From 935495eac352e24abfbd3529e90916364181f890 Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Sat, 21 Jun 2025 01:11:46 +0000 Subject: [PATCH] Update recent feed data --- exploits/2025/CVE-2025-2619.json | 20 +++++ exploits/2025/CVE-2025-2620.json | 20 ++--- exploits/2025/CVE-2025-2624.json | 11 ++- exploits/2025/CVE-2025-30208.json | 120 ++++++++++++++++++++++++------ 4 files changed, 136 insertions(+), 35 deletions(-) create mode 100644 exploits/2025/CVE-2025-2619.json diff --git a/exploits/2025/CVE-2025-2619.json b/exploits/2025/CVE-2025-2619.json new file mode 100644 index 0000000..9a01637 --- /dev/null +++ b/exploits/2025/CVE-2025-2619.json @@ -0,0 +1,20 @@ +[ + { + "name": "CVE-2025-26198", + "full_name": "tansique-17/CVE-2025-26198", + "html_url": "https://github.com/tansique-17/CVE-2025-26198", + "description": "Public Disclosure", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-06-18T18:19:42Z" + }, + { + "name": "CVE-2025-26199", + "full_name": "tansique-17/CVE-2025-26199", + "html_url": "https://github.com/tansique-17/CVE-2025-26199", + "description": "Public Disclosure", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-06-19T04:47:29Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2620.json b/exploits/2025/CVE-2025-2620.json index dbecf89..3b89dee 100644 --- a/exploits/2025/CVE-2025-2620.json +++ b/exploits/2025/CVE-2025-2620.json @@ -4,10 +4,19 @@ "full_name": "Otsmane-Ahmed/CVE-2025-2620-poc", "html_url": "https://github.com/Otsmane-Ahmed/CVE-2025-2620-poc", "description": null, - "stargazers_count": 5, + "stargazers_count": 7, "forks_count": 1, "created_at": "2025-03-22T15:26:15Z" }, + { + "name": "CVE-2025-26202-Details", + "full_name": "A17-ba/CVE-2025-26202-Details", + "html_url": "https://github.com/A17-ba/CVE-2025-26202-Details", + "description": "CVE-2025-26202", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-03-01T12:05:27Z" + }, { "name": "CVE-2025-26206", "full_name": "xibhi/CVE-2025-26206", @@ -16,14 +25,5 @@ "stargazers_count": 0, "forks_count": 0, "created_at": "2025-02-24T05:53:46Z" - }, - { - "name": "CVE-2025-26202-Details", - "full_name": "A17-ba/CVE-2025-26202-Details", - "html_url": "https://github.com/A17-ba/CVE-2025-26202-Details", - "description": "CVE-2025-26202", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-03-01T12:05:27Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2624.json b/exploits/2025/CVE-2025-2624.json index 3e8d9f7..d3c400f 100644 --- a/exploits/2025/CVE-2025-2624.json +++ b/exploits/2025/CVE-2025-2624.json @@ -4,8 +4,17 @@ "full_name": "Habuon/CVE-2025-26240", "html_url": "https://github.com/Habuon/CVE-2025-26240", "description": "POC for CVE-2025-26240", - "stargazers_count": 0, + "stargazers_count": 1, "forks_count": 0, "created_at": "2025-03-12T14:09:01Z" + }, + { + "name": "CVE-2025-26244", + "full_name": "JaRm222/CVE-2025-26244", + "html_url": "https://github.com/JaRm222/CVE-2025-26244", + "description": "The graph functionality of DeimosC2 v1.1.0-Beta is vulnerable to Stored Cross-Site Scripting (XSS), allowing the theft of session cookie and unauthorized access to the C2 server.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-16T18:24:09Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-30208.json b/exploits/2025/CVE-2025-30208.json index 73b6670..dda7893 100644 --- a/exploits/2025/CVE-2025-30208.json +++ b/exploits/2025/CVE-2025-30208.json @@ -4,45 +4,63 @@ "full_name": "ThumpBo/CVE-2025-30208-EXP", "html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP", "description": "CVE-2025-30208-EXP", - "stargazers_count": 151, - "forks_count": 25, + "stargazers_count": 183, + "forks_count": 32, "created_at": "2025-03-26T15:42:31Z" }, { "name": "CVE-2025-30208", "full_name": "xuemian168/CVE-2025-30208", "html_url": "https://github.com/xuemian168/CVE-2025-30208", - "description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation", - "stargazers_count": 26, + "description": "全网首发 CVE-2025-31125 CVE-2025-30208 CVE-2025-32395 Vite Scanner", + "stargazers_count": 42, "forks_count": 1, "created_at": "2025-03-26T10:26:12Z" }, - { - "name": "CVE-2025-30208", - "full_name": "xaitx/CVE-2025-30208", - "html_url": "https://github.com/xaitx/CVE-2025-30208", - "description": "CVE-2025-30208 检测工具。python script && nuclei template", - "stargazers_count": 7, - "forks_count": 1, - "created_at": "2025-03-26T17:14:11Z" - }, { "name": "Vite-CVE-2025-30208-Scanner", "full_name": "marino-admin/Vite-CVE-2025-30208-Scanner", "html_url": "https://github.com/marino-admin/Vite-CVE-2025-30208-Scanner", "description": "CVE-2025-30208-EXP 任意文件读取", - "stargazers_count": 4, + "stargazers_count": 9, "forks_count": 1, "created_at": "2025-03-26T20:10:20Z" }, { "name": "CVE-2025-30208", - "full_name": "LiChaser/CVE-2025-30208", - "html_url": "https://github.com/LiChaser/CVE-2025-30208", - "description": "最新的CVE-2025-30208的poc(这个仓库主要拿来写刷src的一些个人思路技巧,自己写的或者搜集挖src的bypass-waf的脚本)", + "full_name": "xaitx/CVE-2025-30208", + "html_url": "https://github.com/xaitx/CVE-2025-30208", + "description": "CVE-2025-30208 检测工具。python script && nuclei template", + "stargazers_count": 8, + "forks_count": 1, + "created_at": "2025-03-26T17:14:11Z" + }, + { + "name": "CVE-2025-30208-31125-31486-32395", + "full_name": "nkuty/CVE-2025-30208-31125-31486-32395", + "html_url": "https://github.com/nkuty/CVE-2025-30208-31125-31486-32395", + "description": null, + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2025-05-29T17:23:04Z" + }, + { + "name": "CVE-2025-30208", + "full_name": "4xura/CVE-2025-30208", + "html_url": "https://github.com/4xura/CVE-2025-30208", + "description": "A PoC of the exploit script for the Arbitrary File Read vulnerability of Vite /@fs/ Path Traversal in the transformMiddleware (CVE-2025-30208). ", "stargazers_count": 2, "forks_count": 0, - "created_at": "2025-03-21T15:32:24Z" + "created_at": "2025-03-27T12:55:01Z" + }, + { + "name": "CVE-2025-30208-Series", + "full_name": "r0ngy40/CVE-2025-30208-Series", + "html_url": "https://github.com/r0ngy40/CVE-2025-30208-Series", + "description": "Analysis of the Reproduction of CVE-2025-30208 Series Vulnerabilities", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-04-24T10:53:23Z" }, { "name": "CVE-2025-30208-LFI", @@ -63,13 +81,49 @@ "created_at": "2025-03-26T17:18:46Z" }, { - "name": "CVE-2025-30208_POC", - "full_name": "YuanBenSir/CVE-2025-30208_POC", - "html_url": "https://github.com/YuanBenSir/CVE-2025-30208_POC", - "description": "CVE-2025-30208 任意文件读取漏洞快速验证", + "name": "CVE-2025-30208-PoC", + "full_name": "4m3rr0r/CVE-2025-30208-PoC", + "html_url": "https://github.com/4m3rr0r/CVE-2025-30208-PoC", + "description": "CVE-2025-30208 - Vite Arbitrary File Read PoC", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-04-03T11:46:19Z" + }, + { + "name": "Vite-CVE-2025-30208-EXP", + "full_name": "lilil3333/Vite-CVE-2025-30208-EXP", + "html_url": "https://github.com/lilil3333/Vite-CVE-2025-30208-EXP", + "description": "Vite-CVE-2025-30208-EXP单目标检测,支持自定义读取路径,深度检索", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-04-05T04:59:49Z" + }, + { + "name": "CVE-2025-30208", + "full_name": "HaGsec/CVE-2025-30208", + "html_url": "https://github.com/HaGsec/CVE-2025-30208", + "description": "POC", "stargazers_count": 0, "forks_count": 0, - "created_at": "2025-03-26T19:06:44Z" + "created_at": "2025-06-06T08:21:13Z" + }, + { + "name": "CVE-2025-30208", + "full_name": "sumeet-darekar/CVE-2025-30208", + "html_url": "https://github.com/sumeet-darekar/CVE-2025-30208", + "description": "mass scan for CVE-2025-30208", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-02T05:52:24Z" + }, + { + "name": "CVE-2025-30208", + "full_name": "0xshaheen/CVE-2025-30208", + "html_url": "https://github.com/0xshaheen/CVE-2025-30208", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-02T04:26:21Z" }, { "name": "CVE-2025-30208-Vite", @@ -80,11 +134,29 @@ "forks_count": 0, "created_at": "2025-03-28T09:50:48Z" }, + { + "name": "CVE-2025-30208_POC", + "full_name": "YuanBenSir/CVE-2025-30208_POC", + "html_url": "https://github.com/YuanBenSir/CVE-2025-30208_POC", + "description": "CVE-2025-30208 任意文件读取漏洞快速验证", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-26T19:06:44Z" + }, + { + "name": "CVE-2025-30208-template", + "full_name": "imbas007/CVE-2025-30208-template", + "html_url": "https://github.com/imbas007/CVE-2025-30208-template", + "description": "CVE-2025-30208 vite file read nuclei template", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-21T01:33:14Z" + }, { "name": "CVE-2025-30208-PoC", "full_name": "iSee857/CVE-2025-30208-PoC", "html_url": "https://github.com/iSee857/CVE-2025-30208-PoC", - "description": "CVE-2025-30208动态检测脚本,支持默认路径,自定义路径动态检测", + "description": "Vite-CVE-2025-30208动态检测脚本,支持默认路径,自定义路径动态检测", "stargazers_count": 0, "forks_count": 0, "created_at": "2025-03-27T06:22:18Z"