diff --git a/exploits/2022/CVE-2022-4577.json b/exploits/2022/CVE-2022-4577.json index beaeb62..2f4ad50 100644 --- a/exploits/2022/CVE-2022-4577.json +++ b/exploits/2022/CVE-2022-4577.json @@ -22,7 +22,7 @@ "full_name": "yuriisanin/CVE-2022-45771", "html_url": "https://github.com/yuriisanin/CVE-2022-45771", "description": "[PoC] Privilege escalation & code execution via LFI in PwnDoC ", - "stargazers_count": 6, + "stargazers_count": 7, "forks_count": 0, "created_at": "2023-02-11T15:26:14Z" } diff --git a/exploits/2024/CVE-2024-3196.json b/exploits/2024/CVE-2024-3196.json new file mode 100644 index 0000000..1a6ef2c --- /dev/null +++ b/exploits/2024/CVE-2024-3196.json @@ -0,0 +1,20 @@ +[ + { + "name": "CVE-2024-31964", + "full_name": "d-Raco/CVE-2024-31964", + "html_url": "https://github.com/d-Raco/CVE-2024-31964", + "description": "CVE-2024-31964 PoC: Mitel 6900w Series SIP Phone - Temporary Authentication Bypass", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-07-06T15:00:05Z" + }, + { + "name": "CVE-2024-31969", + "full_name": "kingfakee7/CVE-2024-31969", + "html_url": "https://github.com/kingfakee7/CVE-2024-31969", + "description": "CVE-2024-31969 adalah privilege escalation local pada sudo ketika menggunakan sudoedit.", + "stargazers_count": 0, + "forks_count": 1, + "created_at": "2025-07-10T06:50:41Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2479.json b/exploits/2025/CVE-2025-2479.json index 3914dbe..6db0c2e 100644 --- a/exploits/2025/CVE-2025-2479.json +++ b/exploits/2025/CVE-2025-2479.json @@ -4,8 +4,8 @@ "full_name": "MuhammadWaseem29/CVE-2025-24799", "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799", "description": null, - "stargazers_count": 24, - "forks_count": 8, + "stargazers_count": 25, + "forks_count": 9, "created_at": "2025-04-03T16:55:11Z" }, { diff --git a/exploits/2025/CVE-2025-2481.json b/exploits/2025/CVE-2025-2481.json index 0b56058..3830219 100644 --- a/exploits/2025/CVE-2025-2481.json +++ b/exploits/2025/CVE-2025-2481.json @@ -4,7 +4,7 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 146, + "stargazers_count": 148, "forks_count": 35, "created_at": "2025-03-14T07:36:58Z" }, @@ -22,8 +22,8 @@ "full_name": "MuhammadWaseem29/CVE-2025-24813", "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813", "description": null, - "stargazers_count": 32, - "forks_count": 8, + "stargazers_count": 33, + "forks_count": 9, "created_at": "2025-04-05T18:57:08Z" }, { @@ -58,7 +58,7 @@ "full_name": "Franconyu/Poc_for_CVE-2025-24813", "html_url": "https://github.com/Franconyu/Poc_for_CVE-2025-24813", "description": "CVE-2025-24813 poc", - "stargazers_count": 7, + "stargazers_count": 8, "forks_count": 4, "created_at": "2025-04-10T14:49:14Z" }, diff --git a/exploits/2025/CVE-2025-24813.json b/exploits/2025/CVE-2025-24813.json index 0177a0b..e72ed06 100644 --- a/exploits/2025/CVE-2025-24813.json +++ b/exploits/2025/CVE-2025-24813.json @@ -4,7 +4,7 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 146, + "stargazers_count": 148, "forks_count": 35, "created_at": "2025-03-14T07:36:58Z" }, @@ -22,8 +22,8 @@ "full_name": "MuhammadWaseem29/CVE-2025-24813", "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813", "description": null, - "stargazers_count": 32, - "forks_count": 8, + "stargazers_count": 33, + "forks_count": 9, "created_at": "2025-04-05T18:57:08Z" }, { @@ -58,7 +58,7 @@ "full_name": "Franconyu/Poc_for_CVE-2025-24813", "html_url": "https://github.com/Franconyu/Poc_for_CVE-2025-24813", "description": "CVE-2025-24813 poc", - "stargazers_count": 7, + "stargazers_count": 8, "forks_count": 4, "created_at": "2025-04-10T14:49:14Z" }, @@ -125,15 +125,6 @@ "forks_count": 0, "created_at": "2025-04-12T17:38:02Z" }, - { - "name": "CVE-2025-24813", - "full_name": "beyond-devsecops/CVE-2025-24813", - "html_url": "https://github.com/beyond-devsecops/CVE-2025-24813", - "description": "Session Exploit", - "stargazers_count": 2, - "forks_count": 0, - "created_at": "2025-03-24T17:47:10Z" - }, { "name": "CVE-2025-24813", "full_name": "AlperenY-cs/CVE-2025-24813", @@ -143,6 +134,15 @@ "forks_count": 0, "created_at": "2025-03-28T09:44:28Z" }, + { + "name": "CVE-2025-24813", + "full_name": "beyond-devsecops/CVE-2025-24813", + "html_url": "https://github.com/beyond-devsecops/CVE-2025-24813", + "description": "Session Exploit", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-03-24T17:47:10Z" + }, { "name": "CVE-2025-24813-POC", "full_name": "Alaatk/CVE-2025-24813-POC",