From 60eaf8bc9fd77b523587df70791ae7bb0ed47c37 Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Sun, 6 Apr 2025 01:11:48 +0000 Subject: [PATCH] Update recent feed data --- exploits/2023/CVE-2023-23128.json | 11 +++++++++++ exploits/2023/CVE-2023-23131.json | 11 +++++++++++ exploits/2023/CVE-2023-23132.json | 11 +++++++++++ exploits/2023/CVE-2023-23333.json | 29 +++++++++++++++++++++++++++++ exploits/2024/CVE-2024-1067.json | 18 +++++++++--------- exploits/2024/CVE-2024-26475.json | 11 +++++++++++ exploits/2025/CVE-2025-2294.json | 29 +++++++++++++++++++++++++++++ exploits/2025/CVE-2025-2825.json | 20 ++++++++++++++++++++ 8 files changed, 131 insertions(+), 9 deletions(-) create mode 100644 exploits/2023/CVE-2023-23128.json create mode 100644 exploits/2023/CVE-2023-23131.json create mode 100644 exploits/2023/CVE-2023-23132.json create mode 100644 exploits/2023/CVE-2023-23333.json create mode 100644 exploits/2024/CVE-2024-26475.json create mode 100644 exploits/2025/CVE-2025-2294.json create mode 100644 exploits/2025/CVE-2025-2825.json diff --git a/exploits/2023/CVE-2023-23128.json b/exploits/2023/CVE-2023-23128.json new file mode 100644 index 0000000..f10a497 --- /dev/null +++ b/exploits/2023/CVE-2023-23128.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2023-23128", + "full_name": "l00neyhacker/CVE-2023-23128", + "html_url": "https://github.com/l00neyhacker/CVE-2023-23128", + "description": "CVE-2023-23128", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-01-30T04:13:36Z" + } +] \ No newline at end of file diff --git a/exploits/2023/CVE-2023-23131.json b/exploits/2023/CVE-2023-23131.json new file mode 100644 index 0000000..716cf4d --- /dev/null +++ b/exploits/2023/CVE-2023-23131.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2023-23131", + "full_name": "l00neyhacker/CVE-2023-23131", + "html_url": "https://github.com/l00neyhacker/CVE-2023-23131", + "description": "CVE-2023-23131", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-01-30T04:16:08Z" + } +] \ No newline at end of file diff --git a/exploits/2023/CVE-2023-23132.json b/exploits/2023/CVE-2023-23132.json new file mode 100644 index 0000000..a35e767 --- /dev/null +++ b/exploits/2023/CVE-2023-23132.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2023-23132", + "full_name": "l00neyhacker/CVE-2023-23132", + "html_url": "https://github.com/l00neyhacker/CVE-2023-23132", + "description": "CVE-2023-23132", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-01-30T04:17:44Z" + } +] \ No newline at end of file diff --git a/exploits/2023/CVE-2023-23333.json b/exploits/2023/CVE-2023-23333.json new file mode 100644 index 0000000..83e3d70 --- /dev/null +++ b/exploits/2023/CVE-2023-23333.json @@ -0,0 +1,29 @@ +[ + { + "name": "CVE-2023-23333", + "full_name": "Mr-xn/CVE-2023-23333", + "html_url": "https://github.com/Mr-xn/CVE-2023-23333", + "description": "SolarView Compact through 6.00 downloader.php commands injection (RCE) nuclei-templates", + "stargazers_count": 13, + "forks_count": 4, + "created_at": "2023-06-16T14:33:31Z" + }, + { + "name": "CVE-2023-23333", + "full_name": "Timorlover/CVE-2023-23333", + "html_url": "https://github.com/Timorlover/CVE-2023-23333", + "description": "There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.", + "stargazers_count": 9, + "forks_count": 0, + "created_at": "2023-02-06T06:20:40Z" + }, + { + "name": "nmap-CVE-2023-23333-exploit", + "full_name": "emanueldosreis/nmap-CVE-2023-23333-exploit", + "html_url": "https://github.com/emanueldosreis/nmap-CVE-2023-23333-exploit", + "description": "Nmap NSE script to dump / test Solarwinds CVE-2023-23333 vulnerability", + "stargazers_count": 2, + "forks_count": 1, + "created_at": "2023-08-01T16:24:37Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-1067.json b/exploits/2024/CVE-2024-1067.json index 47dbf15..07c6a03 100644 --- a/exploits/2024/CVE-2024-1067.json +++ b/exploits/2024/CVE-2024-1067.json @@ -1,13 +1,4 @@ [ - { - "name": "CVE-2024-10674", - "full_name": "Nxploited/CVE-2024-10674", - "html_url": "https://github.com/Nxploited/CVE-2024-10674", - "description": "Th Shop Mania <= 1.4.9 - Authenticated (Subscriber+) Arbitrary Plugin Installation/Activation", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-03-12T21:00:14Z" - }, { "name": "CVE-2024-10673", "full_name": "Nxploited/CVE-2024-10673", @@ -16,5 +7,14 @@ "stargazers_count": 0, "forks_count": 0, "created_at": "2025-03-12T06:40:00Z" + }, + { + "name": "CVE-2024-10674", + "full_name": "Nxploited/CVE-2024-10674", + "html_url": "https://github.com/Nxploited/CVE-2024-10674", + "description": "Th Shop Mania <= 1.4.9 - Authenticated (Subscriber+) Arbitrary Plugin Installation/Activation", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-12T21:00:14Z" } ] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-26475.json b/exploits/2024/CVE-2024-26475.json new file mode 100644 index 0000000..c95eef9 --- /dev/null +++ b/exploits/2024/CVE-2024-26475.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-26475", + "full_name": "TronciuVlad/CVE-2024-26475", + "html_url": "https://github.com/TronciuVlad/CVE-2024-26475", + "description": "An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function.", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2024-03-10T22:51:05Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2294.json b/exploits/2025/CVE-2025-2294.json new file mode 100644 index 0000000..8d0aeba --- /dev/null +++ b/exploits/2025/CVE-2025-2294.json @@ -0,0 +1,29 @@ +[ + { + "name": "CVE-2025-2294", + "full_name": "Nxploited/CVE-2025-2294", + "html_url": "https://github.com/Nxploited/CVE-2025-2294", + "description": "Kubio AI Page Builder <= 2.5.1 - Unauthenticated Local File Inclusion", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-03-27T19:09:51Z" + }, + { + "name": "CVE-2025-2294", + "full_name": "mrrivaldo/CVE-2025-2294", + "html_url": "https://github.com/mrrivaldo/CVE-2025-2294", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-31T11:51:07Z" + }, + { + "name": "CVE-2025-2294-PoC", + "full_name": "realcodeb0ss/CVE-2025-2294-PoC", + "html_url": "https://github.com/realcodeb0ss/CVE-2025-2294-PoC", + "description": "CVE-2025-2294 < Wordpress Kubio[Plugin] - Local File Inclusion[LFI].", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-03T23:00:09Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2825.json b/exploits/2025/CVE-2025-2825.json new file mode 100644 index 0000000..5ed89b9 --- /dev/null +++ b/exploits/2025/CVE-2025-2825.json @@ -0,0 +1,20 @@ +[ + { + "name": "CVE-2025-2825", + "full_name": "WOOOOONG/CVE-2025-2825", + "html_url": "https://github.com/WOOOOONG/CVE-2025-2825", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-03T01:13:28Z" + }, + { + "name": "crushftp-CVE-2025-2825", + "full_name": "punitdarji/crushftp-CVE-2025-2825", + "html_url": "https://github.com/punitdarji/crushftp-CVE-2025-2825", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-04T08:57:02Z" + } +] \ No newline at end of file