Update recent feed data
This commit is contained in:
parent
bc55599c6b
commit
5e8e6179a6
5 changed files with 37 additions and 37 deletions
|
@ -13,8 +13,8 @@
|
|||
"full_name": "mverschu/CVE-2025-33073",
|
||||
"html_url": "https://github.com/mverschu/CVE-2025-33073",
|
||||
"description": "PoC Exploit for the NTLM reflection SMB flaw.",
|
||||
"stargazers_count": 402,
|
||||
"forks_count": 81,
|
||||
"stargazers_count": 407,
|
||||
"forks_count": 82,
|
||||
"created_at": "2025-06-13T12:15:14Z"
|
||||
},
|
||||
{
|
||||
|
@ -40,7 +40,7 @@
|
|||
"full_name": "MrAle98/CVE-2025-21333-POC",
|
||||
"html_url": "https://github.com/MrAle98/CVE-2025-21333-POC",
|
||||
"description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY",
|
||||
"stargazers_count": 195,
|
||||
"stargazers_count": 196,
|
||||
"forks_count": 31,
|
||||
"created_at": "2025-02-27T12:36:55Z"
|
||||
},
|
||||
|
@ -49,7 +49,7 @@
|
|||
"full_name": "ynwarcs/CVE-2025-21298",
|
||||
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
|
||||
"description": "Proof of concept & details for CVE-2025-21298",
|
||||
"stargazers_count": 184,
|
||||
"stargazers_count": 186,
|
||||
"forks_count": 46,
|
||||
"created_at": "2025-01-20T18:16:51Z"
|
||||
},
|
||||
|
@ -152,13 +152,22 @@
|
|||
"forks_count": 24,
|
||||
"created_at": "2025-06-05T14:16:31Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-32463_chwoot",
|
||||
"full_name": "pr0v3rbs/CVE-2025-32463_chwoot",
|
||||
"html_url": "https://github.com/pr0v3rbs/CVE-2025-32463_chwoot",
|
||||
"description": "sudo Local Privilege Escalation CVE-2025-32463",
|
||||
"stargazers_count": 78,
|
||||
"forks_count": 17,
|
||||
"created_at": "2025-07-01T11:26:15Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-49113",
|
||||
"full_name": "fearsoff-org/CVE-2025-49113",
|
||||
"html_url": "https://github.com/fearsoff-org/CVE-2025-49113",
|
||||
"description": null,
|
||||
"stargazers_count": 68,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"created_at": "2025-06-04T15:49:43Z"
|
||||
},
|
||||
{
|
||||
|
@ -184,7 +193,7 @@
|
|||
"full_name": "mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-",
|
||||
"html_url": "https://github.com/mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-",
|
||||
"description": "Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)",
|
||||
"stargazers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"forks_count": 14,
|
||||
"created_at": "2025-05-31T12:20:36Z"
|
||||
},
|
||||
|
@ -251,21 +260,12 @@
|
|||
"forks_count": 5,
|
||||
"created_at": "2025-01-30T00:10:44Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-30208",
|
||||
"full_name": "xuemian168/CVE-2025-30208",
|
||||
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
|
||||
"description": "全网首发 CVE-2025-31125 CVE-2025-30208 CVE-2025-32395 Vite Scanner",
|
||||
"stargazers_count": 42,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-03-26T10:26:12Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-6019",
|
||||
"full_name": "guinea-offensive-security/CVE-2025-6019",
|
||||
"html_url": "https://github.com/guinea-offensive-security/CVE-2025-6019",
|
||||
"description": null,
|
||||
"stargazers_count": 40,
|
||||
"stargazers_count": 42,
|
||||
"forks_count": 10,
|
||||
"created_at": "2025-06-19T02:42:21Z"
|
||||
}
|
||||
|
|
|
@ -4,8 +4,8 @@
|
|||
"full_name": "ZeroMemoryEx/CVE-2025-26125",
|
||||
"html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125",
|
||||
"description": "(0day) Local Privilege Escalation in IObit Malware Fighter",
|
||||
"stargazers_count": 139,
|
||||
"forks_count": 22,
|
||||
"stargazers_count": 142,
|
||||
"forks_count": 23,
|
||||
"created_at": "2025-01-08T05:50:07Z"
|
||||
}
|
||||
]
|
|
@ -1,13 +1,4 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2025-26199",
|
||||
"full_name": "tansique-17/CVE-2025-26199",
|
||||
"html_url": "https://github.com/tansique-17/CVE-2025-26199",
|
||||
"description": "Public Disclosure",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-06-19T04:47:29Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-26198",
|
||||
"full_name": "tansique-17/CVE-2025-26198",
|
||||
|
@ -16,5 +7,14 @@
|
|||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-06-18T18:19:42Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-26199",
|
||||
"full_name": "tansique-17/CVE-2025-26199",
|
||||
"html_url": "https://github.com/tansique-17/CVE-2025-26199",
|
||||
"description": "Public Disclosure",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-06-19T04:47:29Z"
|
||||
}
|
||||
]
|
|
@ -21,7 +21,7 @@
|
|||
"name": "CVE-2025-26206",
|
||||
"full_name": "xibhi/CVE-2025-26206",
|
||||
"html_url": "https://github.com/xibhi/CVE-2025-26206",
|
||||
"description": null,
|
||||
"description": "A critical Cross-Site Request Forgery (CSRF) vulnerability in Sell Done Storefront v.1.0. Discovered by B. Sibhi",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-02-24T05:53:46Z"
|
||||
|
|
|
@ -62,15 +62,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-27T12:36:41Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-30208",
|
||||
"full_name": "kk12-30/CVE-2025-30208",
|
||||
"html_url": "https://github.com/kk12-30/CVE-2025-30208",
|
||||
"description": "CVE-2025-30208漏洞验证工具",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-26T17:18:46Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-30208",
|
||||
"full_name": "ThemeHackers/CVE-2025-30208",
|
||||
|
@ -80,6 +71,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-06-27T10:13:24Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-30208",
|
||||
"full_name": "kk12-30/CVE-2025-30208",
|
||||
"html_url": "https://github.com/kk12-30/CVE-2025-30208",
|
||||
"description": "CVE-2025-30208漏洞验证工具",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-26T17:18:46Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-30208-Series",
|
||||
"full_name": "r0ngy40/CVE-2025-30208-Series",
|
||||
|
|
Loading…
Add table
Reference in a new issue