Update recent feed data
This commit is contained in:
parent
04cf9ed899
commit
5acf18a98a
5 changed files with 27 additions and 14 deletions
11
exploits/2024/CVE-2024-29855.json
Normal file
11
exploits/2024/CVE-2024-29855.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-29855",
|
||||
"full_name": "sinsinology/CVE-2024-29855",
|
||||
"html_url": "https://github.com/sinsinology/CVE-2024-29855",
|
||||
"description": "PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855",
|
||||
"stargazers_count": 17,
|
||||
"forks_count": 7,
|
||||
"created_at": "2024-06-13T08:32:55Z"
|
||||
}
|
||||
]
|
11
exploits/2024/CVE-2024-30614.json
Normal file
11
exploits/2024/CVE-2024-30614.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-30614",
|
||||
"full_name": "Lucky-lm/CVE-2024-30614",
|
||||
"html_url": "https://github.com/Lucky-lm/CVE-2024-30614",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-04-06T08:26:04Z"
|
||||
}
|
||||
]
|
|
@ -4,7 +4,7 @@
|
|||
"full_name": "LOURC0D3/CVE-2024-4367-PoC",
|
||||
"html_url": "https://github.com/LOURC0D3/CVE-2024-4367-PoC",
|
||||
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
|
||||
"stargazers_count": 159,
|
||||
"stargazers_count": 161,
|
||||
"forks_count": 25,
|
||||
"created_at": "2024-05-20T10:02:23Z"
|
||||
},
|
||||
|
@ -13,7 +13,7 @@
|
|||
"full_name": "s4vvysec/CVE-2024-4367-POC",
|
||||
"html_url": "https://github.com/s4vvysec/CVE-2024-4367-POC",
|
||||
"description": "CVE-2024-4367 arbitrary js execution in pdf js",
|
||||
"stargazers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"forks_count": 8,
|
||||
"created_at": "2024-05-20T22:56:10Z"
|
||||
},
|
||||
|
|
|
@ -1,19 +1,10 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2025-2783",
|
||||
"full_name": "bronsoneaver/CVE-2025-2783",
|
||||
"html_url": "https://github.com/bronsoneaver/CVE-2025-2783",
|
||||
"description": null,
|
||||
"stargazers_count": 11,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-28T20:33:42Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-2783",
|
||||
"full_name": "Alchemist3dot14/CVE-2025-2783",
|
||||
"html_url": "https://github.com/Alchemist3dot14/CVE-2025-2783",
|
||||
"description": "Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and logging. Safe for red team demos, detection engineering, and educational use.",
|
||||
"stargazers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-06T03:49:01Z"
|
||||
}
|
||||
|
|
|
@ -4,8 +4,8 @@
|
|||
"full_name": "Nxploited/CVE-2025-30772",
|
||||
"html_url": "https://github.com/Nxploited/CVE-2025-30772",
|
||||
"description": "WordPress WPC Smart Upsell Funnel for WooCommerce plugin <= 3.0.4 - Arbitrary Option Update to Privilege Escalation vulnerability",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-03-28T10:29:12Z"
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue