diff --git a/exploits/2022/CVE-2022-46604.json b/exploits/2022/CVE-2022-46604.json new file mode 100644 index 0000000..25977bd --- /dev/null +++ b/exploits/2022/CVE-2022-46604.json @@ -0,0 +1,11 @@ +[ + { + "name": "ResponsiveFileManager-CVE-2022-46604", + "full_name": "galoget/ResponsiveFileManager-CVE-2022-46604", + "html_url": "https://github.com/galoget/ResponsiveFileManager-CVE-2022-46604", + "description": "Responsive FileManager v.9.9.5 vulnerable to CVE-2022-46604.", + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2023-02-03T08:56:16Z" + } +] \ No newline at end of file diff --git a/exploits/2022/CVE-2022-4671.json b/exploits/2022/CVE-2022-4671.json new file mode 100644 index 0000000..39dbfea --- /dev/null +++ b/exploits/2022/CVE-2022-4671.json @@ -0,0 +1,11 @@ +[ + { + "name": "cve-2022-46718-leaky-location", + "full_name": "biscuitehh/cve-2022-46718-leaky-location", + "html_url": "https://github.com/biscuitehh/cve-2022-46718-leaky-location", + "description": "CVE-2022-46718: an app may be able to read sensitive location information.", + "stargazers_count": 27, + "forks_count": 3, + "created_at": "2023-05-01T18:34:52Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-21111.json b/exploits/2024/CVE-2024-21111.json new file mode 100644 index 0000000..a9888d1 --- /dev/null +++ b/exploits/2024/CVE-2024-21111.json @@ -0,0 +1,29 @@ +[ + { + "name": "CVE-2024-21111", + "full_name": "mansk1es/CVE-2024-21111", + "html_url": "https://github.com/mansk1es/CVE-2024-21111", + "description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability", + "stargazers_count": 219, + "forks_count": 35, + "created_at": "2024-04-22T07:05:04Z" + }, + { + "name": "CVE-2024-21111", + "full_name": "x0rsys/CVE-2024-21111", + "html_url": "https://github.com/x0rsys/CVE-2024-21111", + "description": "Precompiled binaries for Privilege Escalation in Oracle VM Virtual box prior to 7.0.16", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2024-06-04T04:24:47Z" + }, + { + "name": "CVE-2024-21111-del", + "full_name": "10cks/CVE-2024-21111-del", + "html_url": "https://github.com/10cks/CVE-2024-21111-del", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-05-17T03:09:54Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-34312.json b/exploits/2024/CVE-2024-34312.json new file mode 100644 index 0000000..39753bf --- /dev/null +++ b/exploits/2024/CVE-2024-34312.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-34312", + "full_name": "vincentscode/CVE-2024-34312", + "html_url": "https://github.com/vincentscode/CVE-2024-34312", + "description": "☣️ This repository contains the description and a proof of concept for CVE-2024-34312", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-06-23T08:37:44Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-3474.json b/exploits/2024/CVE-2024-3474.json new file mode 100644 index 0000000..00fb2c1 --- /dev/null +++ b/exploits/2024/CVE-2024-3474.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-34741", + "full_name": "uthrasri/CVE-2024-34741", + "html_url": "https://github.com/uthrasri/CVE-2024-34741", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-10-04T13:41:09Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-55968.json b/exploits/2024/CVE-2024-55968.json new file mode 100644 index 0000000..fef0dc7 --- /dev/null +++ b/exploits/2024/CVE-2024-55968.json @@ -0,0 +1,20 @@ +[ + { + "name": "CVE-2024-55968", + "full_name": "Wi1DN00B/CVE-2024-55968", + "html_url": "https://github.com/Wi1DN00B/CVE-2024-55968", + "description": "Exploit POC Code for CVE-2024-55968", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2024-12-17T21:07:59Z" + }, + { + "name": "CVE-2024-55968", + "full_name": "null-event/CVE-2024-55968", + "html_url": "https://github.com/null-event/CVE-2024-55968", + "description": "POC for DTEX LPE (CVE-2024-55968)", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2024-12-17T21:08:11Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-5627.json b/exploits/2024/CVE-2024-5627.json new file mode 100644 index 0000000..e727384 --- /dev/null +++ b/exploits/2024/CVE-2024-5627.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-56278", + "full_name": "DoTTak/CVE-2024-56278", + "html_url": "https://github.com/DoTTak/CVE-2024-56278", + "description": "PoC of CVE-2024-56278", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-01-06T01:51:46Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-56431.json b/exploits/2024/CVE-2024-56431.json new file mode 100644 index 0000000..dd51b4e --- /dev/null +++ b/exploits/2024/CVE-2024-56431.json @@ -0,0 +1,11 @@ +[ + { + "name": "libtheora-CVE-2024-56431-PoC", + "full_name": "UnionTech-Software/libtheora-CVE-2024-56431-PoC", + "html_url": "https://github.com/UnionTech-Software/libtheora-CVE-2024-56431-PoC", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-12-25T03:58:50Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-26125.json b/exploits/2025/CVE-2025-26125.json new file mode 100644 index 0000000..0ac9fe9 --- /dev/null +++ b/exploits/2025/CVE-2025-26125.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2025-26125", + "full_name": "ZeroMemoryEx/CVE-2025-26125", + "html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125", + "description": "(0day) Local Privilege Escalation in IObit Malware Fighter", + "stargazers_count": 126, + "forks_count": 18, + "created_at": "2025-01-08T05:50:07Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2620.json b/exploits/2025/CVE-2025-2620.json new file mode 100644 index 0000000..dbecf89 --- /dev/null +++ b/exploits/2025/CVE-2025-2620.json @@ -0,0 +1,29 @@ +[ + { + "name": "CVE-2025-2620-poc", + "full_name": "Otsmane-Ahmed/CVE-2025-2620-poc", + "html_url": "https://github.com/Otsmane-Ahmed/CVE-2025-2620-poc", + "description": null, + "stargazers_count": 5, + "forks_count": 1, + "created_at": "2025-03-22T15:26:15Z" + }, + { + "name": "CVE-2025-26206", + "full_name": "xibhi/CVE-2025-26206", + "html_url": "https://github.com/xibhi/CVE-2025-26206", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-02-24T05:53:46Z" + }, + { + "name": "CVE-2025-26202-Details", + "full_name": "A17-ba/CVE-2025-26202-Details", + "html_url": "https://github.com/A17-ba/CVE-2025-26202-Details", + "description": "CVE-2025-26202", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-01T12:05:27Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2624.json b/exploits/2025/CVE-2025-2624.json new file mode 100644 index 0000000..3e8d9f7 --- /dev/null +++ b/exploits/2025/CVE-2025-2624.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2025-26240", + "full_name": "Habuon/CVE-2025-26240", + "html_url": "https://github.com/Habuon/CVE-2025-26240", + "description": "POC for CVE-2025-26240", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-12T14:09:01Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2641.json b/exploits/2025/CVE-2025-2641.json new file mode 100644 index 0000000..7f1b084 --- /dev/null +++ b/exploits/2025/CVE-2025-2641.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2025-26417", + "full_name": "uthrasri/CVE-2025-26417", + "html_url": "https://github.com/uthrasri/CVE-2025-26417", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-17T09:20:55Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-30216.json b/exploits/2025/CVE-2025-30216.json new file mode 100644 index 0000000..8e8d7ef --- /dev/null +++ b/exploits/2025/CVE-2025-30216.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2025-30216-PoC", + "full_name": "oliviaisntcringe/CVE-2025-30216-PoC", + "html_url": "https://github.com/oliviaisntcringe/CVE-2025-30216-PoC", + "description": "PoC", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-26T13:03:33Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-30349.json b/exploits/2025/CVE-2025-30349.json new file mode 100644 index 0000000..1e95f12 --- /dev/null +++ b/exploits/2025/CVE-2025-30349.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2025-30349", + "full_name": "natasaka/CVE-2025-30349", + "html_url": "https://github.com/natasaka/CVE-2025-30349", + "description": "Horde IMP (through 6.2.27) vulnerability – obfuscation via HTML encoding – XSS payload", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-27T20:22:45Z" + } +] \ No newline at end of file