }, + { + "name": "CVE-2016-9079", + "full_name": "LakshmiDesai/CVE-2016-9079", + "html_url": "https://github.com/LakshmiDesai/CVE-2016-9079", + "description": "CVE-2016-9079 exploit code as it appeared on https://lists.torproject.org/pipermail/tor-talk/2016-November/042639.html", + "stargazers_count": 1, + "forks_count": 2, + "created_at": "2017-02-08T07:41:37Z" + }, + { + "name": "Firefox-CVE-2016-9079", + "full_name": "Tau-hub/Firefox-CVE-2016-9079", + "html_url": "https://github.com/Tau-hub/Firefox-CVE-2016-9079", + "description": null, + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2021-10-08T21:44:13Z" + } +] \ No newline at end of file diff --git a/exploits/2022/CVE-2022-4546.json b/exploits/2022/CVE-2022-4546.json new file mode 100644 index 0000000..fa3faa0 --- /dev/null +++ b/exploits/2022/CVE-2022-4546.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2022-45460", + "full_name": "born0monday/CVE-2022-45460", + "html_url": "https://github.com/born0monday/CVE-2022-45460", + "description": "Proof of Concept for CVE-2022-45460", + "stargazers_count": 4, + "forks_count": 2, + "created_at": "2025-01-30T16:16:01Z" + } +] \ No newline at end of file diff --git a/exploits/2022/CVE-2022-4551.json b/exploits/2022/CVE-2022-4551.json new file mode 100644 index 0000000..888faad --- /dev/null +++ b/exploits/2022/CVE-2022-4551.json @@ -0,0 +1,11 @@ +[ + { + "name": "cve-2022-45511", + "full_name": "kinderscsaa/cve-2022-45511", + "html_url": "https://github.com/kinderscsaa/cve-2022-45511", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2022-12-21T14:06:20Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-1346.json b/exploits/2024/CVE-2024-1346.json new file mode 100644 index 0000000..398cf0b --- /dev/null +++ b/exploits/2024/CVE-2024-1346.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-1346", + "full_name": "PeterGabaldon/CVE-2024-1346", + "html_url": "https://github.com/PeterGabaldon/CVE-2024-1346", + "description": "Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2024-02-25T11:51:03Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-44133.json b/exploits/2024/CVE-2024-44133.json new file mode 100644 index 0000000..70a224e --- /dev/null +++ b/exploits/2024/CVE-2024-44133.json @@ -0,0 +1,11 @@ +[ + { + "name": "prevent_cve_2024_44133", + "full_name": "Ununp3ntium115/prevent_cve_2024_44133", + "html_url": "https://github.com/Ununp3ntium115/prevent_cve_2024_44133", + "description": "prevent_cve_2024_44133", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-11-09T21:30:04Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2679.json b/exploits/2025/CVE-2025-2679.json new file mode 100644 index 0000000..4397d70 --- /dev/null +++ b/exploits/2025/CVE-2025-2679.json @@ -0,0 +1,20 @@ +[ + { + "name": "CVE-2025-26794", + "full_name": "OscarBataille/CVE-2025-26794", + "html_url": "https://github.com/OscarBataille/CVE-2025-26794", + "description": "CVE-2025-26794: Blind SQL injection in Exim 4.98 (SQLite DBM)- exploit writeup", + "stargazers_count": 7, + "forks_count": 0, + "created_at": "2025-02-22T14:14:59Z" + }, + { + "name": "CVE-2025-26794-Exim-Mail-SQLi", + "full_name": "ishwardeepp/CVE-2025-26794-Exim-Mail-SQLi", + "html_url": "https://github.com/ishwardeepp/CVE-2025-26794-Exim-Mail-SQLi", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-05T07:34:50Z" + } +] \ No newline at end of file