From 31b077c88922717c9fb714299332f1f1a91ea8e7 Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Sat, 5 Apr 2025 01:12:10 +0000 Subject: [PATCH] Update recent feed data --- exploits/2022/CVE-2022-47130.json | 11 +++ exploits/2022/CVE-2022-47131.json | 11 +++ exploits/2024/CVE-2024-0757.json | 11 +++ exploits/2024/CVE-2024-0762.json | 11 +++ exploits/2024/CVE-2024-2173.json | 11 +++ exploits/2024/CVE-2024-3552.json | 11 +++ exploits/2025/CVE-2025-1974.json | 33 ++++--- exploits/2025/CVE-2025-2025.json | 152 +++++++++++++++--------------- exploits/2025/CVE-2025-2646.json | 38 ++++++++ exploits/2025/CVE-2025-26466.json | 29 ++++++ 10 files changed, 230 insertions(+), 88 deletions(-) create mode 100644 exploits/2022/CVE-2022-47130.json create mode 100644 exploits/2022/CVE-2022-47131.json create mode 100644 exploits/2024/CVE-2024-0757.json create mode 100644 exploits/2024/CVE-2024-0762.json create mode 100644 exploits/2024/CVE-2024-2173.json create mode 100644 exploits/2024/CVE-2024-3552.json create mode 100644 exploits/2025/CVE-2025-2646.json create mode 100644 exploits/2025/CVE-2025-26466.json diff --git a/exploits/2022/CVE-2022-47130.json b/exploits/2022/CVE-2022-47130.json new file mode 100644 index 0000000..6508486 --- /dev/null +++ b/exploits/2022/CVE-2022-47130.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2022-47130", + "full_name": "OpenXP-Research/CVE-2022-47130", + "html_url": "https://github.com/OpenXP-Research/CVE-2022-47130", + "description": "Academy LMS <= 5.10 CSRF", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-09-19T14:14:14Z" + } +] \ No newline at end of file diff --git a/exploits/2022/CVE-2022-47131.json b/exploits/2022/CVE-2022-47131.json new file mode 100644 index 0000000..0ac4796 --- /dev/null +++ b/exploits/2022/CVE-2022-47131.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2022-47131", + "full_name": "OpenXP-Research/CVE-2022-47131", + "html_url": "https://github.com/OpenXP-Research/CVE-2022-47131", + "description": "Academy LMS <= 5.10 CSRF / XSS", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-09-19T14:12:43Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-0757.json b/exploits/2024/CVE-2024-0757.json new file mode 100644 index 0000000..199b7ba --- /dev/null +++ b/exploits/2024/CVE-2024-0757.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-0757-Exploit", + "full_name": "hunThubSpace/CVE-2024-0757-Exploit", + "html_url": "https://github.com/hunThubSpace/CVE-2024-0757-Exploit", + "description": "A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE)", + "stargazers_count": 8, + "forks_count": 2, + "created_at": "2024-06-17T07:46:21Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-0762.json b/exploits/2024/CVE-2024-0762.json new file mode 100644 index 0000000..19b9b67 --- /dev/null +++ b/exploits/2024/CVE-2024-0762.json @@ -0,0 +1,11 @@ +[ + { + "name": "Detect-CVE-2024-0762", + "full_name": "tadash10/Detect-CVE-2024-0762", + "html_url": "https://github.com/tadash10/Detect-CVE-2024-0762", + "description": "Detecting vulnerabilities like CVE-2024-0762, particularly in UEFI firmware, is quite challenging due to the low-level nature ", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-09-05T03:25:58Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-2173.json b/exploits/2024/CVE-2024-2173.json new file mode 100644 index 0000000..747a926 --- /dev/null +++ b/exploits/2024/CVE-2024-2173.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-21733", + "full_name": "LtmThink/CVE-2024-21733", + "html_url": "https://github.com/LtmThink/CVE-2024-21733", + "description": "一个验证对CVE-2024-21733", + "stargazers_count": 25, + "forks_count": 14, + "created_at": "2024-08-15T09:47:32Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-3552.json b/exploits/2024/CVE-2024-3552.json new file mode 100644 index 0000000..495105f --- /dev/null +++ b/exploits/2024/CVE-2024-3552.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-3552-Poc", + "full_name": "truonghuuphuc/CVE-2024-3552-Poc", + "html_url": "https://github.com/truonghuuphuc/CVE-2024-3552-Poc", + "description": "CVE-2024-3552 Web Directory Free <= 1.6.9 - Unauthenticated SQL Injection", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2024-05-27T15:36:24Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-1974.json b/exploits/2025/CVE-2025-1974.json index d60fdb0..edb88a2 100644 --- a/exploits/2025/CVE-2025-1974.json +++ b/exploits/2025/CVE-2025-1974.json @@ -1,28 +1,28 @@ [ + { + "name": "ingressNightmare-CVE-2025-1974-exps", + "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", + "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", + "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available", + "stargazers_count": 60, + "forks_count": 9, + "created_at": "2025-03-26T06:43:36Z" + }, { "name": "CVE-2025-1974", "full_name": "yoshino-s/CVE-2025-1974", "html_url": "https://github.com/yoshino-s/CVE-2025-1974", "description": null, - "stargazers_count": 38, - "forks_count": 9, + "stargazers_count": 43, + "forks_count": 10, "created_at": "2025-03-25T13:23:01Z" }, - { - "name": "ingressNightmare-CVE-2025-1974-exps", - "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", - "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", - "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-1974 https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities#how-did-we-discover-ingressnightmare-24 ", - "stargazers_count": 32, - "forks_count": 5, - "created_at": "2025-03-26T06:43:36Z" - }, { "name": "CVE-2025-1974-poc", "full_name": "hi-unc1e/CVE-2025-1974-poc", "html_url": "https://github.com/hi-unc1e/CVE-2025-1974-poc", "description": "PoC of CVE-2025-1974, modified from the world-first PoC~", - "stargazers_count": 2, + "stargazers_count": 3, "forks_count": 2, "created_at": "2025-03-26T16:54:37Z" }, @@ -53,6 +53,15 @@ "forks_count": 0, "created_at": "2025-03-25T18:49:23Z" }, + { + "name": "CVE-2025-1974", + "full_name": "zulloper/CVE-2025-1974", + "html_url": "https://github.com/zulloper/CVE-2025-1974", + "description": "CVE-2025-1974 PoC 코드", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-31T08:31:03Z" + }, { "name": "POC-IngressNightmare-CVE-2025-1974", "full_name": "rjhaikal/POC-IngressNightmare-CVE-2025-1974", diff --git a/exploits/2025/CVE-2025-2025.json b/exploits/2025/CVE-2025-2025.json index 5c406dc..a6daa52 100644 --- a/exploits/2025/CVE-2025-2025.json +++ b/exploits/2025/CVE-2025-2025.json @@ -13,8 +13,8 @@ "full_name": "0x6rss/CVE-2025-24071_PoC", "html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC", "description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File", - "stargazers_count": 200, - "forks_count": 32, + "stargazers_count": 218, + "forks_count": 36, "created_at": "2025-03-16T20:10:19Z" }, { @@ -22,7 +22,7 @@ "full_name": "MrAle98/CVE-2025-21333-POC", "html_url": "https://github.com/MrAle98/CVE-2025-21333-POC", "description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY", - "stargazers_count": 178, + "stargazers_count": 180, "forks_count": 31, "created_at": "2025-02-27T12:36:55Z" }, @@ -31,7 +31,7 @@ "full_name": "ynwarcs/CVE-2025-21298", "html_url": "https://github.com/ynwarcs/CVE-2025-21298", "description": "Proof of concept & details for CVE-2025-21298", - "stargazers_count": 168, + "stargazers_count": 171, "forks_count": 45, "created_at": "2025-01-20T18:16:51Z" }, @@ -40,8 +40,8 @@ "full_name": "ThumpBo/CVE-2025-30208-EXP", "html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP", "description": "CVE-2025-30208-EXP", - "stargazers_count": 151, - "forks_count": 25, + "stargazers_count": 160, + "forks_count": 31, "created_at": "2025-03-26T15:42:31Z" }, { @@ -49,8 +49,8 @@ "full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC", "html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC", "description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.", - "stargazers_count": 125, - "forks_count": 31, + "stargazers_count": 127, + "forks_count": 32, "created_at": "2025-01-22T14:40:34Z" }, { @@ -58,7 +58,7 @@ "full_name": "ZeroMemoryEx/CVE-2025-26125", "html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125", "description": "(0day) Local Privilege Escalation in IObit Malware Fighter", - "stargazers_count": 124, + "stargazers_count": 126, "forks_count": 18, "created_at": "2025-01-08T05:50:07Z" }, @@ -67,8 +67,8 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 87, - "forks_count": 26, + "stargazers_count": 95, + "forks_count": 28, "created_at": "2025-03-14T07:36:58Z" }, { @@ -76,7 +76,7 @@ "full_name": "iSee857/CVE-2025-24813-PoC", "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", - "stargazers_count": 73, + "stargazers_count": 75, "forks_count": 23, "created_at": "2025-03-13T10:00:03Z" }, @@ -89,6 +89,15 @@ "forks_count": 18, "created_at": "2025-02-17T08:59:22Z" }, + { + "name": "CVE-2025-29927", + "full_name": "aydinnyunus/CVE-2025-29927", + "html_url": "https://github.com/aydinnyunus/CVE-2025-29927", + "description": "CVE-2025-29927 Proof of Concept", + "stargazers_count": 68, + "forks_count": 24, + "created_at": "2025-03-23T12:13:35Z" + }, { "name": "CVE_2019_2025_EXP", "full_name": "jltxgcy/CVE_2019_2025_EXP", @@ -99,13 +108,13 @@ "created_at": "2019-09-30T02:40:21Z" }, { - "name": "CVE-2025-29927", - "full_name": "aydinnyunus/CVE-2025-29927", - "html_url": "https://github.com/aydinnyunus/CVE-2025-29927", - "description": "CVE-2025-29927 Proof of Concept", - "stargazers_count": 54, - "forks_count": 23, - "created_at": "2025-03-23T12:13:35Z" + "name": "ingressNightmare-CVE-2025-1974-exps", + "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", + "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", + "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available", + "stargazers_count": 60, + "forks_count": 9, + "created_at": "2025-03-26T06:43:36Z" }, { "name": "CVE-2025-0282-Ivanti-exploit", @@ -116,6 +125,15 @@ "forks_count": 13, "created_at": "2025-01-11T02:06:51Z" }, + { + "name": "CVE-2025-1974", + "full_name": "yoshino-s/CVE-2025-1974", + "html_url": "https://github.com/yoshino-s/CVE-2025-1974", + "description": null, + "stargazers_count": 43, + "forks_count": 10, + "created_at": "2025-03-25T13:23:01Z" + }, { "name": "CVE-2025-24118", "full_name": "jprx/CVE-2025-24118", @@ -125,24 +143,24 @@ "forks_count": 5, "created_at": "2025-01-30T00:10:44Z" }, - { - "name": "CVE-2025-1974", - "full_name": "yoshino-s/CVE-2025-1974", - "html_url": "https://github.com/yoshino-s/CVE-2025-1974", - "description": null, - "stargazers_count": 38, - "forks_count": 9, - "created_at": "2025-03-25T13:23:01Z" - }, { "name": "CVE-2025-0282", "full_name": "sfewer-r7/CVE-2025-0282", "html_url": "https://github.com/sfewer-r7/CVE-2025-0282", "description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways", - "stargazers_count": 35, + "stargazers_count": 36, "forks_count": 12, "created_at": "2025-01-16T14:45:53Z" }, + { + "name": "CVE-2025-24016", + "full_name": "0xjessie21/CVE-2025-24016", + "html_url": "https://github.com/0xjessie21/CVE-2025-24016", + "description": "CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)", + "stargazers_count": 35, + "forks_count": 6, + "created_at": "2025-02-16T11:01:12Z" + }, { "name": "CVE-2025-23369", "full_name": "hakivvi/CVE-2025-23369", @@ -152,30 +170,12 @@ "forks_count": 3, "created_at": "2025-02-08T18:13:04Z" }, - { - "name": "CVE-2025-24016", - "full_name": "0xjessie21/CVE-2025-24016", - "html_url": "https://github.com/0xjessie21/CVE-2025-24016", - "description": "CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)", - "stargazers_count": 33, - "forks_count": 6, - "created_at": "2025-02-16T11:01:12Z" - }, - { - "name": "ingressNightmare-CVE-2025-1974-exps", - "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", - "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", - "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-1974 https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities#how-did-we-discover-ingressnightmare-24 ", - "stargazers_count": 32, - "forks_count": 5, - "created_at": "2025-03-26T06:43:36Z" - }, { "name": "CVE-2025-24016", "full_name": "MuhammadWaseem29/CVE-2025-24016", "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016", "description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ", - "stargazers_count": 31, + "stargazers_count": 32, "forks_count": 5, "created_at": "2025-02-20T23:31:03Z" }, @@ -184,10 +184,28 @@ "full_name": "ifpdz/CVE-2025-24104", "html_url": "https://github.com/ifpdz/CVE-2025-24104", "description": null, - "stargazers_count": 31, + "stargazers_count": 32, "forks_count": 4, "created_at": "2025-01-24T10:41:12Z" }, + { + "name": "CVE-2025-30208", + "full_name": "xuemian168/CVE-2025-30208", + "html_url": "https://github.com/xuemian168/CVE-2025-30208", + "description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation", + "stargazers_count": 31, + "forks_count": 1, + "created_at": "2025-03-26T10:26:12Z" + }, + { + "name": "CVE-2025-0401", + "full_name": "CyberSecurityUP/CVE-2025-0401", + "html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401", + "description": "Privilege Escalation using Passwd", + "stargazers_count": 28, + "forks_count": 5, + "created_at": "2025-04-01T14:23:43Z" + }, { "name": "CVE-2025-27636-Apache-Camel-PoC", "full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC", @@ -206,15 +224,6 @@ "forks_count": 19, "created_at": "2025-02-13T06:39:25Z" }, - { - "name": "CVE-2025-30208", - "full_name": "xuemian168/CVE-2025-30208", - "html_url": "https://github.com/xuemian168/CVE-2025-30208", - "description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation", - "stargazers_count": 26, - "forks_count": 1, - "created_at": "2025-03-26T10:26:12Z" - }, { "name": "CVE-2018-20250", "full_name": "QAX-A-Team/CVE-2018-20250", @@ -224,6 +233,15 @@ "forks_count": 14, "created_at": "2019-02-22T06:47:01Z" }, + { + "name": "CVE-2025-0282", + "full_name": "watchtowrlabs/CVE-2025-0282", + "html_url": "https://github.com/watchtowrlabs/CVE-2025-0282", + "description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)", + "stargazers_count": 23, + "forks_count": 9, + "created_at": "2025-01-15T18:27:12Z" + }, { "name": "CVE-2025-1094-Exploit", "full_name": "soltanali0/CVE-2025-1094-Exploit", @@ -233,15 +251,6 @@ "forks_count": 5, "created_at": "2025-02-27T11:08:10Z" }, - { - "name": "CVE-2025-0282", - "full_name": "watchtowrlabs/CVE-2025-0282", - "html_url": "https://github.com/watchtowrlabs/CVE-2025-0282", - "description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)", - "stargazers_count": 22, - "forks_count": 9, - "created_at": "2025-01-15T18:27:12Z" - }, { "name": "CVE-2018-20250-WinRAR-ACE", "full_name": "easis/CVE-2018-20250-WinRAR-ACE", @@ -259,14 +268,5 @@ "stargazers_count": 20, "forks_count": 5, "created_at": "2025-02-23T18:36:11Z" - }, - { - "name": "CVE-2025-1302", - "full_name": "EQSTLab/CVE-2025-1302", - "html_url": "https://github.com/EQSTLab/CVE-2025-1302", - "description": "JSONPath-plus Remote Code Execution", - "stargazers_count": 14, - "forks_count": 1, - "created_at": "2025-02-25T08:36:28Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2646.json b/exploits/2025/CVE-2025-2646.json new file mode 100644 index 0000000..8b84c2b --- /dev/null +++ b/exploits/2025/CVE-2025-2646.json @@ -0,0 +1,38 @@ +[ + { + "name": "CVE-2025-26466", + "full_name": "jhonnybonny/CVE-2025-26466", + "html_url": "https://github.com/jhonnybonny/CVE-2025-26466", + "description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)", + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2025-02-18T21:21:01Z" + }, + { + "name": "CVE-2025-26466", + "full_name": "rxerium/CVE-2025-26466", + "html_url": "https://github.com/rxerium/CVE-2025-26466", + "description": " The OpenSSH client and server are vulnerable to a pre-authentication DoS attack between versions 9.5p1 to 9.9p1 (inclusive) that causes memory and CPU consumption", + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2025-02-18T16:59:09Z" + }, + { + "name": "CVE-2025-26465", + "full_name": "rxerium/CVE-2025-26465", + "html_url": "https://github.com/rxerium/CVE-2025-26465", + "description": "MitM attack allowing a malicious interloper to impersonate a legitimate server when a client attempts to connect to it", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-02-18T16:53:27Z" + }, + { + "name": "patch-manual-CVE-2025-26465-e-CVE-2025-26466", + "full_name": "dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466", + "html_url": "https://github.com/dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466", + "description": "Patch Manual para a correção das CVE-2025-26465-e-CVE-2025-26466, para sistemas sem update do OpenSSH", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-02-21T09:19:54Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-26466.json b/exploits/2025/CVE-2025-26466.json new file mode 100644 index 0000000..2915f65 --- /dev/null +++ b/exploits/2025/CVE-2025-26466.json @@ -0,0 +1,29 @@ +[ + { + "name": "CVE-2025-26466", + "full_name": "rxerium/CVE-2025-26466", + "html_url": "https://github.com/rxerium/CVE-2025-26466", + "description": " The OpenSSH client and server are vulnerable to a pre-authentication DoS attack between versions 9.5p1 to 9.9p1 (inclusive) that causes memory and CPU consumption", + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2025-02-18T16:59:09Z" + }, + { + "name": "CVE-2025-26466", + "full_name": "jhonnybonny/CVE-2025-26466", + "html_url": "https://github.com/jhonnybonny/CVE-2025-26466", + "description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)", + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2025-02-18T21:21:01Z" + }, + { + "name": "patch-manual-CVE-2025-26465-e-CVE-2025-26466", + "full_name": "dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466", + "html_url": "https://github.com/dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466", + "description": "Patch Manual para a correção das CVE-2025-26465-e-CVE-2025-26466, para sistemas sem update do OpenSSH", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-02-21T09:19:54Z" + } +] \ No newline at end of file