From 64364a21f44b759c2288d691c42b90341dfd3977 Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Tue, 1 Jul 2025 01:11:44 +0000 Subject: [PATCH] Update recent feed data --- exploits/2024/CVE-2024-37032.json | 2 +- exploits/2025/CVE-2025-2025.json | 312 +++++++++++++++--------------- 2 files changed, 157 insertions(+), 157 deletions(-) diff --git a/exploits/2024/CVE-2024-37032.json b/exploits/2024/CVE-2024-37032.json index 79ab73e..36d7f0a 100644 --- a/exploits/2024/CVE-2024-37032.json +++ b/exploits/2024/CVE-2024-37032.json @@ -13,7 +13,7 @@ "full_name": "pankass/CVE-2024-37032_CVE-2024-45436", "html_url": "https://github.com/pankass/CVE-2024-37032_CVE-2024-45436", "description": "CVE-2024-45436", - "stargazers_count": 4, + "stargazers_count": 5, "forks_count": 0, "created_at": "2024-10-21T05:44:49Z" }, diff --git a/exploits/2025/CVE-2025-2025.json b/exploits/2025/CVE-2025-2025.json index 020e288..4bc9da8 100644 --- a/exploits/2025/CVE-2025-2025.json +++ b/exploits/2025/CVE-2025-2025.json @@ -4,80 +4,107 @@ "full_name": "WyAtu/CVE-2018-20250", "html_url": "https://github.com/WyAtu/CVE-2018-20250", "description": "exp for https://research.checkpoint.com/extracting-code-execution-from-winrar", - "stargazers_count": 489, + "stargazers_count": 491, "forks_count": 177, "created_at": "2019-02-22T04:52:08Z" }, + { + "name": "CVE-2025-33073", + "full_name": "mverschu/CVE-2025-33073", + "html_url": "https://github.com/mverschu/CVE-2025-33073", + "description": "PoC Exploit for the NTLM reflection SMB flaw.", + "stargazers_count": 398, + "forks_count": 80, + "created_at": "2025-06-13T12:15:14Z" + }, { "name": "CVE-2025-24071_PoC", "full_name": "0x6rss/CVE-2025-24071_PoC", "html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC", "description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File", - "stargazers_count": 272, - "forks_count": 40, + "stargazers_count": 310, + "forks_count": 51, "created_at": "2025-03-16T20:10:19Z" }, + { + "name": "o3_finds_cve-2025-37899", + "full_name": "SeanHeelan/o3_finds_cve-2025-37899", + "html_url": "https://github.com/SeanHeelan/o3_finds_cve-2025-37899", + "description": "Artefacts for blog post on finding CVE-2025-37899 with o3", + "stargazers_count": 299, + "forks_count": 43, + "created_at": "2025-05-22T10:36:18Z" + }, { "name": "CVE-2025-21333-POC", "full_name": "MrAle98/CVE-2025-21333-POC", "html_url": "https://github.com/MrAle98/CVE-2025-21333-POC", "description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY", - "stargazers_count": 187, + "stargazers_count": 195, "forks_count": 31, "created_at": "2025-02-27T12:36:55Z" }, - { - "name": "CVE-2025-30208-EXP", - "full_name": "ThumpBo/CVE-2025-30208-EXP", - "html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP", - "description": "CVE-2025-30208-EXP", - "stargazers_count": 180, - "forks_count": 32, - "created_at": "2025-03-26T15:42:31Z" - }, { "name": "CVE-2025-21298", "full_name": "ynwarcs/CVE-2025-21298", "html_url": "https://github.com/ynwarcs/CVE-2025-21298", "description": "Proof of concept & details for CVE-2025-21298", - "stargazers_count": 176, - "forks_count": 44, + "stargazers_count": 184, + "forks_count": 46, "created_at": "2025-01-20T18:16:51Z" }, { - "name": "7-Zip-CVE-2025-0411-POC", - "full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC", - "html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC", - "description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.", - "stargazers_count": 129, + "name": "CVE-2025-30208-EXP", + "full_name": "ThumpBo/CVE-2025-30208-EXP", + "html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP", + "description": "CVE-2025-30208-EXP", + "stargazers_count": 184, "forks_count": 32, - "created_at": "2025-01-22T14:40:34Z" - }, - { - "name": "CVE-2025-26125", - "full_name": "ZeroMemoryEx/CVE-2025-26125", - "html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125", - "description": "(0day) Local Privilege Escalation in IObit Malware Fighter", - "stargazers_count": 127, - "forks_count": 18, - "created_at": "2025-01-08T05:50:07Z" + "created_at": "2025-03-26T15:42:31Z" }, { "name": "POC-CVE-2025-24813", "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 111, - "forks_count": 31, + "stargazers_count": 143, + "forks_count": 35, "created_at": "2025-03-14T07:36:58Z" }, + { + "name": "CVE-2025-26125", + "full_name": "ZeroMemoryEx/CVE-2025-26125", + "html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125", + "description": "(0day) Local Privilege Escalation in IObit Malware Fighter", + "stargazers_count": 142, + "forks_count": 23, + "created_at": "2025-01-08T05:50:07Z" + }, + { + "name": "CVE-2025-21756", + "full_name": "hoefler02/CVE-2025-21756", + "html_url": "https://github.com/hoefler02/CVE-2025-21756", + "description": "Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!", + "stargazers_count": 140, + "forks_count": 21, + "created_at": "2025-04-18T14:22:15Z" + }, + { + "name": "7-Zip-CVE-2025-0411-POC", + "full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC", + "html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC", + "description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.", + "stargazers_count": 137, + "forks_count": 33, + "created_at": "2025-01-22T14:40:34Z" + }, { "name": "CVE-2025-32433", "full_name": "ProDefense/CVE-2025-32433", "html_url": "https://github.com/ProDefense/CVE-2025-32433", "description": "CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2", - "stargazers_count": 95, - "forks_count": 25, + "stargazers_count": 112, + "forks_count": 24, "created_at": "2025-04-18T00:35:11Z" }, { @@ -85,45 +112,63 @@ "full_name": "iSee857/CVE-2025-24813-PoC", "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", - "stargazers_count": 83, - "forks_count": 25, + "stargazers_count": 86, + "forks_count": 26, "created_at": "2025-03-13T10:00:03Z" }, - { - "name": "CVE-2025-21420-PoC", - "full_name": "Network-Sec/CVE-2025-21420-PoC", - "html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC", - "description": "We found a way to DLL sideload with cleanmgr.exe", - "stargazers_count": 76, - "forks_count": 18, - "created_at": "2025-02-17T08:59:22Z" - }, { "name": "ingressNightmare-CVE-2025-1974-exps", "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available. ", - "stargazers_count": 72, - "forks_count": 13, + "stargazers_count": 84, + "forks_count": 14, "created_at": "2025-03-26T06:43:36Z" }, + { + "name": "CVE-2025-21420-PoC", + "full_name": "Network-Sec/CVE-2025-21420-PoC", + "html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC", + "description": "We found a way to DLL sideload with cleanmgr.exe", + "stargazers_count": 80, + "forks_count": 18, + "created_at": "2025-02-17T08:59:22Z" + }, { "name": "CVE-2025-29927", "full_name": "aydinnyunus/CVE-2025-29927", "html_url": "https://github.com/aydinnyunus/CVE-2025-29927", "description": "CVE-2025-29927 Proof of Concept", - "stargazers_count": 70, - "forks_count": 26, + "stargazers_count": 78, + "forks_count": 24, "created_at": "2025-03-23T12:13:35Z" }, { - "name": "CVE-2025-21756", - "full_name": "hoefler02/CVE-2025-21756", - "html_url": "https://github.com/hoefler02/CVE-2025-21756", - "description": "Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!", - "stargazers_count": 63, - "forks_count": 9, - "created_at": "2025-04-18T14:22:15Z" + "name": "CVE-2025-32756-POC", + "full_name": "kn0x0x/CVE-2025-32756-POC", + "html_url": "https://github.com/kn0x0x/CVE-2025-32756-POC", + "description": "Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.", + "stargazers_count": 78, + "forks_count": 24, + "created_at": "2025-06-05T14:16:31Z" + }, + { + "name": "CVE-2025-49113", + "full_name": "fearsoff-org/CVE-2025-49113", + "html_url": "https://github.com/fearsoff-org/CVE-2025-49113", + "description": null, + "stargazers_count": 67, + "forks_count": 14, + "created_at": "2025-06-04T15:49:43Z" + }, + { + "name": "CVE-2025-22457", + "full_name": "sfewer-r7/CVE-2025-22457", + "html_url": "https://github.com/sfewer-r7/CVE-2025-22457", + "description": "PoC for CVE-2025-22457", + "stargazers_count": 66, + "forks_count": 14, + "created_at": "2025-04-09T14:39:25Z" }, { "name": "CVE_2019_2025_EXP", @@ -131,42 +176,78 @@ "html_url": "https://github.com/jltxgcy/CVE_2019_2025_EXP", "description": null, "stargazers_count": 61, - "forks_count": 46, + "forks_count": 45, "created_at": "2019-09-30T02:40:21Z" }, { - "name": "CVE-2025-22457", - "full_name": "sfewer-r7/CVE-2025-22457", - "html_url": "https://github.com/sfewer-r7/CVE-2025-22457", - "description": "PoC for CVE-2025-22457", - "stargazers_count": 58, - "forks_count": 13, - "created_at": "2025-04-09T14:39:25Z" + "name": "CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-", + "full_name": "mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-", + "html_url": "https://github.com/mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-", + "description": "Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)", + "stargazers_count": 57, + "forks_count": 14, + "created_at": "2025-05-31T12:20:36Z" + }, + { + "name": "CVE-2025-24016", + "full_name": "MuhammadWaseem29/CVE-2025-24016", + "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016", + "description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ", + "stargazers_count": 51, + "forks_count": 6, + "created_at": "2025-02-20T23:31:03Z" + }, + { + "name": "CVE-2025-49144_PoC", + "full_name": "TheTorjanCaptain/CVE-2025-49144_PoC", + "html_url": "https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC", + "description": "CVE-2025-49144 PoC for security researchers to test and try.", + "stargazers_count": 49, + "forks_count": 18, + "created_at": "2025-06-25T19:23:57Z" }, { "name": "CVE-2025-1974", "full_name": "yoshino-s/CVE-2025-1974", "html_url": "https://github.com/yoshino-s/CVE-2025-1974", "description": null, - "stargazers_count": 47, - "forks_count": 10, + "stargazers_count": 49, + "forks_count": 11, "created_at": "2025-03-25T13:23:01Z" }, + { + "name": "CVE-2025-33053-Proof-Of-Concept", + "full_name": "DevBuiHieu/CVE-2025-33053-Proof-Of-Concept", + "html_url": "https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept", + "description": "CVE-2025-33053 Proof Of Concept (PoC)", + "stargazers_count": 49, + "forks_count": 15, + "created_at": "2025-06-12T06:48:55Z" + }, { "name": "CVE-2025-0282-Ivanti-exploit", "full_name": "absholi7ly/CVE-2025-0282-Ivanti-exploit", "html_url": "https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit", "description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.", - "stargazers_count": 47, + "stargazers_count": 46, "forks_count": 13, "created_at": "2025-01-11T02:06:51Z" }, + { + "name": "CVE-2025-0282", + "full_name": "sfewer-r7/CVE-2025-0282", + "html_url": "https://github.com/sfewer-r7/CVE-2025-0282", + "description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways", + "stargazers_count": 45, + "forks_count": 12, + "created_at": "2025-01-16T14:45:53Z" + }, { "name": "CVE-2025-24118", "full_name": "jprx/CVE-2025-24118", "html_url": "https://github.com/jprx/CVE-2025-24118", "description": "An XNU kernel race condition bug", - "stargazers_count": 41, + "stargazers_count": 43, "forks_count": 5, "created_at": "2025-01-30T00:10:44Z" }, @@ -175,98 +256,17 @@ "full_name": "xuemian168/CVE-2025-30208", "html_url": "https://github.com/xuemian168/CVE-2025-30208", "description": "全网首发 CVE-2025-31125 CVE-2025-30208 CVE-2025-32395 Vite Scanner", - "stargazers_count": 41, + "stargazers_count": 42, "forks_count": 1, "created_at": "2025-03-26T10:26:12Z" }, { - "name": "CVE-2025-0282", - "full_name": "sfewer-r7/CVE-2025-0282", - "html_url": "https://github.com/sfewer-r7/CVE-2025-0282", - "description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways", - "stargazers_count": 39, - "forks_count": 12, - "created_at": "2025-01-16T14:45:53Z" - }, - { - "name": "CVE-2025-24016", - "full_name": "MuhammadWaseem29/CVE-2025-24016", - "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016", - "description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ", - "stargazers_count": 37, - "forks_count": 5, - "created_at": "2025-02-20T23:31:03Z" - }, - { - "name": "CVE-2025-24016", - "full_name": "0xjessie21/CVE-2025-24016", - "html_url": "https://github.com/0xjessie21/CVE-2025-24016", - "description": "CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)", - "stargazers_count": 36, - "forks_count": 6, - "created_at": "2025-02-16T11:01:12Z" - }, - { - "name": "CVE-2025-24104", - "full_name": "ifpdz/CVE-2025-24104", - "html_url": "https://github.com/ifpdz/CVE-2025-24104", + "name": "CVE-2025-6019", + "full_name": "guinea-offensive-security/CVE-2025-6019", + "html_url": "https://github.com/guinea-offensive-security/CVE-2025-6019", "description": null, - "stargazers_count": 35, - "forks_count": 6, - "created_at": "2025-01-24T10:41:12Z" - }, - { - "name": "CVE-2025-23369", - "full_name": "hakivvi/CVE-2025-23369", - "html_url": "https://github.com/hakivvi/CVE-2025-23369", - "description": "GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit", - "stargazers_count": 35, - "forks_count": 1, - "created_at": "2025-02-08T18:13:04Z" - }, - { - "name": "CVE-2025-0401", - "full_name": "CyberSecurityUP/CVE-2025-0401", - "html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401", - "description": "Privilege Escalation using Passwd - April Fools prank", - "stargazers_count": 33, - "forks_count": 8, - "created_at": "2025-04-01T14:23:43Z" - }, - { - "name": "CVE-2025-27636-Apache-Camel-PoC", - "full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC", - "html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC", - "description": null, - "stargazers_count": 32, - "forks_count": 8, - "created_at": "2025-03-09T09:42:11Z" - }, - { - "name": "CVE-2025-24813", - "full_name": "MuhammadWaseem29/CVE-2025-24813", - "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813", - "description": null, - "stargazers_count": 30, - "forks_count": 6, - "created_at": "2025-04-05T18:57:08Z" - }, - { - "name": "CVE-2025-0108-PoC", - "full_name": "iSee857/CVE-2025-0108-PoC", - "html_url": "https://github.com/iSee857/CVE-2025-0108-PoC", - "description": "Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108)", - "stargazers_count": 26, - "forks_count": 20, - "created_at": "2025-02-13T06:39:25Z" - }, - { - "name": "CVE-2018-20250", - "full_name": "QAX-A-Team/CVE-2018-20250", - "html_url": "https://github.com/QAX-A-Team/CVE-2018-20250", - "description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]", - "stargazers_count": 25, - "forks_count": 14, - "created_at": "2019-02-22T06:47:01Z" + "stargazers_count": 40, + "forks_count": 9, + "created_at": "2025-06-19T02:42:21Z" } ] \ No newline at end of file