Update recent feed data

This commit is contained in:
Brendan McDevitt 2025-05-04 01:15:49 +00:00
parent d34a001af0
commit ab77dc6d3b
5 changed files with 387 additions and 86 deletions

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2022-35405",
"full_name": "viniciuspereiras/CVE-2022-35405",
"html_url": "https://github.com/viniciuspereiras/CVE-2022-35405",
"description": "ManageEngine PAM360, Password Manager Pro, and Access Manager Plus unauthenticated remote code execution vulnerability PoC-exploit",
"stargazers_count": 29,
"forks_count": 8,
"created_at": "2022-07-18T20:52:01Z"
}
]

View file

@ -3,7 +3,7 @@
"name": "CVE-2024-25292",
"full_name": "EQSTLab/CVE-2024-25292",
"html_url": "https://github.com/EQSTLab/CVE-2024-25292",
"description": "XXE to RCE in RenderTune v1.1.4 exploit",
"description": "XSS to RCE in RenderTune v1.1.4 exploit",
"stargazers_count": 1,
"forks_count": 2,
"created_at": "2024-09-06T06:16:29Z"

View file

@ -0,0 +1,272 @@
[
{
"name": "CVE-2024-4577",
"full_name": "watchtowrlabs/CVE-2024-4577",
"html_url": "https://github.com/watchtowrlabs/CVE-2024-4577",
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"stargazers_count": 276,
"forks_count": 61,
"created_at": "2024-06-07T09:52:54Z"
},
{
"name": "CVE-2024-4577-PHP-RCE",
"full_name": "xcanwin/CVE-2024-4577-PHP-RCE",
"html_url": "https://github.com/xcanwin/CVE-2024-4577-PHP-RCE",
"description": "[漏洞复现] 全球首款利用PHP默认环境XAMPP的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。",
"stargazers_count": 144,
"forks_count": 34,
"created_at": "2024-06-08T13:04:45Z"
},
{
"name": "CVE-2024-4577",
"full_name": "TAM-K592/CVE-2024-4577",
"html_url": "https://github.com/TAM-K592/CVE-2024-4577",
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
"stargazers_count": 79,
"forks_count": 18,
"created_at": "2024-06-07T05:50:23Z"
},
{
"name": "CVE-2024-4577",
"full_name": "11whoami99/CVE-2024-4577",
"html_url": "https://github.com/11whoami99/CVE-2024-4577",
"description": "POC & $BASH script for CVE-2024-4577",
"stargazers_count": 44,
"forks_count": 10,
"created_at": "2024-06-07T09:51:39Z"
},
{
"name": "CVE-2024-4577",
"full_name": "Chocapikk/CVE-2024-4577",
"html_url": "https://github.com/Chocapikk/CVE-2024-4577",
"description": "PHP CGI Argument Injection vulnerability",
"stargazers_count": 29,
"forks_count": 13,
"created_at": "2024-06-09T14:18:21Z"
},
{
"name": "CVE-2024-4577-PHP-RCE",
"full_name": "ZephrFish/CVE-2024-4577-PHP-RCE",
"html_url": "https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE",
"description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
"stargazers_count": 26,
"forks_count": 12,
"created_at": "2024-06-08T12:23:35Z"
},
{
"name": "CVE-2024-4577-RCE-PoC",
"full_name": "BTtea/CVE-2024-4577-RCE-PoC",
"html_url": "https://github.com/BTtea/CVE-2024-4577-RCE-PoC",
"description": "CVE-2024-4577 RCE PoC",
"stargazers_count": 23,
"forks_count": 2,
"created_at": "2024-11-06T05:30:33Z"
},
{
"name": "CVE-2024-4577-RCE",
"full_name": "gh-ost00/CVE-2024-4577-RCE",
"html_url": "https://github.com/gh-ost00/CVE-2024-4577-RCE",
"description": "PHP CGI Argument Injection (CVE-2024-4577) RCE",
"stargazers_count": 20,
"forks_count": 5,
"created_at": "2024-08-20T02:56:03Z"
},
{
"name": "CVE-2024-4577-Nuclei-Template",
"full_name": "huseyinstif/CVE-2024-4577-Nuclei-Template",
"html_url": "https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template",
"description": null,
"stargazers_count": 19,
"forks_count": 2,
"created_at": "2024-06-07T10:40:37Z"
},
{
"name": "CVE-2024-4577",
"full_name": "gotr00t0day/CVE-2024-4577",
"html_url": "https://github.com/gotr00t0day/CVE-2024-4577",
"description": "Argument injection vulnerability in PHP",
"stargazers_count": 11,
"forks_count": 3,
"created_at": "2024-06-15T02:49:37Z"
},
{
"name": "CVE-2024-4577-EXPLOIT",
"full_name": "K3ysTr0K3R/CVE-2024-4577-EXPLOIT",
"html_url": "https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT",
"description": "A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)",
"stargazers_count": 9,
"forks_count": 2,
"created_at": "2024-06-09T23:32:11Z"
},
{
"name": "CVE-2024-4577",
"full_name": "manuelinfosec/CVE-2024-4577",
"html_url": "https://github.com/manuelinfosec/CVE-2024-4577",
"description": "Proof Of Concept RCE exploit for critical vulnerability in PHP <8.2.15 (Windows), allowing attackers to execute arbitrary commands.",
"stargazers_count": 9,
"forks_count": 0,
"created_at": "2024-06-08T05:27:44Z"
},
{
"name": "CVE-2024-4577-RCE",
"full_name": "l0n3m4n/CVE-2024-4577-RCE",
"html_url": "https://github.com/l0n3m4n/CVE-2024-4577-RCE",
"description": "PoC - PHP CGI Argument Injection CVE-2024-4577 (Scanner and Exploit)",
"stargazers_count": 7,
"forks_count": 2,
"created_at": "2024-07-06T19:37:14Z"
},
{
"name": "CVE-2024-4577-PHP-RCE",
"full_name": "waived/CVE-2024-4577-PHP-RCE",
"html_url": "https://github.com/waived/CVE-2024-4577-PHP-RCE",
"description": "Automated PHP remote code execution scanner for CVE-2024-4577",
"stargazers_count": 5,
"forks_count": 1,
"created_at": "2024-07-15T21:31:14Z"
},
{
"name": "CVE-2024-4577",
"full_name": "longhoangth18/CVE-2024-4577",
"html_url": "https://github.com/longhoangth18/CVE-2024-4577",
"description": null,
"stargazers_count": 4,
"forks_count": 1,
"created_at": "2024-10-14T09:11:06Z"
},
{
"name": "CVE-2024-4577-RCE-ATTACK",
"full_name": "bibo318/CVE-2024-4577-RCE-ATTACK",
"html_url": "https://github.com/bibo318/CVE-2024-4577-RCE-ATTACK",
"description": "ATTACK PoC - PHP CVE-2024-4577 ",
"stargazers_count": 4,
"forks_count": 0,
"created_at": "2024-07-11T02:22:32Z"
},
{
"name": "CVE-2024-4577",
"full_name": "Sh0ckFR/CVE-2024-4577",
"html_url": "https://github.com/Sh0ckFR/CVE-2024-4577",
"description": "Fixed and minimalist PoC of the CVE-2024-4577",
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2024-06-13T14:25:04Z"
},
{
"name": "CVE-2024-4577",
"full_name": "zomasec/CVE-2024-4577",
"html_url": "https://github.com/zomasec/CVE-2024-4577",
"description": "CVE-2024-4577 Exploit POC ",
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2024-06-08T06:36:14Z"
},
{
"name": "CVE-2024-4577-checker",
"full_name": "JeninSutradhar/CVE-2024-4577-checker",
"html_url": "https://github.com/JeninSutradhar/CVE-2024-4577-checker",
"description": "A Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability in PHP-CGI.",
"stargazers_count": 3,
"forks_count": 1,
"created_at": "2024-10-04T13:10:19Z"
},
{
"name": "CVE-2024-4577-nuclei",
"full_name": "0x20c/CVE-2024-4577-nuclei",
"html_url": "https://github.com/0x20c/CVE-2024-4577-nuclei",
"description": "CVE-2024-4577 nuclei-templates",
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2024-06-08T03:12:28Z"
},
{
"name": "CVE-2024-4577",
"full_name": "Junp0/CVE-2024-4577",
"html_url": "https://github.com/Junp0/CVE-2024-4577",
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"stargazers_count": 2,
"forks_count": 3,
"created_at": "2024-06-07T09:42:40Z"
},
{
"name": "cve-2024-4577",
"full_name": "aaddmin1122345/cve-2024-4577",
"html_url": "https://github.com/aaddmin1122345/cve-2024-4577",
"description": "CVE-2024-4577",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2024-06-12T04:50:25Z"
},
{
"name": "CVE-2024-4577",
"full_name": "AlperenY-cs/CVE-2024-4577",
"html_url": "https://github.com/AlperenY-cs/CVE-2024-4577",
"description": "Create lab for CVE-2024-4577",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2024-06-28T14:11:15Z"
},
{
"name": "CVE-2024-4577",
"full_name": "VictorShem/CVE-2024-4577",
"html_url": "https://github.com/VictorShem/CVE-2024-4577",
"description": "CVE-2024-4577 POC",
"stargazers_count": 2,
"forks_count": 1,
"created_at": "2024-06-17T17:53:31Z"
},
{
"name": "CVE-2024-4577",
"full_name": "phirojshah/CVE-2024-4577",
"html_url": "https://github.com/phirojshah/CVE-2024-4577",
"description": null,
"stargazers_count": 2,
"forks_count": 1,
"created_at": "2024-09-12T19:27:52Z"
},
{
"name": "CVE-2024-4577",
"full_name": "ggfzx/CVE-2024-4577",
"html_url": "https://github.com/ggfzx/CVE-2024-4577",
"description": null,
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2024-06-26T07:07:49Z"
},
{
"name": "CVE-2024-4577",
"full_name": "taida957789/CVE-2024-4577",
"html_url": "https://github.com/taida957789/CVE-2024-4577",
"description": null,
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2024-06-07T10:58:57Z"
},
{
"name": "CVE-2024-4577",
"full_name": "sug4r-wr41th/CVE-2024-4577",
"html_url": "https://github.com/sug4r-wr41th/CVE-2024-4577",
"description": "PHP CGI CVE-2024-4577 PoC",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-04-12T12:28:11Z"
},
{
"name": "CVE-2024-4577",
"full_name": "nemu1k5ma/CVE-2024-4577",
"html_url": "https://github.com/nemu1k5ma/CVE-2024-4577",
"description": "php-cgi RCE快速检测",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2024-06-12T02:16:09Z"
},
{
"name": "CVE-2024-4577",
"full_name": "Wh02m1/CVE-2024-4577",
"html_url": "https://github.com/Wh02m1/CVE-2024-4577",
"description": null,
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2024-06-07T12:49:20Z"
}
]

View file

@ -3,9 +3,9 @@
"name": "ingressNightmare-CVE-2025-1974-exps",
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 mirror UID injection -- all available",
"stargazers_count": 64,
"forks_count": 11,
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 mirror UID injection -- all available. ",
"stargazers_count": 72,
"forks_count": 13,
"created_at": "2025-03-26T06:43:36Z"
},
{
@ -13,7 +13,7 @@
"full_name": "yoshino-s/CVE-2025-1974",
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
"description": null,
"stargazers_count": 44,
"stargazers_count": 47,
"forks_count": 10,
"created_at": "2025-03-25T13:23:01Z"
},
@ -22,7 +22,7 @@
"full_name": "hi-unc1e/CVE-2025-1974-poc",
"html_url": "https://github.com/hi-unc1e/CVE-2025-1974-poc",
"description": "PoC of CVE-2025-1974, modified from the world-first PoC~",
"stargazers_count": 3,
"stargazers_count": 4,
"forks_count": 2,
"created_at": "2025-03-26T16:54:37Z"
},
@ -31,10 +31,19 @@
"full_name": "zwxxb/CVE-2025-1974",
"html_url": "https://github.com/zwxxb/CVE-2025-1974",
"description": "Poc for Ingress RCE ",
"stargazers_count": 2,
"stargazers_count": 3,
"forks_count": 3,
"created_at": "2025-03-26T14:49:29Z"
},
{
"name": "CVE-2025-1974",
"full_name": "chhhd/CVE-2025-1974",
"html_url": "https://github.com/chhhd/CVE-2025-1974",
"description": null,
"stargazers_count": 1,
"forks_count": 1,
"created_at": "2025-04-26T02:30:49Z"
},
{
"name": "CVE-2025-1974",
"full_name": "0xBingo/CVE-2025-1974",
@ -44,6 +53,15 @@
"forks_count": 0,
"created_at": "2025-03-27T03:28:01Z"
},
{
"name": "CVE-2025-1974",
"full_name": "salt318/CVE-2025-1974",
"html_url": "https://github.com/salt318/CVE-2025-1974",
"description": "WHS3기 가상화 취약한(CVE) Docker 환경 구성 과제",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-27T05:07:01Z"
},
{
"name": "CVE-2025-1974",
"full_name": "yanmarques/CVE-2025-1974",

View file

@ -13,8 +13,8 @@
"full_name": "0x6rss/CVE-2025-24071_PoC",
"html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC",
"description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File",
"stargazers_count": 240,
"forks_count": 37,
"stargazers_count": 272,
"forks_count": 40,
"created_at": "2025-03-16T20:10:19Z"
},
{
@ -22,28 +22,28 @@
"full_name": "MrAle98/CVE-2025-21333-POC",
"html_url": "https://github.com/MrAle98/CVE-2025-21333-POC",
"description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY",
"stargazers_count": 182,
"stargazers_count": 187,
"forks_count": 31,
"created_at": "2025-02-27T12:36:55Z"
},
{
"name": "CVE-2025-21298",
"full_name": "ynwarcs/CVE-2025-21298",
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
"description": "Proof of concept & details for CVE-2025-21298",
"stargazers_count": 175,
"forks_count": 45,
"created_at": "2025-01-20T18:16:51Z"
},
{
"name": "CVE-2025-30208-EXP",
"full_name": "ThumpBo/CVE-2025-30208-EXP",
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
"description": "CVE-2025-30208-EXP",
"stargazers_count": 171,
"forks_count": 31,
"stargazers_count": 180,
"forks_count": 32,
"created_at": "2025-03-26T15:42:31Z"
},
{
"name": "CVE-2025-21298",
"full_name": "ynwarcs/CVE-2025-21298",
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
"description": "Proof of concept & details for CVE-2025-21298",
"stargazers_count": 176,
"forks_count": 44,
"created_at": "2025-01-20T18:16:51Z"
},
{
"name": "7-Zip-CVE-2025-0411-POC",
"full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC",
@ -67,16 +67,25 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 107,
"forks_count": 29,
"stargazers_count": 111,
"forks_count": 31,
"created_at": "2025-03-14T07:36:58Z"
},
{
"name": "CVE-2025-32433",
"full_name": "ProDefense/CVE-2025-32433",
"html_url": "https://github.com/ProDefense/CVE-2025-32433",
"description": "CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2",
"stargazers_count": 95,
"forks_count": 25,
"created_at": "2025-04-18T00:35:11Z"
},
{
"name": "CVE-2025-24813-PoC",
"full_name": "iSee857/CVE-2025-24813-PoC",
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
"stargazers_count": 79,
"stargazers_count": 83,
"forks_count": 25,
"created_at": "2025-03-13T10:00:03Z"
},
@ -85,10 +94,19 @@
"full_name": "Network-Sec/CVE-2025-21420-PoC",
"html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC",
"description": "We found a way to DLL sideload with cleanmgr.exe",
"stargazers_count": 74,
"stargazers_count": 76,
"forks_count": 18,
"created_at": "2025-02-17T08:59:22Z"
},
{
"name": "ingressNightmare-CVE-2025-1974-exps",
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 mirror UID injection -- all available. ",
"stargazers_count": 72,
"forks_count": 13,
"created_at": "2025-03-26T06:43:36Z"
},
{
"name": "CVE-2025-29927",
"full_name": "aydinnyunus/CVE-2025-29927",
@ -99,13 +117,13 @@
"created_at": "2025-03-23T12:13:35Z"
},
{
"name": "ingressNightmare-CVE-2025-1974-exps",
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 mirror UID injection -- all available",
"stargazers_count": 70,
"forks_count": 11,
"created_at": "2025-03-26T06:43:36Z"
"name": "CVE-2025-21756",
"full_name": "hoefler02/CVE-2025-21756",
"html_url": "https://github.com/hoefler02/CVE-2025-21756",
"description": "Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!",
"stargazers_count": 63,
"forks_count": 9,
"created_at": "2025-04-18T14:22:15Z"
},
{
"name": "CVE_2019_2025_EXP",
@ -121,8 +139,8 @@
"full_name": "sfewer-r7/CVE-2025-22457",
"html_url": "https://github.com/sfewer-r7/CVE-2025-22457",
"description": "PoC for CVE-2025-22457",
"stargazers_count": 48,
"forks_count": 8,
"stargazers_count": 58,
"forks_count": 13,
"created_at": "2025-04-09T14:39:25Z"
},
{
@ -130,7 +148,7 @@
"full_name": "yoshino-s/CVE-2025-1974",
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
"description": null,
"stargazers_count": 45,
"stargazers_count": 47,
"forks_count": 10,
"created_at": "2025-03-25T13:23:01Z"
},
@ -139,7 +157,7 @@
"full_name": "absholi7ly/CVE-2025-0282-Ivanti-exploit",
"html_url": "https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit",
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
"stargazers_count": 45,
"stargazers_count": 47,
"forks_count": 13,
"created_at": "2025-01-11T02:06:51Z"
},
@ -157,7 +175,7 @@
"full_name": "xuemian168/CVE-2025-30208",
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
"description": "全网首发 CVE-2025-31125 CVE-2025-30208 CVE-2025-32395 Vite Scanner",
"stargazers_count": 38,
"stargazers_count": 41,
"forks_count": 1,
"created_at": "2025-03-26T10:26:12Z"
},
@ -166,10 +184,19 @@
"full_name": "sfewer-r7/CVE-2025-0282",
"html_url": "https://github.com/sfewer-r7/CVE-2025-0282",
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
"stargazers_count": 36,
"stargazers_count": 39,
"forks_count": 12,
"created_at": "2025-01-16T14:45:53Z"
},
{
"name": "CVE-2025-24016",
"full_name": "MuhammadWaseem29/CVE-2025-24016",
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016",
"description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ",
"stargazers_count": 37,
"forks_count": 5,
"created_at": "2025-02-20T23:31:03Z"
},
{
"name": "CVE-2025-24016",
"full_name": "0xjessie21/CVE-2025-24016",
@ -179,42 +206,42 @@
"forks_count": 6,
"created_at": "2025-02-16T11:01:12Z"
},
{
"name": "CVE-2025-24104",
"full_name": "ifpdz/CVE-2025-24104",
"html_url": "https://github.com/ifpdz/CVE-2025-24104",
"description": null,
"stargazers_count": 35,
"forks_count": 6,
"created_at": "2025-01-24T10:41:12Z"
},
{
"name": "CVE-2025-23369",
"full_name": "hakivvi/CVE-2025-23369",
"html_url": "https://github.com/hakivvi/CVE-2025-23369",
"description": "GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit",
"stargazers_count": 35,
"forks_count": 3,
"forks_count": 1,
"created_at": "2025-02-08T18:13:04Z"
},
{
"name": "CVE-2025-24016",
"full_name": "MuhammadWaseem29/CVE-2025-24016",
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016",
"description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ",
"stargazers_count": 32,
"forks_count": 5,
"created_at": "2025-02-20T23:31:03Z"
},
{
"name": "CVE-2025-24104",
"full_name": "ifpdz/CVE-2025-24104",
"html_url": "https://github.com/ifpdz/CVE-2025-24104",
"description": null,
"stargazers_count": 32,
"forks_count": 4,
"created_at": "2025-01-24T10:41:12Z"
},
{
"name": "CVE-2025-0401",
"full_name": "CyberSecurityUP/CVE-2025-0401",
"html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401",
"description": "Privilege Escalation using Passwd - April Fools prank",
"stargazers_count": 31,
"stargazers_count": 33,
"forks_count": 8,
"created_at": "2025-04-01T14:23:43Z"
},
{
"name": "CVE-2025-27636-Apache-Camel-PoC",
"full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC",
"html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC",
"description": null,
"stargazers_count": 32,
"forks_count": 8,
"created_at": "2025-03-09T09:42:11Z"
},
{
"name": "CVE-2025-24813",
"full_name": "MuhammadWaseem29/CVE-2025-24813",
@ -224,22 +251,13 @@
"forks_count": 6,
"created_at": "2025-04-05T18:57:08Z"
},
{
"name": "CVE-2025-27636-Apache-Camel-PoC",
"full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC",
"html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC",
"description": null,
"stargazers_count": 29,
"forks_count": 8,
"created_at": "2025-03-09T09:42:11Z"
},
{
"name": "CVE-2025-0108-PoC",
"full_name": "iSee857/CVE-2025-0108-PoC",
"html_url": "https://github.com/iSee857/CVE-2025-0108-PoC",
"description": "Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108)",
"stargazers_count": 26,
"forks_count": 19,
"forks_count": 20,
"created_at": "2025-02-13T06:39:25Z"
},
{
@ -250,23 +268,5 @@
"stargazers_count": 25,
"forks_count": 14,
"created_at": "2019-02-22T06:47:01Z"
},
{
"name": "CVE-2025-0282",
"full_name": "watchtowrlabs/CVE-2025-0282",
"html_url": "https://github.com/watchtowrlabs/CVE-2025-0282",
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
"stargazers_count": 24,
"forks_count": 9,
"created_at": "2025-01-15T18:27:12Z"
},
{
"name": "CVE-2025-1094-Exploit",
"full_name": "soltanali0/CVE-2025-1094-Exploit",
"html_url": "https://github.com/soltanali0/CVE-2025-1094-Exploit",
"description": "WebSocket and SQL Injection Exploit Script",
"stargazers_count": 24,
"forks_count": 6,
"created_at": "2025-02-27T11:08:10Z"
}
]