From 52914859995e09d5276d377be7e6f9fd1fa8be7e Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Thu, 10 Apr 2025 01:11:14 +0000 Subject: [PATCH] Update recent feed data --- exploits/2023/CVE-2023-20933.json | 20 ++++++++++++++++++++ exploits/2024/CVE-2024-22275.json | 11 +++++++++++ exploits/2024/CVE-2024-2292.json | 11 +++++++++++ exploits/2024/CVE-2024-22983.json | 11 +++++++++++ exploits/2024/CVE-2024-3642.json | 11 +++++++++++ exploits/2024/CVE-2024-37032.json | 29 +++++++++++++++++++++++++++++ exploits/2024/CVE-2024-56898.json | 11 +++++++++++ exploits/2024/CVE-2024-5690.json | 29 +++++++++++++++++++++++++++++ exploits/2024/CVE-2024-5692.json | 11 +++++++++++ exploits/2024/CVE-2024-5752.json | 20 ++++++++++++++++++++ exploits/2025/CVE-2025-2663.json | 11 +++++++++++ exploits/2025/CVE-2025-2664.json | 11 +++++++++++ 12 files changed, 186 insertions(+) create mode 100644 exploits/2023/CVE-2023-20933.json create mode 100644 exploits/2024/CVE-2024-22275.json create mode 100644 exploits/2024/CVE-2024-2292.json create mode 100644 exploits/2024/CVE-2024-22983.json create mode 100644 exploits/2024/CVE-2024-3642.json create mode 100644 exploits/2024/CVE-2024-37032.json create mode 100644 exploits/2024/CVE-2024-56898.json create mode 100644 exploits/2024/CVE-2024-5690.json create mode 100644 exploits/2024/CVE-2024-5692.json create mode 100644 exploits/2024/CVE-2024-5752.json create mode 100644 exploits/2025/CVE-2025-2663.json create mode 100644 exploits/2025/CVE-2025-2664.json diff --git a/exploits/2023/CVE-2023-20933.json b/exploits/2023/CVE-2023-20933.json new file mode 100644 index 0000000..dc62881 --- /dev/null +++ b/exploits/2023/CVE-2023-20933.json @@ -0,0 +1,20 @@ +[ + { + "name": "frameworks_av_CVE-2023-20933", + "full_name": "Trinadh465/frameworks_av_CVE-2023-20933", + "html_url": "https://github.com/Trinadh465/frameworks_av_CVE-2023-20933", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-04-03T06:41:47Z" + }, + { + "name": "platform_frameworks_av_AOSP10_r33_CVE-2023-20933", + "full_name": "hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933", + "html_url": "https://github.com/hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-04-05T06:04:42Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-22275.json b/exploits/2024/CVE-2024-22275.json new file mode 100644 index 0000000..88f1d9f --- /dev/null +++ b/exploits/2024/CVE-2024-22275.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-22275", + "full_name": "mbadanoiu/CVE-2024-22275", + "html_url": "https://github.com/mbadanoiu/CVE-2024-22275", + "description": "CVE-2024-22275: Partial File Read in VMware vCenter Server", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2024-07-06T18:14:28Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-2292.json b/exploits/2024/CVE-2024-2292.json new file mode 100644 index 0000000..4c645e6 --- /dev/null +++ b/exploits/2024/CVE-2024-2292.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-22922", + "full_name": "keru6k/CVE-2024-22922", + "html_url": "https://github.com/keru6k/CVE-2024-22922", + "description": "A Broken Authentication Vulnerability found in Projectworlds' Visitor Management System", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-01-25T11:14:43Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-22983.json b/exploits/2024/CVE-2024-22983.json new file mode 100644 index 0000000..1dffa59 --- /dev/null +++ b/exploits/2024/CVE-2024-22983.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-22983", + "full_name": "keru6k/CVE-2024-22983", + "html_url": "https://github.com/keru6k/CVE-2024-22983", + "description": "An SQL injection Vulnerability in projectworlds' Visitor Management System", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-01-25T10:05:00Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-3642.json b/exploits/2024/CVE-2024-3642.json new file mode 100644 index 0000000..f8758bd --- /dev/null +++ b/exploits/2024/CVE-2024-3642.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-36424", + "full_name": "secunnix/CVE-2024-36424", + "html_url": "https://github.com/secunnix/CVE-2024-36424", + "description": "K7 Ultimate Security < v17.0.2019 \"K7RKScan.sys\" Null Pointer Dereference PoC ", + "stargazers_count": 3, + "forks_count": 1, + "created_at": "2024-08-13T00:06:17Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-37032.json b/exploits/2024/CVE-2024-37032.json new file mode 100644 index 0000000..5b8745e --- /dev/null +++ b/exploits/2024/CVE-2024-37032.json @@ -0,0 +1,29 @@ +[ + { + "name": "CVE-2024-37032", + "full_name": "Bi0x/CVE-2024-37032", + "html_url": "https://github.com/Bi0x/CVE-2024-37032", + "description": "Path traversal in Ollama with rogue registry server", + "stargazers_count": 42, + "forks_count": 7, + "created_at": "2024-06-26T03:11:29Z" + }, + { + "name": "CVE-2024-37032_CVE-2024-45436", + "full_name": "pankass/CVE-2024-37032_CVE-2024-45436", + "html_url": "https://github.com/pankass/CVE-2024-37032_CVE-2024-45436", + "description": "CVE-2024-45436", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2024-10-21T05:44:49Z" + }, + { + "name": "CVE-2024-37032-scanner", + "full_name": "ahboon/CVE-2024-37032-scanner", + "html_url": "https://github.com/ahboon/CVE-2024-37032-scanner", + "description": "CVE-2024-37032 scanner", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2024-07-10T07:24:09Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-56898.json b/exploits/2024/CVE-2024-56898.json new file mode 100644 index 0000000..c3fefc9 --- /dev/null +++ b/exploits/2024/CVE-2024-56898.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-56898", + "full_name": "DRAGOWN/CVE-2024-56898", + "html_url": "https://github.com/DRAGOWN/CVE-2024-56898", + "description": "CVE-2024-56898 - Broken access control vulnerability in GeoVision GV-ASManager web application with version v6.1.0.0 or less. This vulnerability allows low privilege users perform actions that they aren't authorized to, which can be leveraged to escalate privileges, create, modify or delete accounts.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-02-02T09:20:32Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-5690.json b/exploits/2024/CVE-2024-5690.json new file mode 100644 index 0000000..e9b6917 --- /dev/null +++ b/exploits/2024/CVE-2024-5690.json @@ -0,0 +1,29 @@ +[ + { + "name": "CVE-2024-56902", + "full_name": "DRAGOWN/CVE-2024-56902", + "html_url": "https://github.com/DRAGOWN/CVE-2024-56902", + "description": "CVE-2024-56902 - Information disclosure vulnerability in GeoVision GV-ASManager web application with the version v6.1.0.0 or less, which discloses account information, including cleartext password.", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-02-02T14:16:34Z" + }, + { + "name": "CVE-2024-56901", + "full_name": "DRAGOWN/CVE-2024-56901", + "html_url": "https://github.com/DRAGOWN/CVE-2024-56901", + "description": "CVE-2024-56901 - A Cross-Site Request Forgery (CSRF) vulnerability in Geovision GV-ASManager web application with the version 6.1.1.0 or less that allows attackers to arbitrarily create Admin accounts via a crafted POST request.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-02-02T15:04:22Z" + }, + { + "name": "CVE-2024-56903", + "full_name": "DRAGOWN/CVE-2024-56903", + "html_url": "https://github.com/DRAGOWN/CVE-2024-56903", + "description": "CVE-2024-56903 - Geovision GV-ASManager web application with the version 6.1.1.0 or less allows attackers to modify POST requests with GET in critical functionalities, such as account management. This vulnerability is used in chain with CVE-2024-56901 for a successful CSRF attack.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-02-02T15:04:25Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-5692.json b/exploits/2024/CVE-2024-5692.json new file mode 100644 index 0000000..9d962b7 --- /dev/null +++ b/exploits/2024/CVE-2024-5692.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-56924", + "full_name": "ipratheep/CVE-2024-56924", + "html_url": "https://github.com/ipratheep/CVE-2024-56924", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-01-22T07:28:58Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-5752.json b/exploits/2024/CVE-2024-5752.json new file mode 100644 index 0000000..148f662 --- /dev/null +++ b/exploits/2024/CVE-2024-5752.json @@ -0,0 +1,20 @@ +[ + { + "name": "CVE-2024-57523.", + "full_name": "HackWidMaddy/CVE-2024-57523.", + "html_url": "https://github.com/HackWidMaddy/CVE-2024-57523.", + "description": "CVE-2024-57523 - CSRF Vulnerability in Users.php - SourceCodester Packers and Movers Management System 1.0", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-01-15T18:56:30Z" + }, + { + "name": "CVE-2024-57522", + "full_name": "HackWidMaddy/CVE-2024-57522", + "html_url": "https://github.com/HackWidMaddy/CVE-2024-57522", + "description": "CVE-2024-57522 - Stored XSS Vulnerability in Users.php - SourceCodester Packers and Movers Management System 1.0", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-01-15T18:45:35Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2663.json b/exploits/2025/CVE-2025-2663.json new file mode 100644 index 0000000..039ec40 --- /dev/null +++ b/exploits/2025/CVE-2025-2663.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2025-26633", + "full_name": "sandsoncosta/CVE-2025-26633", + "html_url": "https://github.com/sandsoncosta/CVE-2025-26633", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-08T19:29:28Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2664.json b/exploits/2025/CVE-2025-2664.json new file mode 100644 index 0000000..673c273 --- /dev/null +++ b/exploits/2025/CVE-2025-2664.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2025-26647-Exploit", + "full_name": "groshi215/CVE-2025-26647-Exploit", + "html_url": "https://github.com/groshi215/CVE-2025-26647-Exploit", + "description": null, + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-03-31T15:52:21Z" + } +] \ No newline at end of file