Update recent feed data

This commit is contained in:
Brendan McDevitt 2025-04-11 01:11:21 +00:00
parent 5291485999
commit 6c1e0c9406
5 changed files with 88 additions and 79 deletions

View file

@ -1,4 +1,13 @@
[ [
{
"name": "CVE-2024-55968",
"full_name": "null-event/CVE-2024-55968",
"html_url": "https://github.com/null-event/CVE-2024-55968",
"description": "POC for DTEX LPE (CVE-2024-55968)",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2024-12-17T21:08:11Z"
},
{ {
"name": "CVE-2024-55968", "name": "CVE-2024-55968",
"full_name": "Wi1DN00B/CVE-2024-55968", "full_name": "Wi1DN00B/CVE-2024-55968",
@ -7,14 +16,5 @@
"stargazers_count": 2, "stargazers_count": 2,
"forks_count": 0, "forks_count": 0,
"created_at": "2024-12-17T21:07:59Z" "created_at": "2024-12-17T21:07:59Z"
},
{
"name": "CVE-2024-55968",
"full_name": "null-event/CVE-2024-55968",
"html_url": "https://github.com/null-event/CVE-2024-55968",
"description": "POC for DTEX LPE (CVE-2024-55968)",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2024-12-17T21:08:11Z"
} }
] ]

View file

@ -4,8 +4,8 @@
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 mirror UID injection -- all available", "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 mirror UID injection -- all available",
"stargazers_count": 60, "stargazers_count": 64,
"forks_count": 9, "forks_count": 11,
"created_at": "2025-03-26T06:43:36Z" "created_at": "2025-03-26T06:43:36Z"
}, },
{ {
@ -13,7 +13,7 @@
"full_name": "yoshino-s/CVE-2025-1974", "full_name": "yoshino-s/CVE-2025-1974",
"html_url": "https://github.com/yoshino-s/CVE-2025-1974", "html_url": "https://github.com/yoshino-s/CVE-2025-1974",
"description": null, "description": null,
"stargazers_count": 43, "stargazers_count": 44,
"forks_count": 10, "forks_count": 10,
"created_at": "2025-03-25T13:23:01Z" "created_at": "2025-03-25T13:23:01Z"
}, },
@ -62,6 +62,15 @@
"forks_count": 0, "forks_count": 0,
"created_at": "2025-03-31T08:31:03Z" "created_at": "2025-03-31T08:31:03Z"
}, },
{
"name": "CVE-2025-1974-go",
"full_name": "Rubby2001/CVE-2025-1974-go",
"html_url": "https://github.com/Rubby2001/CVE-2025-1974-go",
"description": "Exploit CVE-2025-1974 with a single file.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-10T07:25:03Z"
},
{ {
"name": "POC-IngressNightmare-CVE-2025-1974", "name": "POC-IngressNightmare-CVE-2025-1974",
"full_name": "rjhaikal/POC-IngressNightmare-CVE-2025-1974", "full_name": "rjhaikal/POC-IngressNightmare-CVE-2025-1974",

View file

@ -13,8 +13,8 @@
"full_name": "0x6rss/CVE-2025-24071_PoC", "full_name": "0x6rss/CVE-2025-24071_PoC",
"html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC", "html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC",
"description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File", "description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File",
"stargazers_count": 218, "stargazers_count": 230,
"forks_count": 36, "forks_count": 37,
"created_at": "2025-03-16T20:10:19Z" "created_at": "2025-03-16T20:10:19Z"
}, },
{ {
@ -22,7 +22,7 @@
"full_name": "MrAle98/CVE-2025-21333-POC", "full_name": "MrAle98/CVE-2025-21333-POC",
"html_url": "https://github.com/MrAle98/CVE-2025-21333-POC", "html_url": "https://github.com/MrAle98/CVE-2025-21333-POC",
"description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY", "description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY",
"stargazers_count": 180, "stargazers_count": 182,
"forks_count": 31, "forks_count": 31,
"created_at": "2025-02-27T12:36:55Z" "created_at": "2025-02-27T12:36:55Z"
}, },
@ -31,7 +31,7 @@
"full_name": "ynwarcs/CVE-2025-21298", "full_name": "ynwarcs/CVE-2025-21298",
"html_url": "https://github.com/ynwarcs/CVE-2025-21298", "html_url": "https://github.com/ynwarcs/CVE-2025-21298",
"description": "Proof of concept & details for CVE-2025-21298", "description": "Proof of concept & details for CVE-2025-21298",
"stargazers_count": 171, "stargazers_count": 173,
"forks_count": 45, "forks_count": 45,
"created_at": "2025-01-20T18:16:51Z" "created_at": "2025-01-20T18:16:51Z"
}, },
@ -40,7 +40,7 @@
"full_name": "ThumpBo/CVE-2025-30208-EXP", "full_name": "ThumpBo/CVE-2025-30208-EXP",
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP", "html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
"description": "CVE-2025-30208-EXP", "description": "CVE-2025-30208-EXP",
"stargazers_count": 160, "stargazers_count": 168,
"forks_count": 31, "forks_count": 31,
"created_at": "2025-03-26T15:42:31Z" "created_at": "2025-03-26T15:42:31Z"
}, },
@ -49,7 +49,7 @@
"full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC", "full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC",
"html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC", "html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC",
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.", "description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
"stargazers_count": 127, "stargazers_count": 128,
"forks_count": 32, "forks_count": 32,
"created_at": "2025-01-22T14:40:34Z" "created_at": "2025-01-22T14:40:34Z"
}, },
@ -58,7 +58,7 @@
"full_name": "ZeroMemoryEx/CVE-2025-26125", "full_name": "ZeroMemoryEx/CVE-2025-26125",
"html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125", "html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125",
"description": "(0day) Local Privilege Escalation in IObit Malware Fighter", "description": "(0day) Local Privilege Escalation in IObit Malware Fighter",
"stargazers_count": 126, "stargazers_count": 127,
"forks_count": 18, "forks_count": 18,
"created_at": "2025-01-08T05:50:07Z" "created_at": "2025-01-08T05:50:07Z"
}, },
@ -67,7 +67,7 @@
"full_name": "absholi7ly/POC-CVE-2025-24813", "full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 95, "stargazers_count": 102,
"forks_count": 28, "forks_count": 28,
"created_at": "2025-03-14T07:36:58Z" "created_at": "2025-03-14T07:36:58Z"
}, },
@ -76,8 +76,8 @@
"full_name": "iSee857/CVE-2025-24813-PoC", "full_name": "iSee857/CVE-2025-24813-PoC",
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
"stargazers_count": 75, "stargazers_count": 78,
"forks_count": 23, "forks_count": 25,
"created_at": "2025-03-13T10:00:03Z" "created_at": "2025-03-13T10:00:03Z"
}, },
{ {
@ -94,10 +94,19 @@
"full_name": "aydinnyunus/CVE-2025-29927", "full_name": "aydinnyunus/CVE-2025-29927",
"html_url": "https://github.com/aydinnyunus/CVE-2025-29927", "html_url": "https://github.com/aydinnyunus/CVE-2025-29927",
"description": "CVE-2025-29927 Proof of Concept", "description": "CVE-2025-29927 Proof of Concept",
"stargazers_count": 68, "stargazers_count": 69,
"forks_count": 24, "forks_count": 25,
"created_at": "2025-03-23T12:13:35Z" "created_at": "2025-03-23T12:13:35Z"
}, },
{
"name": "ingressNightmare-CVE-2025-1974-exps",
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 mirror UID injection -- all available",
"stargazers_count": 64,
"forks_count": 11,
"created_at": "2025-03-26T06:43:36Z"
},
{ {
"name": "CVE_2019_2025_EXP", "name": "CVE_2019_2025_EXP",
"full_name": "jltxgcy/CVE_2019_2025_EXP", "full_name": "jltxgcy/CVE_2019_2025_EXP",
@ -108,13 +117,13 @@
"created_at": "2019-09-30T02:40:21Z" "created_at": "2019-09-30T02:40:21Z"
}, },
{ {
"name": "ingressNightmare-CVE-2025-1974-exps", "name": "CVE-2025-1974",
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", "full_name": "yoshino-s/CVE-2025-1974",
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", "html_url": "https://github.com/yoshino-s/CVE-2025-1974",
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 mirror UID injection -- all available", "description": null,
"stargazers_count": 60, "stargazers_count": 44,
"forks_count": 9, "forks_count": 10,
"created_at": "2025-03-26T06:43:36Z" "created_at": "2025-03-25T13:23:01Z"
}, },
{ {
"name": "CVE-2025-0282-Ivanti-exploit", "name": "CVE-2025-0282-Ivanti-exploit",
@ -125,15 +134,6 @@
"forks_count": 13, "forks_count": 13,
"created_at": "2025-01-11T02:06:51Z" "created_at": "2025-01-11T02:06:51Z"
}, },
{
"name": "CVE-2025-1974",
"full_name": "yoshino-s/CVE-2025-1974",
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
"description": null,
"stargazers_count": 43,
"forks_count": 10,
"created_at": "2025-03-25T13:23:01Z"
},
{ {
"name": "CVE-2025-24118", "name": "CVE-2025-24118",
"full_name": "jprx/CVE-2025-24118", "full_name": "jprx/CVE-2025-24118",
@ -143,6 +143,15 @@
"forks_count": 5, "forks_count": 5,
"created_at": "2025-01-30T00:10:44Z" "created_at": "2025-01-30T00:10:44Z"
}, },
{
"name": "CVE-2025-30208",
"full_name": "xuemian168/CVE-2025-30208",
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
"description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation",
"stargazers_count": 37,
"forks_count": 1,
"created_at": "2025-03-26T10:26:12Z"
},
{ {
"name": "CVE-2025-0282", "name": "CVE-2025-0282",
"full_name": "sfewer-r7/CVE-2025-0282", "full_name": "sfewer-r7/CVE-2025-0282",
@ -188,30 +197,30 @@
"forks_count": 4, "forks_count": 4,
"created_at": "2025-01-24T10:41:12Z" "created_at": "2025-01-24T10:41:12Z"
}, },
{
"name": "CVE-2025-30208",
"full_name": "xuemian168/CVE-2025-30208",
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
"description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation",
"stargazers_count": 31,
"forks_count": 1,
"created_at": "2025-03-26T10:26:12Z"
},
{ {
"name": "CVE-2025-0401", "name": "CVE-2025-0401",
"full_name": "CyberSecurityUP/CVE-2025-0401", "full_name": "CyberSecurityUP/CVE-2025-0401",
"html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401", "html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401",
"description": "Privilege Escalation using Passwd", "description": "Privilege Escalation using Passwd - April Fools prank",
"stargazers_count": 28, "stargazers_count": 31,
"forks_count": 5, "forks_count": 8,
"created_at": "2025-04-01T14:23:43Z" "created_at": "2025-04-01T14:23:43Z"
}, },
{
"name": "CVE-2025-24813",
"full_name": "MuhammadWaseem29/CVE-2025-24813",
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
"description": null,
"stargazers_count": 29,
"forks_count": 6,
"created_at": "2025-04-05T18:57:08Z"
},
{ {
"name": "CVE-2025-27636-Apache-Camel-PoC", "name": "CVE-2025-27636-Apache-Camel-PoC",
"full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC", "full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC",
"html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC", "html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC",
"description": null, "description": null,
"stargazers_count": 28, "stargazers_count": 29,
"forks_count": 8, "forks_count": 8,
"created_at": "2025-03-09T09:42:11Z" "created_at": "2025-03-09T09:42:11Z"
}, },
@ -238,7 +247,7 @@
"full_name": "watchtowrlabs/CVE-2025-0282", "full_name": "watchtowrlabs/CVE-2025-0282",
"html_url": "https://github.com/watchtowrlabs/CVE-2025-0282", "html_url": "https://github.com/watchtowrlabs/CVE-2025-0282",
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)", "description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
"stargazers_count": 23, "stargazers_count": 24,
"forks_count": 9, "forks_count": 9,
"created_at": "2025-01-15T18:27:12Z" "created_at": "2025-01-15T18:27:12Z"
}, },
@ -252,21 +261,12 @@
"created_at": "2025-02-27T11:08:10Z" "created_at": "2025-02-27T11:08:10Z"
}, },
{ {
"name": "CVE-2018-20250-WinRAR-ACE", "name": "CVE-2025-24799",
"full_name": "easis/CVE-2018-20250-WinRAR-ACE", "full_name": "MuhammadWaseem29/CVE-2025-24799",
"html_url": "https://github.com/easis/CVE-2018-20250-WinRAR-ACE", "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799",
"description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).", "description": null,
"stargazers_count": 21, "stargazers_count": 22,
"forks_count": 18,
"created_at": "2019-02-23T01:20:34Z"
},
{
"name": "CVE-2025-20029",
"full_name": "mbadanoiu/CVE-2025-20029",
"html_url": "https://github.com/mbadanoiu/CVE-2025-20029",
"description": "CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP",
"stargazers_count": 20,
"forks_count": 5, "forks_count": 5,
"created_at": "2025-02-23T18:36:11Z" "created_at": "2025-04-03T16:55:11Z"
} }
] ]

View file

@ -4,7 +4,7 @@
"full_name": "jhonnybonny/CVE-2025-26466", "full_name": "jhonnybonny/CVE-2025-26466",
"html_url": "https://github.com/jhonnybonny/CVE-2025-26466", "html_url": "https://github.com/jhonnybonny/CVE-2025-26466",
"description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)", "description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)",
"stargazers_count": 3, "stargazers_count": 4,
"forks_count": 0, "forks_count": 0,
"created_at": "2025-02-18T21:21:01Z" "created_at": "2025-02-18T21:21:01Z"
}, },

View file

@ -1,4 +1,13 @@
[ [
{
"name": "CVE-2025-26466",
"full_name": "jhonnybonny/CVE-2025-26466",
"html_url": "https://github.com/jhonnybonny/CVE-2025-26466",
"description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)",
"stargazers_count": 4,
"forks_count": 0,
"created_at": "2025-02-18T21:21:01Z"
},
{ {
"name": "CVE-2025-26466", "name": "CVE-2025-26466",
"full_name": "rxerium/CVE-2025-26466", "full_name": "rxerium/CVE-2025-26466",
@ -8,15 +17,6 @@
"forks_count": 0, "forks_count": 0,
"created_at": "2025-02-18T16:59:09Z" "created_at": "2025-02-18T16:59:09Z"
}, },
{
"name": "CVE-2025-26466",
"full_name": "jhonnybonny/CVE-2025-26466",
"html_url": "https://github.com/jhonnybonny/CVE-2025-26466",
"description": "OpenSSH server 9.5p1 - 9.9p1 DoS (PoC)",
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2025-02-18T21:21:01Z"
},
{ {
"name": "patch-manual-CVE-2025-26465-e-CVE-2025-26466", "name": "patch-manual-CVE-2025-26465-e-CVE-2025-26466",
"full_name": "dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466", "full_name": "dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466",