Update recent feed data

This commit is contained in:
Brendan McDevitt 2025-04-10 01:11:14 +00:00
parent aa09d19475
commit 5291485999
12 changed files with 186 additions and 0 deletions

View file

@ -0,0 +1,20 @@
[
{
"name": "frameworks_av_CVE-2023-20933",
"full_name": "Trinadh465/frameworks_av_CVE-2023-20933",
"html_url": "https://github.com/Trinadh465/frameworks_av_CVE-2023-20933",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2023-04-03T06:41:47Z"
},
{
"name": "platform_frameworks_av_AOSP10_r33_CVE-2023-20933",
"full_name": "hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933",
"html_url": "https://github.com/hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2023-04-05T06:04:42Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2024-22275",
"full_name": "mbadanoiu/CVE-2024-22275",
"html_url": "https://github.com/mbadanoiu/CVE-2024-22275",
"description": "CVE-2024-22275: Partial File Read in VMware vCenter Server",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2024-07-06T18:14:28Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2024-22922",
"full_name": "keru6k/CVE-2024-22922",
"html_url": "https://github.com/keru6k/CVE-2024-22922",
"description": "A Broken Authentication Vulnerability found in Projectworlds' Visitor Management System",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-01-25T11:14:43Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2024-22983",
"full_name": "keru6k/CVE-2024-22983",
"html_url": "https://github.com/keru6k/CVE-2024-22983",
"description": "An SQL injection Vulnerability in projectworlds' Visitor Management System",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-01-25T10:05:00Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2024-36424",
"full_name": "secunnix/CVE-2024-36424",
"html_url": "https://github.com/secunnix/CVE-2024-36424",
"description": "K7 Ultimate Security < v17.0.2019 \"K7RKScan.sys\" Null Pointer Dereference PoC ",
"stargazers_count": 3,
"forks_count": 1,
"created_at": "2024-08-13T00:06:17Z"
}
]

View file

@ -0,0 +1,29 @@
[
{
"name": "CVE-2024-37032",
"full_name": "Bi0x/CVE-2024-37032",
"html_url": "https://github.com/Bi0x/CVE-2024-37032",
"description": "Path traversal in Ollama with rogue registry server",
"stargazers_count": 42,
"forks_count": 7,
"created_at": "2024-06-26T03:11:29Z"
},
{
"name": "CVE-2024-37032_CVE-2024-45436",
"full_name": "pankass/CVE-2024-37032_CVE-2024-45436",
"html_url": "https://github.com/pankass/CVE-2024-37032_CVE-2024-45436",
"description": "CVE-2024-45436",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2024-10-21T05:44:49Z"
},
{
"name": "CVE-2024-37032-scanner",
"full_name": "ahboon/CVE-2024-37032-scanner",
"html_url": "https://github.com/ahboon/CVE-2024-37032-scanner",
"description": "CVE-2024-37032 scanner",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2024-07-10T07:24:09Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2024-56898",
"full_name": "DRAGOWN/CVE-2024-56898",
"html_url": "https://github.com/DRAGOWN/CVE-2024-56898",
"description": "CVE-2024-56898 - Broken access control vulnerability in GeoVision GV-ASManager web application with version v6.1.0.0 or less. This vulnerability allows low privilege users perform actions that they aren't authorized to, which can be leveraged to escalate privileges, create, modify or delete accounts.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-02-02T09:20:32Z"
}
]

View file

@ -0,0 +1,29 @@
[
{
"name": "CVE-2024-56902",
"full_name": "DRAGOWN/CVE-2024-56902",
"html_url": "https://github.com/DRAGOWN/CVE-2024-56902",
"description": "CVE-2024-56902 - Information disclosure vulnerability in GeoVision GV-ASManager web application with the version v6.1.0.0 or less, which discloses account information, including cleartext password.",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-02-02T14:16:34Z"
},
{
"name": "CVE-2024-56901",
"full_name": "DRAGOWN/CVE-2024-56901",
"html_url": "https://github.com/DRAGOWN/CVE-2024-56901",
"description": "CVE-2024-56901 - A Cross-Site Request Forgery (CSRF) vulnerability in Geovision GV-ASManager web application with the version 6.1.1.0 or less that allows attackers to arbitrarily create Admin accounts via a crafted POST request.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-02-02T15:04:22Z"
},
{
"name": "CVE-2024-56903",
"full_name": "DRAGOWN/CVE-2024-56903",
"html_url": "https://github.com/DRAGOWN/CVE-2024-56903",
"description": "CVE-2024-56903 - Geovision GV-ASManager web application with the version 6.1.1.0 or less allows attackers to modify POST requests with GET in critical functionalities, such as account management. This vulnerability is used in chain with CVE-2024-56901 for a successful CSRF attack.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-02-02T15:04:25Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2024-56924",
"full_name": "ipratheep/CVE-2024-56924",
"html_url": "https://github.com/ipratheep/CVE-2024-56924",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-01-22T07:28:58Z"
}
]

View file

@ -0,0 +1,20 @@
[
{
"name": "CVE-2024-57523.",
"full_name": "HackWidMaddy/CVE-2024-57523.",
"html_url": "https://github.com/HackWidMaddy/CVE-2024-57523.",
"description": "CVE-2024-57523 - CSRF Vulnerability in Users.php - SourceCodester Packers and Movers Management System 1.0",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-01-15T18:56:30Z"
},
{
"name": "CVE-2024-57522",
"full_name": "HackWidMaddy/CVE-2024-57522",
"html_url": "https://github.com/HackWidMaddy/CVE-2024-57522",
"description": "CVE-2024-57522 - Stored XSS Vulnerability in Users.php - SourceCodester Packers and Movers Management System 1.0",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-01-15T18:45:35Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2025-26633",
"full_name": "sandsoncosta/CVE-2025-26633",
"html_url": "https://github.com/sandsoncosta/CVE-2025-26633",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-08T19:29:28Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2025-26647-Exploit",
"full_name": "groshi215/CVE-2025-26647-Exploit",
"html_url": "https://github.com/groshi215/CVE-2025-26647-Exploit",
"description": null,
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-03-31T15:52:21Z"
}
]