Update recent feed data
This commit is contained in:
parent
541c8bd95b
commit
64364a21f4
2 changed files with 157 additions and 157 deletions
|
@ -13,7 +13,7 @@
|
|||
"full_name": "pankass/CVE-2024-37032_CVE-2024-45436",
|
||||
"html_url": "https://github.com/pankass/CVE-2024-37032_CVE-2024-45436",
|
||||
"description": "CVE-2024-45436",
|
||||
"stargazers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-10-21T05:44:49Z"
|
||||
},
|
||||
|
|
|
@ -4,80 +4,107 @@
|
|||
"full_name": "WyAtu/CVE-2018-20250",
|
||||
"html_url": "https://github.com/WyAtu/CVE-2018-20250",
|
||||
"description": "exp for https://research.checkpoint.com/extracting-code-execution-from-winrar",
|
||||
"stargazers_count": 489,
|
||||
"stargazers_count": 491,
|
||||
"forks_count": 177,
|
||||
"created_at": "2019-02-22T04:52:08Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-33073",
|
||||
"full_name": "mverschu/CVE-2025-33073",
|
||||
"html_url": "https://github.com/mverschu/CVE-2025-33073",
|
||||
"description": "PoC Exploit for the NTLM reflection SMB flaw.",
|
||||
"stargazers_count": 398,
|
||||
"forks_count": 80,
|
||||
"created_at": "2025-06-13T12:15:14Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24071_PoC",
|
||||
"full_name": "0x6rss/CVE-2025-24071_PoC",
|
||||
"html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC",
|
||||
"description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File",
|
||||
"stargazers_count": 272,
|
||||
"forks_count": 40,
|
||||
"stargazers_count": 310,
|
||||
"forks_count": 51,
|
||||
"created_at": "2025-03-16T20:10:19Z"
|
||||
},
|
||||
{
|
||||
"name": "o3_finds_cve-2025-37899",
|
||||
"full_name": "SeanHeelan/o3_finds_cve-2025-37899",
|
||||
"html_url": "https://github.com/SeanHeelan/o3_finds_cve-2025-37899",
|
||||
"description": "Artefacts for blog post on finding CVE-2025-37899 with o3",
|
||||
"stargazers_count": 299,
|
||||
"forks_count": 43,
|
||||
"created_at": "2025-05-22T10:36:18Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-21333-POC",
|
||||
"full_name": "MrAle98/CVE-2025-21333-POC",
|
||||
"html_url": "https://github.com/MrAle98/CVE-2025-21333-POC",
|
||||
"description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY",
|
||||
"stargazers_count": 187,
|
||||
"stargazers_count": 195,
|
||||
"forks_count": 31,
|
||||
"created_at": "2025-02-27T12:36:55Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-30208-EXP",
|
||||
"full_name": "ThumpBo/CVE-2025-30208-EXP",
|
||||
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
|
||||
"description": "CVE-2025-30208-EXP",
|
||||
"stargazers_count": 180,
|
||||
"forks_count": 32,
|
||||
"created_at": "2025-03-26T15:42:31Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-21298",
|
||||
"full_name": "ynwarcs/CVE-2025-21298",
|
||||
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
|
||||
"description": "Proof of concept & details for CVE-2025-21298",
|
||||
"stargazers_count": 176,
|
||||
"forks_count": 44,
|
||||
"stargazers_count": 184,
|
||||
"forks_count": 46,
|
||||
"created_at": "2025-01-20T18:16:51Z"
|
||||
},
|
||||
{
|
||||
"name": "7-Zip-CVE-2025-0411-POC",
|
||||
"full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC",
|
||||
"html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC",
|
||||
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
|
||||
"stargazers_count": 129,
|
||||
"name": "CVE-2025-30208-EXP",
|
||||
"full_name": "ThumpBo/CVE-2025-30208-EXP",
|
||||
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
|
||||
"description": "CVE-2025-30208-EXP",
|
||||
"stargazers_count": 184,
|
||||
"forks_count": 32,
|
||||
"created_at": "2025-01-22T14:40:34Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-26125",
|
||||
"full_name": "ZeroMemoryEx/CVE-2025-26125",
|
||||
"html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125",
|
||||
"description": "(0day) Local Privilege Escalation in IObit Malware Fighter",
|
||||
"stargazers_count": 127,
|
||||
"forks_count": 18,
|
||||
"created_at": "2025-01-08T05:50:07Z"
|
||||
"created_at": "2025-03-26T15:42:31Z"
|
||||
},
|
||||
{
|
||||
"name": "POC-CVE-2025-24813",
|
||||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||
"stargazers_count": 111,
|
||||
"forks_count": 31,
|
||||
"stargazers_count": 143,
|
||||
"forks_count": 35,
|
||||
"created_at": "2025-03-14T07:36:58Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-26125",
|
||||
"full_name": "ZeroMemoryEx/CVE-2025-26125",
|
||||
"html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125",
|
||||
"description": "(0day) Local Privilege Escalation in IObit Malware Fighter",
|
||||
"stargazers_count": 142,
|
||||
"forks_count": 23,
|
||||
"created_at": "2025-01-08T05:50:07Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-21756",
|
||||
"full_name": "hoefler02/CVE-2025-21756",
|
||||
"html_url": "https://github.com/hoefler02/CVE-2025-21756",
|
||||
"description": "Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!",
|
||||
"stargazers_count": 140,
|
||||
"forks_count": 21,
|
||||
"created_at": "2025-04-18T14:22:15Z"
|
||||
},
|
||||
{
|
||||
"name": "7-Zip-CVE-2025-0411-POC",
|
||||
"full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC",
|
||||
"html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC",
|
||||
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
|
||||
"stargazers_count": 137,
|
||||
"forks_count": 33,
|
||||
"created_at": "2025-01-22T14:40:34Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-32433",
|
||||
"full_name": "ProDefense/CVE-2025-32433",
|
||||
"html_url": "https://github.com/ProDefense/CVE-2025-32433",
|
||||
"description": "CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2",
|
||||
"stargazers_count": 95,
|
||||
"forks_count": 25,
|
||||
"stargazers_count": 112,
|
||||
"forks_count": 24,
|
||||
"created_at": "2025-04-18T00:35:11Z"
|
||||
},
|
||||
{
|
||||
|
@ -85,45 +112,63 @@
|
|||
"full_name": "iSee857/CVE-2025-24813-PoC",
|
||||
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
||||
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
||||
"stargazers_count": 83,
|
||||
"forks_count": 25,
|
||||
"stargazers_count": 86,
|
||||
"forks_count": 26,
|
||||
"created_at": "2025-03-13T10:00:03Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-21420-PoC",
|
||||
"full_name": "Network-Sec/CVE-2025-21420-PoC",
|
||||
"html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC",
|
||||
"description": "We found a way to DLL sideload with cleanmgr.exe",
|
||||
"stargazers_count": 76,
|
||||
"forks_count": 18,
|
||||
"created_at": "2025-02-17T08:59:22Z"
|
||||
},
|
||||
{
|
||||
"name": "ingressNightmare-CVE-2025-1974-exps",
|
||||
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||||
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||||
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available. ",
|
||||
"stargazers_count": 72,
|
||||
"forks_count": 13,
|
||||
"stargazers_count": 84,
|
||||
"forks_count": 14,
|
||||
"created_at": "2025-03-26T06:43:36Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-21420-PoC",
|
||||
"full_name": "Network-Sec/CVE-2025-21420-PoC",
|
||||
"html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC",
|
||||
"description": "We found a way to DLL sideload with cleanmgr.exe",
|
||||
"stargazers_count": 80,
|
||||
"forks_count": 18,
|
||||
"created_at": "2025-02-17T08:59:22Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-29927",
|
||||
"full_name": "aydinnyunus/CVE-2025-29927",
|
||||
"html_url": "https://github.com/aydinnyunus/CVE-2025-29927",
|
||||
"description": "CVE-2025-29927 Proof of Concept",
|
||||
"stargazers_count": 70,
|
||||
"forks_count": 26,
|
||||
"stargazers_count": 78,
|
||||
"forks_count": 24,
|
||||
"created_at": "2025-03-23T12:13:35Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-21756",
|
||||
"full_name": "hoefler02/CVE-2025-21756",
|
||||
"html_url": "https://github.com/hoefler02/CVE-2025-21756",
|
||||
"description": "Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!",
|
||||
"stargazers_count": 63,
|
||||
"forks_count": 9,
|
||||
"created_at": "2025-04-18T14:22:15Z"
|
||||
"name": "CVE-2025-32756-POC",
|
||||
"full_name": "kn0x0x/CVE-2025-32756-POC",
|
||||
"html_url": "https://github.com/kn0x0x/CVE-2025-32756-POC",
|
||||
"description": "Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.",
|
||||
"stargazers_count": 78,
|
||||
"forks_count": 24,
|
||||
"created_at": "2025-06-05T14:16:31Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-49113",
|
||||
"full_name": "fearsoff-org/CVE-2025-49113",
|
||||
"html_url": "https://github.com/fearsoff-org/CVE-2025-49113",
|
||||
"description": null,
|
||||
"stargazers_count": 67,
|
||||
"forks_count": 14,
|
||||
"created_at": "2025-06-04T15:49:43Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-22457",
|
||||
"full_name": "sfewer-r7/CVE-2025-22457",
|
||||
"html_url": "https://github.com/sfewer-r7/CVE-2025-22457",
|
||||
"description": "PoC for CVE-2025-22457",
|
||||
"stargazers_count": 66,
|
||||
"forks_count": 14,
|
||||
"created_at": "2025-04-09T14:39:25Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE_2019_2025_EXP",
|
||||
|
@ -131,42 +176,78 @@
|
|||
"html_url": "https://github.com/jltxgcy/CVE_2019_2025_EXP",
|
||||
"description": null,
|
||||
"stargazers_count": 61,
|
||||
"forks_count": 46,
|
||||
"forks_count": 45,
|
||||
"created_at": "2019-09-30T02:40:21Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-22457",
|
||||
"full_name": "sfewer-r7/CVE-2025-22457",
|
||||
"html_url": "https://github.com/sfewer-r7/CVE-2025-22457",
|
||||
"description": "PoC for CVE-2025-22457",
|
||||
"stargazers_count": 58,
|
||||
"forks_count": 13,
|
||||
"created_at": "2025-04-09T14:39:25Z"
|
||||
"name": "CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-",
|
||||
"full_name": "mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-",
|
||||
"html_url": "https://github.com/mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-",
|
||||
"description": "Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)",
|
||||
"stargazers_count": 57,
|
||||
"forks_count": 14,
|
||||
"created_at": "2025-05-31T12:20:36Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24016",
|
||||
"full_name": "MuhammadWaseem29/CVE-2025-24016",
|
||||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016",
|
||||
"description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ",
|
||||
"stargazers_count": 51,
|
||||
"forks_count": 6,
|
||||
"created_at": "2025-02-20T23:31:03Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-49144_PoC",
|
||||
"full_name": "TheTorjanCaptain/CVE-2025-49144_PoC",
|
||||
"html_url": "https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC",
|
||||
"description": "CVE-2025-49144 PoC for security researchers to test and try.",
|
||||
"stargazers_count": 49,
|
||||
"forks_count": 18,
|
||||
"created_at": "2025-06-25T19:23:57Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-1974",
|
||||
"full_name": "yoshino-s/CVE-2025-1974",
|
||||
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
|
||||
"description": null,
|
||||
"stargazers_count": 47,
|
||||
"forks_count": 10,
|
||||
"stargazers_count": 49,
|
||||
"forks_count": 11,
|
||||
"created_at": "2025-03-25T13:23:01Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-33053-Proof-Of-Concept",
|
||||
"full_name": "DevBuiHieu/CVE-2025-33053-Proof-Of-Concept",
|
||||
"html_url": "https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept",
|
||||
"description": "CVE-2025-33053 Proof Of Concept (PoC)",
|
||||
"stargazers_count": 49,
|
||||
"forks_count": 15,
|
||||
"created_at": "2025-06-12T06:48:55Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-0282-Ivanti-exploit",
|
||||
"full_name": "absholi7ly/CVE-2025-0282-Ivanti-exploit",
|
||||
"html_url": "https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit",
|
||||
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
|
||||
"stargazers_count": 47,
|
||||
"stargazers_count": 46,
|
||||
"forks_count": 13,
|
||||
"created_at": "2025-01-11T02:06:51Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-0282",
|
||||
"full_name": "sfewer-r7/CVE-2025-0282",
|
||||
"html_url": "https://github.com/sfewer-r7/CVE-2025-0282",
|
||||
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
|
||||
"stargazers_count": 45,
|
||||
"forks_count": 12,
|
||||
"created_at": "2025-01-16T14:45:53Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24118",
|
||||
"full_name": "jprx/CVE-2025-24118",
|
||||
"html_url": "https://github.com/jprx/CVE-2025-24118",
|
||||
"description": "An XNU kernel race condition bug",
|
||||
"stargazers_count": 41,
|
||||
"stargazers_count": 43,
|
||||
"forks_count": 5,
|
||||
"created_at": "2025-01-30T00:10:44Z"
|
||||
},
|
||||
|
@ -175,98 +256,17 @@
|
|||
"full_name": "xuemian168/CVE-2025-30208",
|
||||
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
|
||||
"description": "全网首发 CVE-2025-31125 CVE-2025-30208 CVE-2025-32395 Vite Scanner",
|
||||
"stargazers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-03-26T10:26:12Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-0282",
|
||||
"full_name": "sfewer-r7/CVE-2025-0282",
|
||||
"html_url": "https://github.com/sfewer-r7/CVE-2025-0282",
|
||||
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
|
||||
"stargazers_count": 39,
|
||||
"forks_count": 12,
|
||||
"created_at": "2025-01-16T14:45:53Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24016",
|
||||
"full_name": "MuhammadWaseem29/CVE-2025-24016",
|
||||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016",
|
||||
"description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ",
|
||||
"stargazers_count": 37,
|
||||
"forks_count": 5,
|
||||
"created_at": "2025-02-20T23:31:03Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24016",
|
||||
"full_name": "0xjessie21/CVE-2025-24016",
|
||||
"html_url": "https://github.com/0xjessie21/CVE-2025-24016",
|
||||
"description": "CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)",
|
||||
"stargazers_count": 36,
|
||||
"forks_count": 6,
|
||||
"created_at": "2025-02-16T11:01:12Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24104",
|
||||
"full_name": "ifpdz/CVE-2025-24104",
|
||||
"html_url": "https://github.com/ifpdz/CVE-2025-24104",
|
||||
"name": "CVE-2025-6019",
|
||||
"full_name": "guinea-offensive-security/CVE-2025-6019",
|
||||
"html_url": "https://github.com/guinea-offensive-security/CVE-2025-6019",
|
||||
"description": null,
|
||||
"stargazers_count": 35,
|
||||
"forks_count": 6,
|
||||
"created_at": "2025-01-24T10:41:12Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-23369",
|
||||
"full_name": "hakivvi/CVE-2025-23369",
|
||||
"html_url": "https://github.com/hakivvi/CVE-2025-23369",
|
||||
"description": "GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit",
|
||||
"stargazers_count": 35,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-02-08T18:13:04Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-0401",
|
||||
"full_name": "CyberSecurityUP/CVE-2025-0401",
|
||||
"html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401",
|
||||
"description": "Privilege Escalation using Passwd - April Fools prank",
|
||||
"stargazers_count": 33,
|
||||
"forks_count": 8,
|
||||
"created_at": "2025-04-01T14:23:43Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-27636-Apache-Camel-PoC",
|
||||
"full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC",
|
||||
"html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC",
|
||||
"description": null,
|
||||
"stargazers_count": 32,
|
||||
"forks_count": 8,
|
||||
"created_at": "2025-03-09T09:42:11Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "MuhammadWaseem29/CVE-2025-24813",
|
||||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
|
||||
"description": null,
|
||||
"stargazers_count": 30,
|
||||
"forks_count": 6,
|
||||
"created_at": "2025-04-05T18:57:08Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-0108-PoC",
|
||||
"full_name": "iSee857/CVE-2025-0108-PoC",
|
||||
"html_url": "https://github.com/iSee857/CVE-2025-0108-PoC",
|
||||
"description": "Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108)",
|
||||
"stargazers_count": 26,
|
||||
"forks_count": 20,
|
||||
"created_at": "2025-02-13T06:39:25Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2018-20250",
|
||||
"full_name": "QAX-A-Team/CVE-2018-20250",
|
||||
"html_url": "https://github.com/QAX-A-Team/CVE-2018-20250",
|
||||
"description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]",
|
||||
"stargazers_count": 25,
|
||||
"forks_count": 14,
|
||||
"created_at": "2019-02-22T06:47:01Z"
|
||||
"stargazers_count": 40,
|
||||
"forks_count": 9,
|
||||
"created_at": "2025-06-19T02:42:21Z"
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue