Update recent feed data

This commit is contained in:
Brendan McDevitt 2025-04-05 01:12:10 +00:00
parent 57d164a8e1
commit 31b077c889
10 changed files with 230 additions and 88 deletions

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2022-47130",
"full_name": "OpenXP-Research/CVE-2022-47130",
"html_url": "https://github.com/OpenXP-Research/CVE-2022-47130",
"description": "Academy LMS <= 5.10 CSRF",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-09-19T14:14:14Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2022-47131",
"full_name": "OpenXP-Research/CVE-2022-47131",
"html_url": "https://github.com/OpenXP-Research/CVE-2022-47131",
"description": "Academy LMS <= 5.10 CSRF / XSS",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-09-19T14:12:43Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2024-0757-Exploit",
"full_name": "hunThubSpace/CVE-2024-0757-Exploit",
"html_url": "https://github.com/hunThubSpace/CVE-2024-0757-Exploit",
"description": "A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE)",
"stargazers_count": 8,
"forks_count": 2,
"created_at": "2024-06-17T07:46:21Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "Detect-CVE-2024-0762",
"full_name": "tadash10/Detect-CVE-2024-0762",
"html_url": "https://github.com/tadash10/Detect-CVE-2024-0762",
"description": "Detecting vulnerabilities like CVE-2024-0762, particularly in UEFI firmware, is quite challenging due to the low-level nature ",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-09-05T03:25:58Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2024-21733",
"full_name": "LtmThink/CVE-2024-21733",
"html_url": "https://github.com/LtmThink/CVE-2024-21733",
"description": "一个验证对CVE-2024-21733",
"stargazers_count": 25,
"forks_count": 14,
"created_at": "2024-08-15T09:47:32Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2024-3552-Poc",
"full_name": "truonghuuphuc/CVE-2024-3552-Poc",
"html_url": "https://github.com/truonghuuphuc/CVE-2024-3552-Poc",
"description": "CVE-2024-3552 Web Directory Free <= 1.6.9 - Unauthenticated SQL Injection",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2024-05-27T15:36:24Z"
}
]

View file

@ -1,28 +1,28 @@
[
{
"name": "ingressNightmare-CVE-2025-1974-exps",
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 mirror UID injection -- all available",
"stargazers_count": 60,
"forks_count": 9,
"created_at": "2025-03-26T06:43:36Z"
},
{
"name": "CVE-2025-1974",
"full_name": "yoshino-s/CVE-2025-1974",
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
"description": null,
"stargazers_count": 38,
"forks_count": 9,
"stargazers_count": 43,
"forks_count": 10,
"created_at": "2025-03-25T13:23:01Z"
},
{
"name": "ingressNightmare-CVE-2025-1974-exps",
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-1974 https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities#how-did-we-discover-ingressnightmare-24 ",
"stargazers_count": 32,
"forks_count": 5,
"created_at": "2025-03-26T06:43:36Z"
},
{
"name": "CVE-2025-1974-poc",
"full_name": "hi-unc1e/CVE-2025-1974-poc",
"html_url": "https://github.com/hi-unc1e/CVE-2025-1974-poc",
"description": "PoC of CVE-2025-1974, modified from the world-first PoC~",
"stargazers_count": 2,
"stargazers_count": 3,
"forks_count": 2,
"created_at": "2025-03-26T16:54:37Z"
},
@ -53,6 +53,15 @@
"forks_count": 0,
"created_at": "2025-03-25T18:49:23Z"
},
{
"name": "CVE-2025-1974",
"full_name": "zulloper/CVE-2025-1974",
"html_url": "https://github.com/zulloper/CVE-2025-1974",
"description": "CVE-2025-1974 PoC 코드",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-31T08:31:03Z"
},
{
"name": "POC-IngressNightmare-CVE-2025-1974",
"full_name": "rjhaikal/POC-IngressNightmare-CVE-2025-1974",

View file

@ -13,8 +13,8 @@
"full_name": "0x6rss/CVE-2025-24071_PoC",
"html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC",
"description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File",
"stargazers_count": 200,
"forks_count": 32,
"stargazers_count": 218,
"forks_count": 36,
"created_at": "2025-03-16T20:10:19Z"
},
{
@ -22,7 +22,7 @@
"full_name": "MrAle98/CVE-2025-21333-POC",
"html_url": "https://github.com/MrAle98/CVE-2025-21333-POC",
"description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY",
"stargazers_count": 178,
"stargazers_count": 180,
"forks_count": 31,
"created_at": "2025-02-27T12:36:55Z"
},
@ -31,7 +31,7 @@
"full_name": "ynwarcs/CVE-2025-21298",
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
"description": "Proof of concept & details for CVE-2025-21298",
"stargazers_count": 168,
"stargazers_count": 171,
"forks_count": 45,
"created_at": "2025-01-20T18:16:51Z"
},
@ -40,8 +40,8 @@
"full_name": "ThumpBo/CVE-2025-30208-EXP",
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
"description": "CVE-2025-30208-EXP",
"stargazers_count": 151,
"forks_count": 25,
"stargazers_count": 160,
"forks_count": 31,
"created_at": "2025-03-26T15:42:31Z"
},
{
@ -49,8 +49,8 @@
"full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC",
"html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC",
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
"stargazers_count": 125,
"forks_count": 31,
"stargazers_count": 127,
"forks_count": 32,
"created_at": "2025-01-22T14:40:34Z"
},
{
@ -58,7 +58,7 @@
"full_name": "ZeroMemoryEx/CVE-2025-26125",
"html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125",
"description": "(0day) Local Privilege Escalation in IObit Malware Fighter",
"stargazers_count": 124,
"stargazers_count": 126,
"forks_count": 18,
"created_at": "2025-01-08T05:50:07Z"
},
@ -67,8 +67,8 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 87,
"forks_count": 26,
"stargazers_count": 95,
"forks_count": 28,
"created_at": "2025-03-14T07:36:58Z"
},
{
@ -76,7 +76,7 @@
"full_name": "iSee857/CVE-2025-24813-PoC",
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
"stargazers_count": 73,
"stargazers_count": 75,
"forks_count": 23,
"created_at": "2025-03-13T10:00:03Z"
},
@ -89,6 +89,15 @@
"forks_count": 18,
"created_at": "2025-02-17T08:59:22Z"
},
{
"name": "CVE-2025-29927",
"full_name": "aydinnyunus/CVE-2025-29927",
"html_url": "https://github.com/aydinnyunus/CVE-2025-29927",
"description": "CVE-2025-29927 Proof of Concept",
"stargazers_count": 68,
"forks_count": 24,
"created_at": "2025-03-23T12:13:35Z"
},
{
"name": "CVE_2019_2025_EXP",
"full_name": "jltxgcy/CVE_2019_2025_EXP",
@ -99,13 +108,13 @@
"created_at": "2019-09-30T02:40:21Z"
},
{
"name": "CVE-2025-29927",
"full_name": "aydinnyunus/CVE-2025-29927",
"html_url": "https://github.com/aydinnyunus/CVE-2025-29927",
"description": "CVE-2025-29927 Proof of Concept",
"stargazers_count": 54,
"forks_count": 23,
"created_at": "2025-03-23T12:13:35Z"
"name": "ingressNightmare-CVE-2025-1974-exps",
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 mirror UID injection -- all available",
"stargazers_count": 60,
"forks_count": 9,
"created_at": "2025-03-26T06:43:36Z"
},
{
"name": "CVE-2025-0282-Ivanti-exploit",
@ -116,6 +125,15 @@
"forks_count": 13,
"created_at": "2025-01-11T02:06:51Z"
},
{
"name": "CVE-2025-1974",
"full_name": "yoshino-s/CVE-2025-1974",
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
"description": null,
"stargazers_count": 43,
"forks_count": 10,
"created_at": "2025-03-25T13:23:01Z"
},
{
"name": "CVE-2025-24118",
"full_name": "jprx/CVE-2025-24118",
@ -125,24 +143,24 @@
"forks_count": 5,
"created_at": "2025-01-30T00:10:44Z"
},
{
"name": "CVE-2025-1974",
"full_name": "yoshino-s/CVE-2025-1974",
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
"description": null,
"stargazers_count": 38,
"forks_count": 9,
"created_at": "2025-03-25T13:23:01Z"
},
{
"name": "CVE-2025-0282",
"full_name": "sfewer-r7/CVE-2025-0282",
"html_url": "https://github.com/sfewer-r7/CVE-2025-0282",
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
"stargazers_count": 35,
"stargazers_count": 36,
"forks_count": 12,
"created_at": "2025-01-16T14:45:53Z"
},
{
"name": "CVE-2025-24016",
"full_name": "0xjessie21/CVE-2025-24016",
"html_url": "https://github.com/0xjessie21/CVE-2025-24016",
"description": "CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)",
"stargazers_count": 35,
"forks_count": 6,
"created_at": "2025-02-16T11:01:12Z"
},
{
"name": "CVE-2025-23369",
"full_name": "hakivvi/CVE-2025-23369",
@ -152,30 +170,12 @@
"forks_count": 3,
"created_at": "2025-02-08T18:13:04Z"
},
{
"name": "CVE-2025-24016",
"full_name": "0xjessie21/CVE-2025-24016",
"html_url": "https://github.com/0xjessie21/CVE-2025-24016",
"description": "CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)",
"stargazers_count": 33,
"forks_count": 6,
"created_at": "2025-02-16T11:01:12Z"
},
{
"name": "ingressNightmare-CVE-2025-1974-exps",
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-1974 https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities#how-did-we-discover-ingressnightmare-24 ",
"stargazers_count": 32,
"forks_count": 5,
"created_at": "2025-03-26T06:43:36Z"
},
{
"name": "CVE-2025-24016",
"full_name": "MuhammadWaseem29/CVE-2025-24016",
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016",
"description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ",
"stargazers_count": 31,
"stargazers_count": 32,
"forks_count": 5,
"created_at": "2025-02-20T23:31:03Z"
},
@ -184,10 +184,28 @@
"full_name": "ifpdz/CVE-2025-24104",
"html_url": "https://github.com/ifpdz/CVE-2025-24104",
"description": null,
"stargazers_count": 31,
"stargazers_count": 32,
"forks_count": 4,
"created_at": "2025-01-24T10:41:12Z"
},
{
"name": "CVE-2025-30208",
"full_name": "xuemian168/CVE-2025-30208",
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
"description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation",
"stargazers_count": 31,
"forks_count": 1,
"created_at": "2025-03-26T10:26:12Z"
},
{
"name": "CVE-2025-0401",
"full_name": "CyberSecurityUP/CVE-2025-0401",
"html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401",
"description": "Privilege Escalation using Passwd",
"stargazers_count": 28,
"forks_count": 5,
"created_at": "2025-04-01T14:23:43Z"
},
{
"name": "CVE-2025-27636-Apache-Camel-PoC",
"full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC",
@ -206,15 +224,6 @@
"forks_count": 19,
"created_at": "2025-02-13T06:39:25Z"
},
{
"name": "CVE-2025-30208",
"full_name": "xuemian168/CVE-2025-30208",
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
"description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation",
"stargazers_count": 26,
"forks_count": 1,
"created_at": "2025-03-26T10:26:12Z"
},
{
"name": "CVE-2018-20250",
"full_name": "QAX-A-Team/CVE-2018-20250",
@ -224,6 +233,15 @@
"forks_count": 14,
"created_at": "2019-02-22T06:47:01Z"
},
{
"name": "CVE-2025-0282",
"full_name": "watchtowrlabs/CVE-2025-0282",
"html_url": "https://github.com/watchtowrlabs/CVE-2025-0282",
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
"stargazers_count": 23,
"forks_count": 9,
"created_at": "2025-01-15T18:27:12Z"
},
{
"name": "CVE-2025-1094-Exploit",
"full_name": "soltanali0/CVE-2025-1094-Exploit",
@ -233,15 +251,6 @@
"forks_count": 5,
"created_at": "2025-02-27T11:08:10Z"
},
{
"name": "CVE-2025-0282",
"full_name": "watchtowrlabs/CVE-2025-0282",
"html_url": "https://github.com/watchtowrlabs/CVE-2025-0282",
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
"stargazers_count": 22,
"forks_count": 9,
"created_at": "2025-01-15T18:27:12Z"
},
{
"name": "CVE-2018-20250-WinRAR-ACE",
"full_name": "easis/CVE-2018-20250-WinRAR-ACE",
@ -259,14 +268,5 @@
"stargazers_count": 20,
"forks_count": 5,
"created_at": "2025-02-23T18:36:11Z"
},
{
"name": "CVE-2025-1302",
"full_name": "EQSTLab/CVE-2025-1302",
"html_url": "https://github.com/EQSTLab/CVE-2025-1302",
"description": "JSONPath-plus Remote Code Execution",
"stargazers_count": 14,
"forks_count": 1,
"created_at": "2025-02-25T08:36:28Z"
}
]

View file

@ -0,0 +1,38 @@
[
{
"name": "CVE-2025-26466",
"full_name": "jhonnybonny/CVE-2025-26466",
"html_url": "https://github.com/jhonnybonny/CVE-2025-26466",
"description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)",
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2025-02-18T21:21:01Z"
},
{
"name": "CVE-2025-26466",
"full_name": "rxerium/CVE-2025-26466",
"html_url": "https://github.com/rxerium/CVE-2025-26466",
"description": " The OpenSSH client and server are vulnerable to a pre-authentication DoS attack between versions 9.5p1 to 9.9p1 (inclusive) that causes memory and CPU consumption",
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2025-02-18T16:59:09Z"
},
{
"name": "CVE-2025-26465",
"full_name": "rxerium/CVE-2025-26465",
"html_url": "https://github.com/rxerium/CVE-2025-26465",
"description": "MitM attack allowing a malicious interloper to impersonate a legitimate server when a client attempts to connect to it",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-02-18T16:53:27Z"
},
{
"name": "patch-manual-CVE-2025-26465-e-CVE-2025-26466",
"full_name": "dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466",
"html_url": "https://github.com/dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466",
"description": "Patch Manual para a correção das CVE-2025-26465-e-CVE-2025-26466, para sistemas sem update do OpenSSH",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-02-21T09:19:54Z"
}
]

View file

@ -0,0 +1,29 @@
[
{
"name": "CVE-2025-26466",
"full_name": "rxerium/CVE-2025-26466",
"html_url": "https://github.com/rxerium/CVE-2025-26466",
"description": " The OpenSSH client and server are vulnerable to a pre-authentication DoS attack between versions 9.5p1 to 9.9p1 (inclusive) that causes memory and CPU consumption",
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2025-02-18T16:59:09Z"
},
{
"name": "CVE-2025-26466",
"full_name": "jhonnybonny/CVE-2025-26466",
"html_url": "https://github.com/jhonnybonny/CVE-2025-26466",
"description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)",
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2025-02-18T21:21:01Z"
},
{
"name": "patch-manual-CVE-2025-26465-e-CVE-2025-26466",
"full_name": "dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466",
"html_url": "https://github.com/dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466",
"description": "Patch Manual para a correção das CVE-2025-26465-e-CVE-2025-26466, para sistemas sem update do OpenSSH",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-02-21T09:19:54Z"
}
]