diff --git a/exploits/2024/CVE-2024-55968.json b/exploits/2024/CVE-2024-55968.json index fef0dc7..66627aa 100644 --- a/exploits/2024/CVE-2024-55968.json +++ b/exploits/2024/CVE-2024-55968.json @@ -1,4 +1,13 @@ [ + { + "name": "CVE-2024-55968", + "full_name": "null-event/CVE-2024-55968", + "html_url": "https://github.com/null-event/CVE-2024-55968", + "description": "POC for DTEX LPE (CVE-2024-55968)", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2024-12-17T21:08:11Z" + }, { "name": "CVE-2024-55968", "full_name": "Wi1DN00B/CVE-2024-55968", @@ -7,14 +16,5 @@ "stargazers_count": 2, "forks_count": 0, "created_at": "2024-12-17T21:07:59Z" - }, - { - "name": "CVE-2024-55968", - "full_name": "null-event/CVE-2024-55968", - "html_url": "https://github.com/null-event/CVE-2024-55968", - "description": "POC for DTEX LPE (CVE-2024-55968)", - "stargazers_count": 1, - "forks_count": 0, - "created_at": "2024-12-17T21:08:11Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-1974.json b/exploits/2025/CVE-2025-1974.json index edb88a2..7cbf115 100644 --- a/exploits/2025/CVE-2025-1974.json +++ b/exploits/2025/CVE-2025-1974.json @@ -4,8 +4,8 @@ "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available", - "stargazers_count": 60, - "forks_count": 9, + "stargazers_count": 64, + "forks_count": 11, "created_at": "2025-03-26T06:43:36Z" }, { @@ -13,7 +13,7 @@ "full_name": "yoshino-s/CVE-2025-1974", "html_url": "https://github.com/yoshino-s/CVE-2025-1974", "description": null, - "stargazers_count": 43, + "stargazers_count": 44, "forks_count": 10, "created_at": "2025-03-25T13:23:01Z" }, @@ -62,6 +62,15 @@ "forks_count": 0, "created_at": "2025-03-31T08:31:03Z" }, + { + "name": "CVE-2025-1974-go", + "full_name": "Rubby2001/CVE-2025-1974-go", + "html_url": "https://github.com/Rubby2001/CVE-2025-1974-go", + "description": "Exploit CVE-2025-1974 with a single file.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-10T07:25:03Z" + }, { "name": "POC-IngressNightmare-CVE-2025-1974", "full_name": "rjhaikal/POC-IngressNightmare-CVE-2025-1974", diff --git a/exploits/2025/CVE-2025-2025.json b/exploits/2025/CVE-2025-2025.json index a6daa52..dc3faaa 100644 --- a/exploits/2025/CVE-2025-2025.json +++ b/exploits/2025/CVE-2025-2025.json @@ -13,8 +13,8 @@ "full_name": "0x6rss/CVE-2025-24071_PoC", "html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC", "description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File", - "stargazers_count": 218, - "forks_count": 36, + "stargazers_count": 230, + "forks_count": 37, "created_at": "2025-03-16T20:10:19Z" }, { @@ -22,7 +22,7 @@ "full_name": "MrAle98/CVE-2025-21333-POC", "html_url": "https://github.com/MrAle98/CVE-2025-21333-POC", "description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY", - "stargazers_count": 180, + "stargazers_count": 182, "forks_count": 31, "created_at": "2025-02-27T12:36:55Z" }, @@ -31,7 +31,7 @@ "full_name": "ynwarcs/CVE-2025-21298", "html_url": "https://github.com/ynwarcs/CVE-2025-21298", "description": "Proof of concept & details for CVE-2025-21298", - "stargazers_count": 171, + "stargazers_count": 173, "forks_count": 45, "created_at": "2025-01-20T18:16:51Z" }, @@ -40,7 +40,7 @@ "full_name": "ThumpBo/CVE-2025-30208-EXP", "html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP", "description": "CVE-2025-30208-EXP", - "stargazers_count": 160, + "stargazers_count": 168, "forks_count": 31, "created_at": "2025-03-26T15:42:31Z" }, @@ -49,7 +49,7 @@ "full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC", "html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC", "description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.", - "stargazers_count": 127, + "stargazers_count": 128, "forks_count": 32, "created_at": "2025-01-22T14:40:34Z" }, @@ -58,7 +58,7 @@ "full_name": "ZeroMemoryEx/CVE-2025-26125", "html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125", "description": "(0day) Local Privilege Escalation in IObit Malware Fighter", - "stargazers_count": 126, + "stargazers_count": 127, "forks_count": 18, "created_at": "2025-01-08T05:50:07Z" }, @@ -67,7 +67,7 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 95, + "stargazers_count": 102, "forks_count": 28, "created_at": "2025-03-14T07:36:58Z" }, @@ -76,8 +76,8 @@ "full_name": "iSee857/CVE-2025-24813-PoC", "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", - "stargazers_count": 75, - "forks_count": 23, + "stargazers_count": 78, + "forks_count": 25, "created_at": "2025-03-13T10:00:03Z" }, { @@ -94,10 +94,19 @@ "full_name": "aydinnyunus/CVE-2025-29927", "html_url": "https://github.com/aydinnyunus/CVE-2025-29927", "description": "CVE-2025-29927 Proof of Concept", - "stargazers_count": 68, - "forks_count": 24, + "stargazers_count": 69, + "forks_count": 25, "created_at": "2025-03-23T12:13:35Z" }, + { + "name": "ingressNightmare-CVE-2025-1974-exps", + "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", + "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", + "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available", + "stargazers_count": 64, + "forks_count": 11, + "created_at": "2025-03-26T06:43:36Z" + }, { "name": "CVE_2019_2025_EXP", "full_name": "jltxgcy/CVE_2019_2025_EXP", @@ -108,13 +117,13 @@ "created_at": "2019-09-30T02:40:21Z" }, { - "name": "ingressNightmare-CVE-2025-1974-exps", - "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", - "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", - "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available", - "stargazers_count": 60, - "forks_count": 9, - "created_at": "2025-03-26T06:43:36Z" + "name": "CVE-2025-1974", + "full_name": "yoshino-s/CVE-2025-1974", + "html_url": "https://github.com/yoshino-s/CVE-2025-1974", + "description": null, + "stargazers_count": 44, + "forks_count": 10, + "created_at": "2025-03-25T13:23:01Z" }, { "name": "CVE-2025-0282-Ivanti-exploit", @@ -125,15 +134,6 @@ "forks_count": 13, "created_at": "2025-01-11T02:06:51Z" }, - { - "name": "CVE-2025-1974", - "full_name": "yoshino-s/CVE-2025-1974", - "html_url": "https://github.com/yoshino-s/CVE-2025-1974", - "description": null, - "stargazers_count": 43, - "forks_count": 10, - "created_at": "2025-03-25T13:23:01Z" - }, { "name": "CVE-2025-24118", "full_name": "jprx/CVE-2025-24118", @@ -143,6 +143,15 @@ "forks_count": 5, "created_at": "2025-01-30T00:10:44Z" }, + { + "name": "CVE-2025-30208", + "full_name": "xuemian168/CVE-2025-30208", + "html_url": "https://github.com/xuemian168/CVE-2025-30208", + "description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation", + "stargazers_count": 37, + "forks_count": 1, + "created_at": "2025-03-26T10:26:12Z" + }, { "name": "CVE-2025-0282", "full_name": "sfewer-r7/CVE-2025-0282", @@ -188,30 +197,30 @@ "forks_count": 4, "created_at": "2025-01-24T10:41:12Z" }, - { - "name": "CVE-2025-30208", - "full_name": "xuemian168/CVE-2025-30208", - "html_url": "https://github.com/xuemian168/CVE-2025-30208", - "description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation", - "stargazers_count": 31, - "forks_count": 1, - "created_at": "2025-03-26T10:26:12Z" - }, { "name": "CVE-2025-0401", "full_name": "CyberSecurityUP/CVE-2025-0401", "html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401", - "description": "Privilege Escalation using Passwd", - "stargazers_count": 28, - "forks_count": 5, + "description": "Privilege Escalation using Passwd - April Fools prank", + "stargazers_count": 31, + "forks_count": 8, "created_at": "2025-04-01T14:23:43Z" }, + { + "name": "CVE-2025-24813", + "full_name": "MuhammadWaseem29/CVE-2025-24813", + "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813", + "description": null, + "stargazers_count": 29, + "forks_count": 6, + "created_at": "2025-04-05T18:57:08Z" + }, { "name": "CVE-2025-27636-Apache-Camel-PoC", "full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC", "html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC", "description": null, - "stargazers_count": 28, + "stargazers_count": 29, "forks_count": 8, "created_at": "2025-03-09T09:42:11Z" }, @@ -238,7 +247,7 @@ "full_name": "watchtowrlabs/CVE-2025-0282", "html_url": "https://github.com/watchtowrlabs/CVE-2025-0282", "description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)", - "stargazers_count": 23, + "stargazers_count": 24, "forks_count": 9, "created_at": "2025-01-15T18:27:12Z" }, @@ -252,21 +261,12 @@ "created_at": "2025-02-27T11:08:10Z" }, { - "name": "CVE-2018-20250-WinRAR-ACE", - "full_name": "easis/CVE-2018-20250-WinRAR-ACE", - "html_url": "https://github.com/easis/CVE-2018-20250-WinRAR-ACE", - "description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).", - "stargazers_count": 21, - "forks_count": 18, - "created_at": "2019-02-23T01:20:34Z" - }, - { - "name": "CVE-2025-20029", - "full_name": "mbadanoiu/CVE-2025-20029", - "html_url": "https://github.com/mbadanoiu/CVE-2025-20029", - "description": "CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP", - "stargazers_count": 20, + "name": "CVE-2025-24799", + "full_name": "MuhammadWaseem29/CVE-2025-24799", + "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799", + "description": null, + "stargazers_count": 22, "forks_count": 5, - "created_at": "2025-02-23T18:36:11Z" + "created_at": "2025-04-03T16:55:11Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2646.json b/exploits/2025/CVE-2025-2646.json index 8b84c2b..7c59458 100644 --- a/exploits/2025/CVE-2025-2646.json +++ b/exploits/2025/CVE-2025-2646.json @@ -4,7 +4,7 @@ "full_name": "jhonnybonny/CVE-2025-26466", "html_url": "https://github.com/jhonnybonny/CVE-2025-26466", "description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)", - "stargazers_count": 3, + "stargazers_count": 4, "forks_count": 0, "created_at": "2025-02-18T21:21:01Z" }, diff --git a/exploits/2025/CVE-2025-26466.json b/exploits/2025/CVE-2025-26466.json index 2915f65..1a22599 100644 --- a/exploits/2025/CVE-2025-26466.json +++ b/exploits/2025/CVE-2025-26466.json @@ -1,4 +1,13 @@ [ + { + "name": "CVE-2025-26466", + "full_name": "jhonnybonny/CVE-2025-26466", + "html_url": "https://github.com/jhonnybonny/CVE-2025-26466", + "description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)", + "stargazers_count": 4, + "forks_count": 0, + "created_at": "2025-02-18T21:21:01Z" + }, { "name": "CVE-2025-26466", "full_name": "rxerium/CVE-2025-26466", @@ -8,15 +17,6 @@ "forks_count": 0, "created_at": "2025-02-18T16:59:09Z" }, - { - "name": "CVE-2025-26466", - "full_name": "jhonnybonny/CVE-2025-26466", - "html_url": "https://github.com/jhonnybonny/CVE-2025-26466", - "description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)", - "stargazers_count": 3, - "forks_count": 0, - "created_at": "2025-02-18T21:21:01Z" - }, { "name": "patch-manual-CVE-2025-26465-e-CVE-2025-26466", "full_name": "dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466",