Update recent feed data
This commit is contained in:
parent
aa09d19475
commit
5291485999
12 changed files with 186 additions and 0 deletions
20
exploits/2023/CVE-2023-20933.json
Normal file
20
exploits/2023/CVE-2023-20933.json
Normal file
|
@ -0,0 +1,20 @@
|
|||
[
|
||||
{
|
||||
"name": "frameworks_av_CVE-2023-20933",
|
||||
"full_name": "Trinadh465/frameworks_av_CVE-2023-20933",
|
||||
"html_url": "https://github.com/Trinadh465/frameworks_av_CVE-2023-20933",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-04-03T06:41:47Z"
|
||||
},
|
||||
{
|
||||
"name": "platform_frameworks_av_AOSP10_r33_CVE-2023-20933",
|
||||
"full_name": "hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933",
|
||||
"html_url": "https://github.com/hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-04-05T06:04:42Z"
|
||||
}
|
||||
]
|
11
exploits/2024/CVE-2024-22275.json
Normal file
11
exploits/2024/CVE-2024-22275.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-22275",
|
||||
"full_name": "mbadanoiu/CVE-2024-22275",
|
||||
"html_url": "https://github.com/mbadanoiu/CVE-2024-22275",
|
||||
"description": "CVE-2024-22275: Partial File Read in VMware vCenter Server",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-07-06T18:14:28Z"
|
||||
}
|
||||
]
|
11
exploits/2024/CVE-2024-2292.json
Normal file
11
exploits/2024/CVE-2024-2292.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-22922",
|
||||
"full_name": "keru6k/CVE-2024-22922",
|
||||
"html_url": "https://github.com/keru6k/CVE-2024-22922",
|
||||
"description": "A Broken Authentication Vulnerability found in Projectworlds' Visitor Management System",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-01-25T11:14:43Z"
|
||||
}
|
||||
]
|
11
exploits/2024/CVE-2024-22983.json
Normal file
11
exploits/2024/CVE-2024-22983.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-22983",
|
||||
"full_name": "keru6k/CVE-2024-22983",
|
||||
"html_url": "https://github.com/keru6k/CVE-2024-22983",
|
||||
"description": "An SQL injection Vulnerability in projectworlds' Visitor Management System",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-01-25T10:05:00Z"
|
||||
}
|
||||
]
|
11
exploits/2024/CVE-2024-3642.json
Normal file
11
exploits/2024/CVE-2024-3642.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-36424",
|
||||
"full_name": "secunnix/CVE-2024-36424",
|
||||
"html_url": "https://github.com/secunnix/CVE-2024-36424",
|
||||
"description": "K7 Ultimate Security < v17.0.2019 \"K7RKScan.sys\" Null Pointer Dereference PoC ",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 1,
|
||||
"created_at": "2024-08-13T00:06:17Z"
|
||||
}
|
||||
]
|
29
exploits/2024/CVE-2024-37032.json
Normal file
29
exploits/2024/CVE-2024-37032.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-37032",
|
||||
"full_name": "Bi0x/CVE-2024-37032",
|
||||
"html_url": "https://github.com/Bi0x/CVE-2024-37032",
|
||||
"description": "Path traversal in Ollama with rogue registry server",
|
||||
"stargazers_count": 42,
|
||||
"forks_count": 7,
|
||||
"created_at": "2024-06-26T03:11:29Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-37032_CVE-2024-45436",
|
||||
"full_name": "pankass/CVE-2024-37032_CVE-2024-45436",
|
||||
"html_url": "https://github.com/pankass/CVE-2024-37032_CVE-2024-45436",
|
||||
"description": "CVE-2024-45436",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-10-21T05:44:49Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-37032-scanner",
|
||||
"full_name": "ahboon/CVE-2024-37032-scanner",
|
||||
"html_url": "https://github.com/ahboon/CVE-2024-37032-scanner",
|
||||
"description": "CVE-2024-37032 scanner",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-07-10T07:24:09Z"
|
||||
}
|
||||
]
|
11
exploits/2024/CVE-2024-56898.json
Normal file
11
exploits/2024/CVE-2024-56898.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-56898",
|
||||
"full_name": "DRAGOWN/CVE-2024-56898",
|
||||
"html_url": "https://github.com/DRAGOWN/CVE-2024-56898",
|
||||
"description": "CVE-2024-56898 - Broken access control vulnerability in GeoVision GV-ASManager web application with version v6.1.0.0 or less. This vulnerability allows low privilege users perform actions that they aren't authorized to, which can be leveraged to escalate privileges, create, modify or delete accounts.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-02-02T09:20:32Z"
|
||||
}
|
||||
]
|
29
exploits/2024/CVE-2024-5690.json
Normal file
29
exploits/2024/CVE-2024-5690.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-56902",
|
||||
"full_name": "DRAGOWN/CVE-2024-56902",
|
||||
"html_url": "https://github.com/DRAGOWN/CVE-2024-56902",
|
||||
"description": "CVE-2024-56902 - Information disclosure vulnerability in GeoVision GV-ASManager web application with the version v6.1.0.0 or less, which discloses account information, including cleartext password.",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-02-02T14:16:34Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-56901",
|
||||
"full_name": "DRAGOWN/CVE-2024-56901",
|
||||
"html_url": "https://github.com/DRAGOWN/CVE-2024-56901",
|
||||
"description": "CVE-2024-56901 - A Cross-Site Request Forgery (CSRF) vulnerability in Geovision GV-ASManager web application with the version 6.1.1.0 or less that allows attackers to arbitrarily create Admin accounts via a crafted POST request.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-02-02T15:04:22Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-56903",
|
||||
"full_name": "DRAGOWN/CVE-2024-56903",
|
||||
"html_url": "https://github.com/DRAGOWN/CVE-2024-56903",
|
||||
"description": "CVE-2024-56903 - Geovision GV-ASManager web application with the version 6.1.1.0 or less allows attackers to modify POST requests with GET in critical functionalities, such as account management. This vulnerability is used in chain with CVE-2024-56901 for a successful CSRF attack.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-02-02T15:04:25Z"
|
||||
}
|
||||
]
|
11
exploits/2024/CVE-2024-5692.json
Normal file
11
exploits/2024/CVE-2024-5692.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-56924",
|
||||
"full_name": "ipratheep/CVE-2024-56924",
|
||||
"html_url": "https://github.com/ipratheep/CVE-2024-56924",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-01-22T07:28:58Z"
|
||||
}
|
||||
]
|
20
exploits/2024/CVE-2024-5752.json
Normal file
20
exploits/2024/CVE-2024-5752.json
Normal file
|
@ -0,0 +1,20 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-57523.",
|
||||
"full_name": "HackWidMaddy/CVE-2024-57523.",
|
||||
"html_url": "https://github.com/HackWidMaddy/CVE-2024-57523.",
|
||||
"description": "CVE-2024-57523 - CSRF Vulnerability in Users.php - SourceCodester Packers and Movers Management System 1.0",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-01-15T18:56:30Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-57522",
|
||||
"full_name": "HackWidMaddy/CVE-2024-57522",
|
||||
"html_url": "https://github.com/HackWidMaddy/CVE-2024-57522",
|
||||
"description": "CVE-2024-57522 - Stored XSS Vulnerability in Users.php - SourceCodester Packers and Movers Management System 1.0",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-01-15T18:45:35Z"
|
||||
}
|
||||
]
|
11
exploits/2025/CVE-2025-2663.json
Normal file
11
exploits/2025/CVE-2025-2663.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2025-26633",
|
||||
"full_name": "sandsoncosta/CVE-2025-26633",
|
||||
"html_url": "https://github.com/sandsoncosta/CVE-2025-26633",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-08T19:29:28Z"
|
||||
}
|
||||
]
|
11
exploits/2025/CVE-2025-2664.json
Normal file
11
exploits/2025/CVE-2025-2664.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2025-26647-Exploit",
|
||||
"full_name": "groshi215/CVE-2025-26647-Exploit",
|
||||
"html_url": "https://github.com/groshi215/CVE-2025-26647-Exploit",
|
||||
"description": null,
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-31T15:52:21Z"
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue