Update recent feed data
This commit is contained in:
parent
5291485999
commit
6c1e0c9406
5 changed files with 88 additions and 79 deletions
|
@ -1,4 +1,13 @@
|
||||||
[
|
[
|
||||||
|
{
|
||||||
|
"name": "CVE-2024-55968",
|
||||||
|
"full_name": "null-event/CVE-2024-55968",
|
||||||
|
"html_url": "https://github.com/null-event/CVE-2024-55968",
|
||||||
|
"description": "POC for DTEX LPE (CVE-2024-55968)",
|
||||||
|
"stargazers_count": 2,
|
||||||
|
"forks_count": 0,
|
||||||
|
"created_at": "2024-12-17T21:08:11Z"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "CVE-2024-55968",
|
"name": "CVE-2024-55968",
|
||||||
"full_name": "Wi1DN00B/CVE-2024-55968",
|
"full_name": "Wi1DN00B/CVE-2024-55968",
|
||||||
|
@ -7,14 +16,5 @@
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 2,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"created_at": "2024-12-17T21:07:59Z"
|
"created_at": "2024-12-17T21:07:59Z"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "CVE-2024-55968",
|
|
||||||
"full_name": "null-event/CVE-2024-55968",
|
|
||||||
"html_url": "https://github.com/null-event/CVE-2024-55968",
|
|
||||||
"description": "POC for DTEX LPE (CVE-2024-55968)",
|
|
||||||
"stargazers_count": 1,
|
|
||||||
"forks_count": 0,
|
|
||||||
"created_at": "2024-12-17T21:08:11Z"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -4,8 +4,8 @@
|
||||||
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||||||
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||||||
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available",
|
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available",
|
||||||
"stargazers_count": 60,
|
"stargazers_count": 64,
|
||||||
"forks_count": 9,
|
"forks_count": 11,
|
||||||
"created_at": "2025-03-26T06:43:36Z"
|
"created_at": "2025-03-26T06:43:36Z"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13,7 +13,7 @@
|
||||||
"full_name": "yoshino-s/CVE-2025-1974",
|
"full_name": "yoshino-s/CVE-2025-1974",
|
||||||
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
|
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
|
||||||
"description": null,
|
"description": null,
|
||||||
"stargazers_count": 43,
|
"stargazers_count": 44,
|
||||||
"forks_count": 10,
|
"forks_count": 10,
|
||||||
"created_at": "2025-03-25T13:23:01Z"
|
"created_at": "2025-03-25T13:23:01Z"
|
||||||
},
|
},
|
||||||
|
@ -62,6 +62,15 @@
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"created_at": "2025-03-31T08:31:03Z"
|
"created_at": "2025-03-31T08:31:03Z"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "CVE-2025-1974-go",
|
||||||
|
"full_name": "Rubby2001/CVE-2025-1974-go",
|
||||||
|
"html_url": "https://github.com/Rubby2001/CVE-2025-1974-go",
|
||||||
|
"description": "Exploit CVE-2025-1974 with a single file.",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"created_at": "2025-04-10T07:25:03Z"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "POC-IngressNightmare-CVE-2025-1974",
|
"name": "POC-IngressNightmare-CVE-2025-1974",
|
||||||
"full_name": "rjhaikal/POC-IngressNightmare-CVE-2025-1974",
|
"full_name": "rjhaikal/POC-IngressNightmare-CVE-2025-1974",
|
||||||
|
|
|
@ -13,8 +13,8 @@
|
||||||
"full_name": "0x6rss/CVE-2025-24071_PoC",
|
"full_name": "0x6rss/CVE-2025-24071_PoC",
|
||||||
"html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC",
|
"html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC",
|
||||||
"description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File",
|
"description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File",
|
||||||
"stargazers_count": 218,
|
"stargazers_count": 230,
|
||||||
"forks_count": 36,
|
"forks_count": 37,
|
||||||
"created_at": "2025-03-16T20:10:19Z"
|
"created_at": "2025-03-16T20:10:19Z"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -22,7 +22,7 @@
|
||||||
"full_name": "MrAle98/CVE-2025-21333-POC",
|
"full_name": "MrAle98/CVE-2025-21333-POC",
|
||||||
"html_url": "https://github.com/MrAle98/CVE-2025-21333-POC",
|
"html_url": "https://github.com/MrAle98/CVE-2025-21333-POC",
|
||||||
"description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY",
|
"description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY",
|
||||||
"stargazers_count": 180,
|
"stargazers_count": 182,
|
||||||
"forks_count": 31,
|
"forks_count": 31,
|
||||||
"created_at": "2025-02-27T12:36:55Z"
|
"created_at": "2025-02-27T12:36:55Z"
|
||||||
},
|
},
|
||||||
|
@ -31,7 +31,7 @@
|
||||||
"full_name": "ynwarcs/CVE-2025-21298",
|
"full_name": "ynwarcs/CVE-2025-21298",
|
||||||
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
|
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
|
||||||
"description": "Proof of concept & details for CVE-2025-21298",
|
"description": "Proof of concept & details for CVE-2025-21298",
|
||||||
"stargazers_count": 171,
|
"stargazers_count": 173,
|
||||||
"forks_count": 45,
|
"forks_count": 45,
|
||||||
"created_at": "2025-01-20T18:16:51Z"
|
"created_at": "2025-01-20T18:16:51Z"
|
||||||
},
|
},
|
||||||
|
@ -40,7 +40,7 @@
|
||||||
"full_name": "ThumpBo/CVE-2025-30208-EXP",
|
"full_name": "ThumpBo/CVE-2025-30208-EXP",
|
||||||
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
|
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
|
||||||
"description": "CVE-2025-30208-EXP",
|
"description": "CVE-2025-30208-EXP",
|
||||||
"stargazers_count": 160,
|
"stargazers_count": 168,
|
||||||
"forks_count": 31,
|
"forks_count": 31,
|
||||||
"created_at": "2025-03-26T15:42:31Z"
|
"created_at": "2025-03-26T15:42:31Z"
|
||||||
},
|
},
|
||||||
|
@ -49,7 +49,7 @@
|
||||||
"full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC",
|
"full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC",
|
||||||
"html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC",
|
"html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC",
|
||||||
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
|
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
|
||||||
"stargazers_count": 127,
|
"stargazers_count": 128,
|
||||||
"forks_count": 32,
|
"forks_count": 32,
|
||||||
"created_at": "2025-01-22T14:40:34Z"
|
"created_at": "2025-01-22T14:40:34Z"
|
||||||
},
|
},
|
||||||
|
@ -58,7 +58,7 @@
|
||||||
"full_name": "ZeroMemoryEx/CVE-2025-26125",
|
"full_name": "ZeroMemoryEx/CVE-2025-26125",
|
||||||
"html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125",
|
"html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125",
|
||||||
"description": "(0day) Local Privilege Escalation in IObit Malware Fighter",
|
"description": "(0day) Local Privilege Escalation in IObit Malware Fighter",
|
||||||
"stargazers_count": 126,
|
"stargazers_count": 127,
|
||||||
"forks_count": 18,
|
"forks_count": 18,
|
||||||
"created_at": "2025-01-08T05:50:07Z"
|
"created_at": "2025-01-08T05:50:07Z"
|
||||||
},
|
},
|
||||||
|
@ -67,7 +67,7 @@
|
||||||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||||
"stargazers_count": 95,
|
"stargazers_count": 102,
|
||||||
"forks_count": 28,
|
"forks_count": 28,
|
||||||
"created_at": "2025-03-14T07:36:58Z"
|
"created_at": "2025-03-14T07:36:58Z"
|
||||||
},
|
},
|
||||||
|
@ -76,8 +76,8 @@
|
||||||
"full_name": "iSee857/CVE-2025-24813-PoC",
|
"full_name": "iSee857/CVE-2025-24813-PoC",
|
||||||
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
||||||
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
||||||
"stargazers_count": 75,
|
"stargazers_count": 78,
|
||||||
"forks_count": 23,
|
"forks_count": 25,
|
||||||
"created_at": "2025-03-13T10:00:03Z"
|
"created_at": "2025-03-13T10:00:03Z"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -94,10 +94,19 @@
|
||||||
"full_name": "aydinnyunus/CVE-2025-29927",
|
"full_name": "aydinnyunus/CVE-2025-29927",
|
||||||
"html_url": "https://github.com/aydinnyunus/CVE-2025-29927",
|
"html_url": "https://github.com/aydinnyunus/CVE-2025-29927",
|
||||||
"description": "CVE-2025-29927 Proof of Concept",
|
"description": "CVE-2025-29927 Proof of Concept",
|
||||||
"stargazers_count": 68,
|
"stargazers_count": 69,
|
||||||
"forks_count": 24,
|
"forks_count": 25,
|
||||||
"created_at": "2025-03-23T12:13:35Z"
|
"created_at": "2025-03-23T12:13:35Z"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ingressNightmare-CVE-2025-1974-exps",
|
||||||
|
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||||||
|
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||||||
|
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available",
|
||||||
|
"stargazers_count": 64,
|
||||||
|
"forks_count": 11,
|
||||||
|
"created_at": "2025-03-26T06:43:36Z"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "CVE_2019_2025_EXP",
|
"name": "CVE_2019_2025_EXP",
|
||||||
"full_name": "jltxgcy/CVE_2019_2025_EXP",
|
"full_name": "jltxgcy/CVE_2019_2025_EXP",
|
||||||
|
@ -108,13 +117,13 @@
|
||||||
"created_at": "2019-09-30T02:40:21Z"
|
"created_at": "2019-09-30T02:40:21Z"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ingressNightmare-CVE-2025-1974-exps",
|
"name": "CVE-2025-1974",
|
||||||
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
"full_name": "yoshino-s/CVE-2025-1974",
|
||||||
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
|
||||||
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available",
|
"description": null,
|
||||||
"stargazers_count": 60,
|
"stargazers_count": 44,
|
||||||
"forks_count": 9,
|
"forks_count": 10,
|
||||||
"created_at": "2025-03-26T06:43:36Z"
|
"created_at": "2025-03-25T13:23:01Z"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "CVE-2025-0282-Ivanti-exploit",
|
"name": "CVE-2025-0282-Ivanti-exploit",
|
||||||
|
@ -125,15 +134,6 @@
|
||||||
"forks_count": 13,
|
"forks_count": 13,
|
||||||
"created_at": "2025-01-11T02:06:51Z"
|
"created_at": "2025-01-11T02:06:51Z"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name": "CVE-2025-1974",
|
|
||||||
"full_name": "yoshino-s/CVE-2025-1974",
|
|
||||||
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
|
|
||||||
"description": null,
|
|
||||||
"stargazers_count": 43,
|
|
||||||
"forks_count": 10,
|
|
||||||
"created_at": "2025-03-25T13:23:01Z"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "CVE-2025-24118",
|
"name": "CVE-2025-24118",
|
||||||
"full_name": "jprx/CVE-2025-24118",
|
"full_name": "jprx/CVE-2025-24118",
|
||||||
|
@ -143,6 +143,15 @@
|
||||||
"forks_count": 5,
|
"forks_count": 5,
|
||||||
"created_at": "2025-01-30T00:10:44Z"
|
"created_at": "2025-01-30T00:10:44Z"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "CVE-2025-30208",
|
||||||
|
"full_name": "xuemian168/CVE-2025-30208",
|
||||||
|
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
|
||||||
|
"description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation",
|
||||||
|
"stargazers_count": 37,
|
||||||
|
"forks_count": 1,
|
||||||
|
"created_at": "2025-03-26T10:26:12Z"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "CVE-2025-0282",
|
"name": "CVE-2025-0282",
|
||||||
"full_name": "sfewer-r7/CVE-2025-0282",
|
"full_name": "sfewer-r7/CVE-2025-0282",
|
||||||
|
@ -188,30 +197,30 @@
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"created_at": "2025-01-24T10:41:12Z"
|
"created_at": "2025-01-24T10:41:12Z"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name": "CVE-2025-30208",
|
|
||||||
"full_name": "xuemian168/CVE-2025-30208",
|
|
||||||
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
|
|
||||||
"description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation",
|
|
||||||
"stargazers_count": 31,
|
|
||||||
"forks_count": 1,
|
|
||||||
"created_at": "2025-03-26T10:26:12Z"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "CVE-2025-0401",
|
"name": "CVE-2025-0401",
|
||||||
"full_name": "CyberSecurityUP/CVE-2025-0401",
|
"full_name": "CyberSecurityUP/CVE-2025-0401",
|
||||||
"html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401",
|
"html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401",
|
||||||
"description": "Privilege Escalation using Passwd",
|
"description": "Privilege Escalation using Passwd - April Fools prank",
|
||||||
"stargazers_count": 28,
|
"stargazers_count": 31,
|
||||||
"forks_count": 5,
|
"forks_count": 8,
|
||||||
"created_at": "2025-04-01T14:23:43Z"
|
"created_at": "2025-04-01T14:23:43Z"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "CVE-2025-24813",
|
||||||
|
"full_name": "MuhammadWaseem29/CVE-2025-24813",
|
||||||
|
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
|
||||||
|
"description": null,
|
||||||
|
"stargazers_count": 29,
|
||||||
|
"forks_count": 6,
|
||||||
|
"created_at": "2025-04-05T18:57:08Z"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "CVE-2025-27636-Apache-Camel-PoC",
|
"name": "CVE-2025-27636-Apache-Camel-PoC",
|
||||||
"full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC",
|
"full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC",
|
||||||
"html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC",
|
"html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC",
|
||||||
"description": null,
|
"description": null,
|
||||||
"stargazers_count": 28,
|
"stargazers_count": 29,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"created_at": "2025-03-09T09:42:11Z"
|
"created_at": "2025-03-09T09:42:11Z"
|
||||||
},
|
},
|
||||||
|
@ -238,7 +247,7 @@
|
||||||
"full_name": "watchtowrlabs/CVE-2025-0282",
|
"full_name": "watchtowrlabs/CVE-2025-0282",
|
||||||
"html_url": "https://github.com/watchtowrlabs/CVE-2025-0282",
|
"html_url": "https://github.com/watchtowrlabs/CVE-2025-0282",
|
||||||
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
|
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
|
||||||
"stargazers_count": 23,
|
"stargazers_count": 24,
|
||||||
"forks_count": 9,
|
"forks_count": 9,
|
||||||
"created_at": "2025-01-15T18:27:12Z"
|
"created_at": "2025-01-15T18:27:12Z"
|
||||||
},
|
},
|
||||||
|
@ -252,21 +261,12 @@
|
||||||
"created_at": "2025-02-27T11:08:10Z"
|
"created_at": "2025-02-27T11:08:10Z"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "CVE-2018-20250-WinRAR-ACE",
|
"name": "CVE-2025-24799",
|
||||||
"full_name": "easis/CVE-2018-20250-WinRAR-ACE",
|
"full_name": "MuhammadWaseem29/CVE-2025-24799",
|
||||||
"html_url": "https://github.com/easis/CVE-2018-20250-WinRAR-ACE",
|
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799",
|
||||||
"description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).",
|
"description": null,
|
||||||
"stargazers_count": 21,
|
"stargazers_count": 22,
|
||||||
"forks_count": 18,
|
|
||||||
"created_at": "2019-02-23T01:20:34Z"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "CVE-2025-20029",
|
|
||||||
"full_name": "mbadanoiu/CVE-2025-20029",
|
|
||||||
"html_url": "https://github.com/mbadanoiu/CVE-2025-20029",
|
|
||||||
"description": "CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP",
|
|
||||||
"stargazers_count": 20,
|
|
||||||
"forks_count": 5,
|
"forks_count": 5,
|
||||||
"created_at": "2025-02-23T18:36:11Z"
|
"created_at": "2025-04-03T16:55:11Z"
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -4,7 +4,7 @@
|
||||||
"full_name": "jhonnybonny/CVE-2025-26466",
|
"full_name": "jhonnybonny/CVE-2025-26466",
|
||||||
"html_url": "https://github.com/jhonnybonny/CVE-2025-26466",
|
"html_url": "https://github.com/jhonnybonny/CVE-2025-26466",
|
||||||
"description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)",
|
"description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 4,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"created_at": "2025-02-18T21:21:01Z"
|
"created_at": "2025-02-18T21:21:01Z"
|
||||||
},
|
},
|
||||||
|
|
|
@ -1,4 +1,13 @@
|
||||||
[
|
[
|
||||||
|
{
|
||||||
|
"name": "CVE-2025-26466",
|
||||||
|
"full_name": "jhonnybonny/CVE-2025-26466",
|
||||||
|
"html_url": "https://github.com/jhonnybonny/CVE-2025-26466",
|
||||||
|
"description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)",
|
||||||
|
"stargazers_count": 4,
|
||||||
|
"forks_count": 0,
|
||||||
|
"created_at": "2025-02-18T21:21:01Z"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "CVE-2025-26466",
|
"name": "CVE-2025-26466",
|
||||||
"full_name": "rxerium/CVE-2025-26466",
|
"full_name": "rxerium/CVE-2025-26466",
|
||||||
|
@ -8,15 +17,6 @@
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"created_at": "2025-02-18T16:59:09Z"
|
"created_at": "2025-02-18T16:59:09Z"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name": "CVE-2025-26466",
|
|
||||||
"full_name": "jhonnybonny/CVE-2025-26466",
|
|
||||||
"html_url": "https://github.com/jhonnybonny/CVE-2025-26466",
|
|
||||||
"description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)",
|
|
||||||
"stargazers_count": 3,
|
|
||||||
"forks_count": 0,
|
|
||||||
"created_at": "2025-02-18T21:21:01Z"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "patch-manual-CVE-2025-26465-e-CVE-2025-26466",
|
"name": "patch-manual-CVE-2025-26465-e-CVE-2025-26466",
|
||||||
"full_name": "dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466",
|
"full_name": "dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466",
|
||||||
|
|
Loading…
Add table
Reference in a new issue