From ea6a96cef5a4473283098ab70bb669f0d045a17b Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Sun, 30 Mar 2025 01:11:47 +0000 Subject: [PATCH] Update recent feed data --- exploits/2022/CVE-2022-4577.json | 29 +++++++++++++++++++++++++++++ exploits/2022/CVE-2022-4580.json | 11 +++++++++++ exploits/2024/CVE-2024-44313.json | 11 +++++++++++ exploits/2024/CVE-2024-4443.json | 11 +++++++++++ exploits/2024/CVE-2024-4533.json | 29 +++++++++++++++++++++++++++++ exploits/2025/CVE-2025-22652.json | 11 +++++++++++ exploits/2025/CVE-2025-2690.json | 11 +++++++++++ exploits/2025/CVE-2025-26909.json | 11 +++++++++++ 8 files changed, 124 insertions(+) create mode 100644 exploits/2022/CVE-2022-4577.json create mode 100644 exploits/2022/CVE-2022-4580.json create mode 100644 exploits/2024/CVE-2024-44313.json create mode 100644 exploits/2024/CVE-2024-4443.json create mode 100644 exploits/2024/CVE-2024-4533.json create mode 100644 exploits/2025/CVE-2025-22652.json create mode 100644 exploits/2025/CVE-2025-2690.json create mode 100644 exploits/2025/CVE-2025-26909.json diff --git a/exploits/2022/CVE-2022-4577.json b/exploits/2022/CVE-2022-4577.json new file mode 100644 index 0000000..6ff4a73 --- /dev/null +++ b/exploits/2022/CVE-2022-4577.json @@ -0,0 +1,29 @@ +[ + { + "name": "CVE-2022-45771-Pwndoc-LFI-to-RCE", + "full_name": "p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE", + "html_url": "https://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE", + "description": "Pwndoc local file inclusion to remote code execution of Node.js code on the server", + "stargazers_count": 46, + "forks_count": 8, + "created_at": "2022-12-13T10:03:14Z" + }, + { + "name": "CVE-2022-45770", + "full_name": "Marsel-marsel/CVE-2022-45770", + "html_url": "https://github.com/Marsel-marsel/CVE-2022-45770", + "description": "LPE exploit via windows driver", + "stargazers_count": 8, + "forks_count": 5, + "created_at": "2023-01-21T10:32:02Z" + }, + { + "name": "CVE-2022-45771", + "full_name": "yuriisanin/CVE-2022-45771", + "html_url": "https://github.com/yuriisanin/CVE-2022-45771", + "description": "[PoC] Privilege escalation & code execution via LFI in PwnDoC ", + "stargazers_count": 6, + "forks_count": 0, + "created_at": "2023-02-11T15:26:14Z" + } +] \ No newline at end of file diff --git a/exploits/2022/CVE-2022-4580.json b/exploits/2022/CVE-2022-4580.json new file mode 100644 index 0000000..366400f --- /dev/null +++ b/exploits/2022/CVE-2022-4580.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2022-45808", + "full_name": "RandomRobbieBF/CVE-2022-45808", + "html_url": "https://github.com/RandomRobbieBF/CVE-2022-45808", + "description": "LearnPress Plugin < 4.2.0 - Unauthenticated SQLi", + "stargazers_count": 0, + "forks_count": 2, + "created_at": "2023-08-18T15:43:50Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-44313.json b/exploits/2024/CVE-2024-44313.json new file mode 100644 index 0000000..eae17dc --- /dev/null +++ b/exploits/2024/CVE-2024-44313.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-44313", + "full_name": "cnetsec/CVE-2024-44313", + "html_url": "https://github.com/cnetsec/CVE-2024-44313", + "description": "Estudo de Caso EPSS", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-03-19T23:11:09Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-4443.json b/exploits/2024/CVE-2024-4443.json new file mode 100644 index 0000000..9aedae3 --- /dev/null +++ b/exploits/2024/CVE-2024-4443.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-4443-Poc", + "full_name": "truonghuuphuc/CVE-2024-4443-Poc", + "html_url": "https://github.com/truonghuuphuc/CVE-2024-4443-Poc", + "description": "CVE-2024-4443 Business Directory Plugin – Easy Listing Directories for WordPress <= 6.4.2 - Unauthenticated SQL Injection via listingfields Parameter", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2024-05-26T16:34:58Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-4533.json b/exploits/2024/CVE-2024-4533.json new file mode 100644 index 0000000..2d72143 --- /dev/null +++ b/exploits/2024/CVE-2024-4533.json @@ -0,0 +1,29 @@ +[ + { + "name": "CVE-2024-45337-POC", + "full_name": "NHAS/CVE-2024-45337-POC", + "html_url": "https://github.com/NHAS/CVE-2024-45337-POC", + "description": "Proof of concept (POC) for CVE-2024-45337 ", + "stargazers_count": 4, + "forks_count": 0, + "created_at": "2024-12-17T22:07:53Z" + }, + { + "name": "CVE-2024-45337", + "full_name": "peace-maker/CVE-2024-45337", + "html_url": "https://github.com/peace-maker/CVE-2024-45337", + "description": "Proof of Concept for CVE-2024-45337 against Gitea and Forgejo", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-01-24T15:17:47Z" + }, + { + "name": "VULNERABLE-CVE-2024-45337", + "full_name": "NHAS/VULNERABLE-CVE-2024-45337", + "html_url": "https://github.com/NHAS/VULNERABLE-CVE-2024-45337", + "description": "An example project that showcases golang code vulnerable to CVE-2024-45337", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-12-17T22:22:03Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-22652.json b/exploits/2025/CVE-2025-22652.json new file mode 100644 index 0000000..96ed40a --- /dev/null +++ b/exploits/2025/CVE-2025-22652.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2025-22652", + "full_name": "DoTTak/CVE-2025-22652", + "html_url": "https://github.com/DoTTak/CVE-2025-22652", + "description": "PoC of CVE-2025-22652", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-02-04T05:39:49Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2690.json b/exploits/2025/CVE-2025-2690.json new file mode 100644 index 0000000..7bb820b --- /dev/null +++ b/exploits/2025/CVE-2025-2690.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2025-26909", + "full_name": "ZeroDayx/CVE-2025-26909", + "html_url": "https://github.com/ZeroDayx/CVE-2025-26909", + "description": "CVE-2025-26909", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-03-28T13:31:11Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-26909.json b/exploits/2025/CVE-2025-26909.json new file mode 100644 index 0000000..7bb820b --- /dev/null +++ b/exploits/2025/CVE-2025-26909.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2025-26909", + "full_name": "ZeroDayx/CVE-2025-26909", + "html_url": "https://github.com/ZeroDayx/CVE-2025-26909", + "description": "CVE-2025-26909", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-03-28T13:31:11Z" + } +] \ No newline at end of file