Update recent feed data

This commit is contained in:
Brendan McDevitt 2025-07-01 01:11:44 +00:00
parent 541c8bd95b
commit 64364a21f4
2 changed files with 157 additions and 157 deletions

View file

@ -13,7 +13,7 @@
"full_name": "pankass/CVE-2024-37032_CVE-2024-45436",
"html_url": "https://github.com/pankass/CVE-2024-37032_CVE-2024-45436",
"description": "CVE-2024-45436",
"stargazers_count": 4,
"stargazers_count": 5,
"forks_count": 0,
"created_at": "2024-10-21T05:44:49Z"
},

View file

@ -4,80 +4,107 @@
"full_name": "WyAtu/CVE-2018-20250",
"html_url": "https://github.com/WyAtu/CVE-2018-20250",
"description": "exp for https://research.checkpoint.com/extracting-code-execution-from-winrar",
"stargazers_count": 489,
"stargazers_count": 491,
"forks_count": 177,
"created_at": "2019-02-22T04:52:08Z"
},
{
"name": "CVE-2025-33073",
"full_name": "mverschu/CVE-2025-33073",
"html_url": "https://github.com/mverschu/CVE-2025-33073",
"description": "PoC Exploit for the NTLM reflection SMB flaw.",
"stargazers_count": 398,
"forks_count": 80,
"created_at": "2025-06-13T12:15:14Z"
},
{
"name": "CVE-2025-24071_PoC",
"full_name": "0x6rss/CVE-2025-24071_PoC",
"html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC",
"description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File",
"stargazers_count": 272,
"forks_count": 40,
"stargazers_count": 310,
"forks_count": 51,
"created_at": "2025-03-16T20:10:19Z"
},
{
"name": "o3_finds_cve-2025-37899",
"full_name": "SeanHeelan/o3_finds_cve-2025-37899",
"html_url": "https://github.com/SeanHeelan/o3_finds_cve-2025-37899",
"description": "Artefacts for blog post on finding CVE-2025-37899 with o3",
"stargazers_count": 299,
"forks_count": 43,
"created_at": "2025-05-22T10:36:18Z"
},
{
"name": "CVE-2025-21333-POC",
"full_name": "MrAle98/CVE-2025-21333-POC",
"html_url": "https://github.com/MrAle98/CVE-2025-21333-POC",
"description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY",
"stargazers_count": 187,
"stargazers_count": 195,
"forks_count": 31,
"created_at": "2025-02-27T12:36:55Z"
},
{
"name": "CVE-2025-30208-EXP",
"full_name": "ThumpBo/CVE-2025-30208-EXP",
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
"description": "CVE-2025-30208-EXP",
"stargazers_count": 180,
"forks_count": 32,
"created_at": "2025-03-26T15:42:31Z"
},
{
"name": "CVE-2025-21298",
"full_name": "ynwarcs/CVE-2025-21298",
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
"description": "Proof of concept & details for CVE-2025-21298",
"stargazers_count": 176,
"forks_count": 44,
"stargazers_count": 184,
"forks_count": 46,
"created_at": "2025-01-20T18:16:51Z"
},
{
"name": "7-Zip-CVE-2025-0411-POC",
"full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC",
"html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC",
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
"stargazers_count": 129,
"name": "CVE-2025-30208-EXP",
"full_name": "ThumpBo/CVE-2025-30208-EXP",
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
"description": "CVE-2025-30208-EXP",
"stargazers_count": 184,
"forks_count": 32,
"created_at": "2025-01-22T14:40:34Z"
},
{
"name": "CVE-2025-26125",
"full_name": "ZeroMemoryEx/CVE-2025-26125",
"html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125",
"description": "(0day) Local Privilege Escalation in IObit Malware Fighter",
"stargazers_count": 127,
"forks_count": 18,
"created_at": "2025-01-08T05:50:07Z"
"created_at": "2025-03-26T15:42:31Z"
},
{
"name": "POC-CVE-2025-24813",
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 111,
"forks_count": 31,
"stargazers_count": 143,
"forks_count": 35,
"created_at": "2025-03-14T07:36:58Z"
},
{
"name": "CVE-2025-26125",
"full_name": "ZeroMemoryEx/CVE-2025-26125",
"html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125",
"description": "(0day) Local Privilege Escalation in IObit Malware Fighter",
"stargazers_count": 142,
"forks_count": 23,
"created_at": "2025-01-08T05:50:07Z"
},
{
"name": "CVE-2025-21756",
"full_name": "hoefler02/CVE-2025-21756",
"html_url": "https://github.com/hoefler02/CVE-2025-21756",
"description": "Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!",
"stargazers_count": 140,
"forks_count": 21,
"created_at": "2025-04-18T14:22:15Z"
},
{
"name": "7-Zip-CVE-2025-0411-POC",
"full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC",
"html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC",
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
"stargazers_count": 137,
"forks_count": 33,
"created_at": "2025-01-22T14:40:34Z"
},
{
"name": "CVE-2025-32433",
"full_name": "ProDefense/CVE-2025-32433",
"html_url": "https://github.com/ProDefense/CVE-2025-32433",
"description": "CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2",
"stargazers_count": 95,
"forks_count": 25,
"stargazers_count": 112,
"forks_count": 24,
"created_at": "2025-04-18T00:35:11Z"
},
{
@ -85,45 +112,63 @@
"full_name": "iSee857/CVE-2025-24813-PoC",
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
"stargazers_count": 83,
"forks_count": 25,
"stargazers_count": 86,
"forks_count": 26,
"created_at": "2025-03-13T10:00:03Z"
},
{
"name": "CVE-2025-21420-PoC",
"full_name": "Network-Sec/CVE-2025-21420-PoC",
"html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC",
"description": "We found a way to DLL sideload with cleanmgr.exe",
"stargazers_count": 76,
"forks_count": 18,
"created_at": "2025-02-17T08:59:22Z"
},
{
"name": "ingressNightmare-CVE-2025-1974-exps",
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 mirror UID injection -- all available. ",
"stargazers_count": 72,
"forks_count": 13,
"stargazers_count": 84,
"forks_count": 14,
"created_at": "2025-03-26T06:43:36Z"
},
{
"name": "CVE-2025-21420-PoC",
"full_name": "Network-Sec/CVE-2025-21420-PoC",
"html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC",
"description": "We found a way to DLL sideload with cleanmgr.exe",
"stargazers_count": 80,
"forks_count": 18,
"created_at": "2025-02-17T08:59:22Z"
},
{
"name": "CVE-2025-29927",
"full_name": "aydinnyunus/CVE-2025-29927",
"html_url": "https://github.com/aydinnyunus/CVE-2025-29927",
"description": "CVE-2025-29927 Proof of Concept",
"stargazers_count": 70,
"forks_count": 26,
"stargazers_count": 78,
"forks_count": 24,
"created_at": "2025-03-23T12:13:35Z"
},
{
"name": "CVE-2025-21756",
"full_name": "hoefler02/CVE-2025-21756",
"html_url": "https://github.com/hoefler02/CVE-2025-21756",
"description": "Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!",
"stargazers_count": 63,
"forks_count": 9,
"created_at": "2025-04-18T14:22:15Z"
"name": "CVE-2025-32756-POC",
"full_name": "kn0x0x/CVE-2025-32756-POC",
"html_url": "https://github.com/kn0x0x/CVE-2025-32756-POC",
"description": "Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.",
"stargazers_count": 78,
"forks_count": 24,
"created_at": "2025-06-05T14:16:31Z"
},
{
"name": "CVE-2025-49113",
"full_name": "fearsoff-org/CVE-2025-49113",
"html_url": "https://github.com/fearsoff-org/CVE-2025-49113",
"description": null,
"stargazers_count": 67,
"forks_count": 14,
"created_at": "2025-06-04T15:49:43Z"
},
{
"name": "CVE-2025-22457",
"full_name": "sfewer-r7/CVE-2025-22457",
"html_url": "https://github.com/sfewer-r7/CVE-2025-22457",
"description": "PoC for CVE-2025-22457",
"stargazers_count": 66,
"forks_count": 14,
"created_at": "2025-04-09T14:39:25Z"
},
{
"name": "CVE_2019_2025_EXP",
@ -131,42 +176,78 @@
"html_url": "https://github.com/jltxgcy/CVE_2019_2025_EXP",
"description": null,
"stargazers_count": 61,
"forks_count": 46,
"forks_count": 45,
"created_at": "2019-09-30T02:40:21Z"
},
{
"name": "CVE-2025-22457",
"full_name": "sfewer-r7/CVE-2025-22457",
"html_url": "https://github.com/sfewer-r7/CVE-2025-22457",
"description": "PoC for CVE-2025-22457",
"stargazers_count": 58,
"forks_count": 13,
"created_at": "2025-04-09T14:39:25Z"
"name": "CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-",
"full_name": "mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-",
"html_url": "https://github.com/mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-",
"description": "Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)",
"stargazers_count": 57,
"forks_count": 14,
"created_at": "2025-05-31T12:20:36Z"
},
{
"name": "CVE-2025-24016",
"full_name": "MuhammadWaseem29/CVE-2025-24016",
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016",
"description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ",
"stargazers_count": 51,
"forks_count": 6,
"created_at": "2025-02-20T23:31:03Z"
},
{
"name": "CVE-2025-49144_PoC",
"full_name": "TheTorjanCaptain/CVE-2025-49144_PoC",
"html_url": "https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC",
"description": "CVE-2025-49144 PoC for security researchers to test and try.",
"stargazers_count": 49,
"forks_count": 18,
"created_at": "2025-06-25T19:23:57Z"
},
{
"name": "CVE-2025-1974",
"full_name": "yoshino-s/CVE-2025-1974",
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
"description": null,
"stargazers_count": 47,
"forks_count": 10,
"stargazers_count": 49,
"forks_count": 11,
"created_at": "2025-03-25T13:23:01Z"
},
{
"name": "CVE-2025-33053-Proof-Of-Concept",
"full_name": "DevBuiHieu/CVE-2025-33053-Proof-Of-Concept",
"html_url": "https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept",
"description": "CVE-2025-33053 Proof Of Concept (PoC)",
"stargazers_count": 49,
"forks_count": 15,
"created_at": "2025-06-12T06:48:55Z"
},
{
"name": "CVE-2025-0282-Ivanti-exploit",
"full_name": "absholi7ly/CVE-2025-0282-Ivanti-exploit",
"html_url": "https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit",
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
"stargazers_count": 47,
"stargazers_count": 46,
"forks_count": 13,
"created_at": "2025-01-11T02:06:51Z"
},
{
"name": "CVE-2025-0282",
"full_name": "sfewer-r7/CVE-2025-0282",
"html_url": "https://github.com/sfewer-r7/CVE-2025-0282",
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
"stargazers_count": 45,
"forks_count": 12,
"created_at": "2025-01-16T14:45:53Z"
},
{
"name": "CVE-2025-24118",
"full_name": "jprx/CVE-2025-24118",
"html_url": "https://github.com/jprx/CVE-2025-24118",
"description": "An XNU kernel race condition bug",
"stargazers_count": 41,
"stargazers_count": 43,
"forks_count": 5,
"created_at": "2025-01-30T00:10:44Z"
},
@ -175,98 +256,17 @@
"full_name": "xuemian168/CVE-2025-30208",
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
"description": "全网首发 CVE-2025-31125 CVE-2025-30208 CVE-2025-32395 Vite Scanner",
"stargazers_count": 41,
"stargazers_count": 42,
"forks_count": 1,
"created_at": "2025-03-26T10:26:12Z"
},
{
"name": "CVE-2025-0282",
"full_name": "sfewer-r7/CVE-2025-0282",
"html_url": "https://github.com/sfewer-r7/CVE-2025-0282",
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
"stargazers_count": 39,
"forks_count": 12,
"created_at": "2025-01-16T14:45:53Z"
},
{
"name": "CVE-2025-24016",
"full_name": "MuhammadWaseem29/CVE-2025-24016",
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016",
"description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ",
"stargazers_count": 37,
"forks_count": 5,
"created_at": "2025-02-20T23:31:03Z"
},
{
"name": "CVE-2025-24016",
"full_name": "0xjessie21/CVE-2025-24016",
"html_url": "https://github.com/0xjessie21/CVE-2025-24016",
"description": "CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)",
"stargazers_count": 36,
"forks_count": 6,
"created_at": "2025-02-16T11:01:12Z"
},
{
"name": "CVE-2025-24104",
"full_name": "ifpdz/CVE-2025-24104",
"html_url": "https://github.com/ifpdz/CVE-2025-24104",
"name": "CVE-2025-6019",
"full_name": "guinea-offensive-security/CVE-2025-6019",
"html_url": "https://github.com/guinea-offensive-security/CVE-2025-6019",
"description": null,
"stargazers_count": 35,
"forks_count": 6,
"created_at": "2025-01-24T10:41:12Z"
},
{
"name": "CVE-2025-23369",
"full_name": "hakivvi/CVE-2025-23369",
"html_url": "https://github.com/hakivvi/CVE-2025-23369",
"description": "GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit",
"stargazers_count": 35,
"forks_count": 1,
"created_at": "2025-02-08T18:13:04Z"
},
{
"name": "CVE-2025-0401",
"full_name": "CyberSecurityUP/CVE-2025-0401",
"html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401",
"description": "Privilege Escalation using Passwd - April Fools prank",
"stargazers_count": 33,
"forks_count": 8,
"created_at": "2025-04-01T14:23:43Z"
},
{
"name": "CVE-2025-27636-Apache-Camel-PoC",
"full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC",
"html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC",
"description": null,
"stargazers_count": 32,
"forks_count": 8,
"created_at": "2025-03-09T09:42:11Z"
},
{
"name": "CVE-2025-24813",
"full_name": "MuhammadWaseem29/CVE-2025-24813",
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
"description": null,
"stargazers_count": 30,
"forks_count": 6,
"created_at": "2025-04-05T18:57:08Z"
},
{
"name": "CVE-2025-0108-PoC",
"full_name": "iSee857/CVE-2025-0108-PoC",
"html_url": "https://github.com/iSee857/CVE-2025-0108-PoC",
"description": "Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108)",
"stargazers_count": 26,
"forks_count": 20,
"created_at": "2025-02-13T06:39:25Z"
},
{
"name": "CVE-2018-20250",
"full_name": "QAX-A-Team/CVE-2018-20250",
"html_url": "https://github.com/QAX-A-Team/CVE-2018-20250",
"description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]",
"stargazers_count": 25,
"forks_count": 14,
"created_at": "2019-02-22T06:47:01Z"
"stargazers_count": 40,
"forks_count": 9,
"created_at": "2025-06-19T02:42:21Z"
}
]