From 5acf18a98a96ed8cea8a8ef323f23ede96c0b42c Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Sun, 27 Apr 2025 01:15:13 +0000 Subject: [PATCH] Update recent feed data --- exploits/2024/CVE-2024-29855.json | 11 +++++++++++ exploits/2024/CVE-2024-30614.json | 11 +++++++++++ exploits/2024/CVE-2024-4367.json | 4 ++-- exploits/2025/CVE-2025-2783.json | 11 +---------- exploits/2025/CVE-2025-30772.json | 4 ++-- 5 files changed, 27 insertions(+), 14 deletions(-) create mode 100644 exploits/2024/CVE-2024-29855.json create mode 100644 exploits/2024/CVE-2024-30614.json diff --git a/exploits/2024/CVE-2024-29855.json b/exploits/2024/CVE-2024-29855.json new file mode 100644 index 0000000..62cafae --- /dev/null +++ b/exploits/2024/CVE-2024-29855.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-29855", + "full_name": "sinsinology/CVE-2024-29855", + "html_url": "https://github.com/sinsinology/CVE-2024-29855", + "description": "PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855", + "stargazers_count": 17, + "forks_count": 7, + "created_at": "2024-06-13T08:32:55Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-30614.json b/exploits/2024/CVE-2024-30614.json new file mode 100644 index 0000000..071b6fb --- /dev/null +++ b/exploits/2024/CVE-2024-30614.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-30614", + "full_name": "Lucky-lm/CVE-2024-30614", + "html_url": "https://github.com/Lucky-lm/CVE-2024-30614", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-04-06T08:26:04Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-4367.json b/exploits/2024/CVE-2024-4367.json index 5e56406..39ab391 100644 --- a/exploits/2024/CVE-2024-4367.json +++ b/exploits/2024/CVE-2024-4367.json @@ -4,7 +4,7 @@ "full_name": "LOURC0D3/CVE-2024-4367-PoC", "html_url": "https://github.com/LOURC0D3/CVE-2024-4367-PoC", "description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept", - "stargazers_count": 159, + "stargazers_count": 161, "forks_count": 25, "created_at": "2024-05-20T10:02:23Z" }, @@ -13,7 +13,7 @@ "full_name": "s4vvysec/CVE-2024-4367-POC", "html_url": "https://github.com/s4vvysec/CVE-2024-4367-POC", "description": "CVE-2024-4367 arbitrary js execution in pdf js", - "stargazers_count": 48, + "stargazers_count": 49, "forks_count": 8, "created_at": "2024-05-20T22:56:10Z" }, diff --git a/exploits/2025/CVE-2025-2783.json b/exploits/2025/CVE-2025-2783.json index 7645701..e6861d1 100644 --- a/exploits/2025/CVE-2025-2783.json +++ b/exploits/2025/CVE-2025-2783.json @@ -1,19 +1,10 @@ [ - { - "name": "CVE-2025-2783", - "full_name": "bronsoneaver/CVE-2025-2783", - "html_url": "https://github.com/bronsoneaver/CVE-2025-2783", - "description": null, - "stargazers_count": 11, - "forks_count": 0, - "created_at": "2025-03-28T20:33:42Z" - }, { "name": "CVE-2025-2783", "full_name": "Alchemist3dot14/CVE-2025-2783", "html_url": "https://github.com/Alchemist3dot14/CVE-2025-2783", "description": "Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and logging. Safe for red team demos, detection engineering, and educational use.", - "stargazers_count": 1, + "stargazers_count": 2, "forks_count": 0, "created_at": "2025-04-06T03:49:01Z" } diff --git a/exploits/2025/CVE-2025-30772.json b/exploits/2025/CVE-2025-30772.json index c44b20b..ca57471 100644 --- a/exploits/2025/CVE-2025-30772.json +++ b/exploits/2025/CVE-2025-30772.json @@ -4,8 +4,8 @@ "full_name": "Nxploited/CVE-2025-30772", "html_url": "https://github.com/Nxploited/CVE-2025-30772", "description": "WordPress WPC Smart Upsell Funnel for WooCommerce plugin <= 3.0.4 - Arbitrary Option Update to Privilege Escalation vulnerability", - "stargazers_count": 0, - "forks_count": 0, + "stargazers_count": 1, + "forks_count": 1, "created_at": "2025-03-28T10:29:12Z" } ] \ No newline at end of file