Update recent feed data
This commit is contained in:
parent
d34a001af0
commit
ab77dc6d3b
5 changed files with 387 additions and 86 deletions
11
exploits/2022/CVE-2022-35405.json
Normal file
11
exploits/2022/CVE-2022-35405.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2022-35405",
|
||||
"full_name": "viniciuspereiras/CVE-2022-35405",
|
||||
"html_url": "https://github.com/viniciuspereiras/CVE-2022-35405",
|
||||
"description": "ManageEngine PAM360, Password Manager Pro, and Access Manager Plus unauthenticated remote code execution vulnerability PoC-exploit",
|
||||
"stargazers_count": 29,
|
||||
"forks_count": 8,
|
||||
"created_at": "2022-07-18T20:52:01Z"
|
||||
}
|
||||
]
|
|
@ -3,7 +3,7 @@
|
|||
"name": "CVE-2024-25292",
|
||||
"full_name": "EQSTLab/CVE-2024-25292",
|
||||
"html_url": "https://github.com/EQSTLab/CVE-2024-25292",
|
||||
"description": "XXE to RCE in RenderTune v1.1.4 exploit",
|
||||
"description": "XSS to RCE in RenderTune v1.1.4 exploit",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 2,
|
||||
"created_at": "2024-09-06T06:16:29Z"
|
||||
|
|
272
exploits/2024/CVE-2024-4577.json
Normal file
272
exploits/2024/CVE-2024-4577.json
Normal file
|
@ -0,0 +1,272 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "watchtowrlabs/CVE-2024-4577",
|
||||
"html_url": "https://github.com/watchtowrlabs/CVE-2024-4577",
|
||||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||
"stargazers_count": 276,
|
||||
"forks_count": 61,
|
||||
"created_at": "2024-06-07T09:52:54Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577-PHP-RCE",
|
||||
"full_name": "xcanwin/CVE-2024-4577-PHP-RCE",
|
||||
"html_url": "https://github.com/xcanwin/CVE-2024-4577-PHP-RCE",
|
||||
"description": "[漏洞复现] 全球首款利用PHP默认环境(XAMPP)的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。",
|
||||
"stargazers_count": 144,
|
||||
"forks_count": 34,
|
||||
"created_at": "2024-06-08T13:04:45Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "TAM-K592/CVE-2024-4577",
|
||||
"html_url": "https://github.com/TAM-K592/CVE-2024-4577",
|
||||
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
|
||||
"stargazers_count": 79,
|
||||
"forks_count": 18,
|
||||
"created_at": "2024-06-07T05:50:23Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "11whoami99/CVE-2024-4577",
|
||||
"html_url": "https://github.com/11whoami99/CVE-2024-4577",
|
||||
"description": "POC & $BASH script for CVE-2024-4577",
|
||||
"stargazers_count": 44,
|
||||
"forks_count": 10,
|
||||
"created_at": "2024-06-07T09:51:39Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "Chocapikk/CVE-2024-4577",
|
||||
"html_url": "https://github.com/Chocapikk/CVE-2024-4577",
|
||||
"description": "PHP CGI Argument Injection vulnerability",
|
||||
"stargazers_count": 29,
|
||||
"forks_count": 13,
|
||||
"created_at": "2024-06-09T14:18:21Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577-PHP-RCE",
|
||||
"full_name": "ZephrFish/CVE-2024-4577-PHP-RCE",
|
||||
"html_url": "https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE",
|
||||
"description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
|
||||
"stargazers_count": 26,
|
||||
"forks_count": 12,
|
||||
"created_at": "2024-06-08T12:23:35Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577-RCE-PoC",
|
||||
"full_name": "BTtea/CVE-2024-4577-RCE-PoC",
|
||||
"html_url": "https://github.com/BTtea/CVE-2024-4577-RCE-PoC",
|
||||
"description": "CVE-2024-4577 RCE PoC",
|
||||
"stargazers_count": 23,
|
||||
"forks_count": 2,
|
||||
"created_at": "2024-11-06T05:30:33Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577-RCE",
|
||||
"full_name": "gh-ost00/CVE-2024-4577-RCE",
|
||||
"html_url": "https://github.com/gh-ost00/CVE-2024-4577-RCE",
|
||||
"description": "PHP CGI Argument Injection (CVE-2024-4577) RCE",
|
||||
"stargazers_count": 20,
|
||||
"forks_count": 5,
|
||||
"created_at": "2024-08-20T02:56:03Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577-Nuclei-Template",
|
||||
"full_name": "huseyinstif/CVE-2024-4577-Nuclei-Template",
|
||||
"html_url": "https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template",
|
||||
"description": null,
|
||||
"stargazers_count": 19,
|
||||
"forks_count": 2,
|
||||
"created_at": "2024-06-07T10:40:37Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "gotr00t0day/CVE-2024-4577",
|
||||
"html_url": "https://github.com/gotr00t0day/CVE-2024-4577",
|
||||
"description": "Argument injection vulnerability in PHP",
|
||||
"stargazers_count": 11,
|
||||
"forks_count": 3,
|
||||
"created_at": "2024-06-15T02:49:37Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577-EXPLOIT",
|
||||
"full_name": "K3ysTr0K3R/CVE-2024-4577-EXPLOIT",
|
||||
"html_url": "https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT",
|
||||
"description": "A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)",
|
||||
"stargazers_count": 9,
|
||||
"forks_count": 2,
|
||||
"created_at": "2024-06-09T23:32:11Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "manuelinfosec/CVE-2024-4577",
|
||||
"html_url": "https://github.com/manuelinfosec/CVE-2024-4577",
|
||||
"description": "Proof Of Concept RCE exploit for critical vulnerability in PHP <8.2.15 (Windows), allowing attackers to execute arbitrary commands.",
|
||||
"stargazers_count": 9,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-06-08T05:27:44Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577-RCE",
|
||||
"full_name": "l0n3m4n/CVE-2024-4577-RCE",
|
||||
"html_url": "https://github.com/l0n3m4n/CVE-2024-4577-RCE",
|
||||
"description": "PoC - PHP CGI Argument Injection CVE-2024-4577 (Scanner and Exploit)",
|
||||
"stargazers_count": 7,
|
||||
"forks_count": 2,
|
||||
"created_at": "2024-07-06T19:37:14Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577-PHP-RCE",
|
||||
"full_name": "waived/CVE-2024-4577-PHP-RCE",
|
||||
"html_url": "https://github.com/waived/CVE-2024-4577-PHP-RCE",
|
||||
"description": "Automated PHP remote code execution scanner for CVE-2024-4577",
|
||||
"stargazers_count": 5,
|
||||
"forks_count": 1,
|
||||
"created_at": "2024-07-15T21:31:14Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "longhoangth18/CVE-2024-4577",
|
||||
"html_url": "https://github.com/longhoangth18/CVE-2024-4577",
|
||||
"description": null,
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 1,
|
||||
"created_at": "2024-10-14T09:11:06Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577-RCE-ATTACK",
|
||||
"full_name": "bibo318/CVE-2024-4577-RCE-ATTACK",
|
||||
"html_url": "https://github.com/bibo318/CVE-2024-4577-RCE-ATTACK",
|
||||
"description": "ATTACK PoC - PHP CVE-2024-4577 ",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-07-11T02:22:32Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "Sh0ckFR/CVE-2024-4577",
|
||||
"html_url": "https://github.com/Sh0ckFR/CVE-2024-4577",
|
||||
"description": "Fixed and minimalist PoC of the CVE-2024-4577",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-06-13T14:25:04Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "zomasec/CVE-2024-4577",
|
||||
"html_url": "https://github.com/zomasec/CVE-2024-4577",
|
||||
"description": "CVE-2024-4577 Exploit POC ",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-06-08T06:36:14Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577-checker",
|
||||
"full_name": "JeninSutradhar/CVE-2024-4577-checker",
|
||||
"html_url": "https://github.com/JeninSutradhar/CVE-2024-4577-checker",
|
||||
"description": "A Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability in PHP-CGI.",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 1,
|
||||
"created_at": "2024-10-04T13:10:19Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577-nuclei",
|
||||
"full_name": "0x20c/CVE-2024-4577-nuclei",
|
||||
"html_url": "https://github.com/0x20c/CVE-2024-4577-nuclei",
|
||||
"description": "CVE-2024-4577 nuclei-templates",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-06-08T03:12:28Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "Junp0/CVE-2024-4577",
|
||||
"html_url": "https://github.com/Junp0/CVE-2024-4577",
|
||||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 3,
|
||||
"created_at": "2024-06-07T09:42:40Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2024-4577",
|
||||
"full_name": "aaddmin1122345/cve-2024-4577",
|
||||
"html_url": "https://github.com/aaddmin1122345/cve-2024-4577",
|
||||
"description": "CVE-2024-4577",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-06-12T04:50:25Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "AlperenY-cs/CVE-2024-4577",
|
||||
"html_url": "https://github.com/AlperenY-cs/CVE-2024-4577",
|
||||
"description": "Create lab for CVE-2024-4577",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-06-28T14:11:15Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "VictorShem/CVE-2024-4577",
|
||||
"html_url": "https://github.com/VictorShem/CVE-2024-4577",
|
||||
"description": "CVE-2024-4577 POC",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 1,
|
||||
"created_at": "2024-06-17T17:53:31Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "phirojshah/CVE-2024-4577",
|
||||
"html_url": "https://github.com/phirojshah/CVE-2024-4577",
|
||||
"description": null,
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 1,
|
||||
"created_at": "2024-09-12T19:27:52Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "ggfzx/CVE-2024-4577",
|
||||
"html_url": "https://github.com/ggfzx/CVE-2024-4577",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-06-26T07:07:49Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "taida957789/CVE-2024-4577",
|
||||
"html_url": "https://github.com/taida957789/CVE-2024-4577",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-06-07T10:58:57Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "sug4r-wr41th/CVE-2024-4577",
|
||||
"html_url": "https://github.com/sug4r-wr41th/CVE-2024-4577",
|
||||
"description": "PHP CGI CVE-2024-4577 PoC",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T12:28:11Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "nemu1k5ma/CVE-2024-4577",
|
||||
"html_url": "https://github.com/nemu1k5ma/CVE-2024-4577",
|
||||
"description": "php-cgi RCE快速检测",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-06-12T02:16:09Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "Wh02m1/CVE-2024-4577",
|
||||
"html_url": "https://github.com/Wh02m1/CVE-2024-4577",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-06-07T12:49:20Z"
|
||||
}
|
||||
]
|
|
@ -3,9 +3,9 @@
|
|||
"name": "ingressNightmare-CVE-2025-1974-exps",
|
||||
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||||
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||||
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available",
|
||||
"stargazers_count": 64,
|
||||
"forks_count": 11,
|
||||
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available. ",
|
||||
"stargazers_count": 72,
|
||||
"forks_count": 13,
|
||||
"created_at": "2025-03-26T06:43:36Z"
|
||||
},
|
||||
{
|
||||
|
@ -13,7 +13,7 @@
|
|||
"full_name": "yoshino-s/CVE-2025-1974",
|
||||
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
|
||||
"description": null,
|
||||
"stargazers_count": 44,
|
||||
"stargazers_count": 47,
|
||||
"forks_count": 10,
|
||||
"created_at": "2025-03-25T13:23:01Z"
|
||||
},
|
||||
|
@ -22,7 +22,7 @@
|
|||
"full_name": "hi-unc1e/CVE-2025-1974-poc",
|
||||
"html_url": "https://github.com/hi-unc1e/CVE-2025-1974-poc",
|
||||
"description": "PoC of CVE-2025-1974, modified from the world-first PoC~",
|
||||
"stargazers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 2,
|
||||
"created_at": "2025-03-26T16:54:37Z"
|
||||
},
|
||||
|
@ -31,10 +31,19 @@
|
|||
"full_name": "zwxxb/CVE-2025-1974",
|
||||
"html_url": "https://github.com/zwxxb/CVE-2025-1974",
|
||||
"description": "Poc for Ingress RCE ",
|
||||
"stargazers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 3,
|
||||
"created_at": "2025-03-26T14:49:29Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-1974",
|
||||
"full_name": "chhhd/CVE-2025-1974",
|
||||
"html_url": "https://github.com/chhhd/CVE-2025-1974",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-04-26T02:30:49Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-1974",
|
||||
"full_name": "0xBingo/CVE-2025-1974",
|
||||
|
@ -44,6 +53,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-27T03:28:01Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-1974",
|
||||
"full_name": "salt318/CVE-2025-1974",
|
||||
"html_url": "https://github.com/salt318/CVE-2025-1974",
|
||||
"description": "WHS3기 가상화 취약한(CVE) Docker 환경 구성 과제",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-27T05:07:01Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-1974",
|
||||
"full_name": "yanmarques/CVE-2025-1974",
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"full_name": "0x6rss/CVE-2025-24071_PoC",
|
||||
"html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC",
|
||||
"description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File",
|
||||
"stargazers_count": 240,
|
||||
"forks_count": 37,
|
||||
"stargazers_count": 272,
|
||||
"forks_count": 40,
|
||||
"created_at": "2025-03-16T20:10:19Z"
|
||||
},
|
||||
{
|
||||
|
@ -22,28 +22,28 @@
|
|||
"full_name": "MrAle98/CVE-2025-21333-POC",
|
||||
"html_url": "https://github.com/MrAle98/CVE-2025-21333-POC",
|
||||
"description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY",
|
||||
"stargazers_count": 182,
|
||||
"stargazers_count": 187,
|
||||
"forks_count": 31,
|
||||
"created_at": "2025-02-27T12:36:55Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-21298",
|
||||
"full_name": "ynwarcs/CVE-2025-21298",
|
||||
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
|
||||
"description": "Proof of concept & details for CVE-2025-21298",
|
||||
"stargazers_count": 175,
|
||||
"forks_count": 45,
|
||||
"created_at": "2025-01-20T18:16:51Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-30208-EXP",
|
||||
"full_name": "ThumpBo/CVE-2025-30208-EXP",
|
||||
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
|
||||
"description": "CVE-2025-30208-EXP",
|
||||
"stargazers_count": 171,
|
||||
"forks_count": 31,
|
||||
"stargazers_count": 180,
|
||||
"forks_count": 32,
|
||||
"created_at": "2025-03-26T15:42:31Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-21298",
|
||||
"full_name": "ynwarcs/CVE-2025-21298",
|
||||
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
|
||||
"description": "Proof of concept & details for CVE-2025-21298",
|
||||
"stargazers_count": 176,
|
||||
"forks_count": 44,
|
||||
"created_at": "2025-01-20T18:16:51Z"
|
||||
},
|
||||
{
|
||||
"name": "7-Zip-CVE-2025-0411-POC",
|
||||
"full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC",
|
||||
|
@ -67,16 +67,25 @@
|
|||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||
"stargazers_count": 107,
|
||||
"forks_count": 29,
|
||||
"stargazers_count": 111,
|
||||
"forks_count": 31,
|
||||
"created_at": "2025-03-14T07:36:58Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-32433",
|
||||
"full_name": "ProDefense/CVE-2025-32433",
|
||||
"html_url": "https://github.com/ProDefense/CVE-2025-32433",
|
||||
"description": "CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2",
|
||||
"stargazers_count": 95,
|
||||
"forks_count": 25,
|
||||
"created_at": "2025-04-18T00:35:11Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-PoC",
|
||||
"full_name": "iSee857/CVE-2025-24813-PoC",
|
||||
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
||||
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
||||
"stargazers_count": 79,
|
||||
"stargazers_count": 83,
|
||||
"forks_count": 25,
|
||||
"created_at": "2025-03-13T10:00:03Z"
|
||||
},
|
||||
|
@ -85,10 +94,19 @@
|
|||
"full_name": "Network-Sec/CVE-2025-21420-PoC",
|
||||
"html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC",
|
||||
"description": "We found a way to DLL sideload with cleanmgr.exe",
|
||||
"stargazers_count": 74,
|
||||
"stargazers_count": 76,
|
||||
"forks_count": 18,
|
||||
"created_at": "2025-02-17T08:59:22Z"
|
||||
},
|
||||
{
|
||||
"name": "ingressNightmare-CVE-2025-1974-exps",
|
||||
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||||
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||||
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available. ",
|
||||
"stargazers_count": 72,
|
||||
"forks_count": 13,
|
||||
"created_at": "2025-03-26T06:43:36Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-29927",
|
||||
"full_name": "aydinnyunus/CVE-2025-29927",
|
||||
|
@ -99,13 +117,13 @@
|
|||
"created_at": "2025-03-23T12:13:35Z"
|
||||
},
|
||||
{
|
||||
"name": "ingressNightmare-CVE-2025-1974-exps",
|
||||
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||||
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||||
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available",
|
||||
"stargazers_count": 70,
|
||||
"forks_count": 11,
|
||||
"created_at": "2025-03-26T06:43:36Z"
|
||||
"name": "CVE-2025-21756",
|
||||
"full_name": "hoefler02/CVE-2025-21756",
|
||||
"html_url": "https://github.com/hoefler02/CVE-2025-21756",
|
||||
"description": "Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!",
|
||||
"stargazers_count": 63,
|
||||
"forks_count": 9,
|
||||
"created_at": "2025-04-18T14:22:15Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE_2019_2025_EXP",
|
||||
|
@ -121,8 +139,8 @@
|
|||
"full_name": "sfewer-r7/CVE-2025-22457",
|
||||
"html_url": "https://github.com/sfewer-r7/CVE-2025-22457",
|
||||
"description": "PoC for CVE-2025-22457",
|
||||
"stargazers_count": 48,
|
||||
"forks_count": 8,
|
||||
"stargazers_count": 58,
|
||||
"forks_count": 13,
|
||||
"created_at": "2025-04-09T14:39:25Z"
|
||||
},
|
||||
{
|
||||
|
@ -130,7 +148,7 @@
|
|||
"full_name": "yoshino-s/CVE-2025-1974",
|
||||
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
|
||||
"description": null,
|
||||
"stargazers_count": 45,
|
||||
"stargazers_count": 47,
|
||||
"forks_count": 10,
|
||||
"created_at": "2025-03-25T13:23:01Z"
|
||||
},
|
||||
|
@ -139,7 +157,7 @@
|
|||
"full_name": "absholi7ly/CVE-2025-0282-Ivanti-exploit",
|
||||
"html_url": "https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit",
|
||||
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
|
||||
"stargazers_count": 45,
|
||||
"stargazers_count": 47,
|
||||
"forks_count": 13,
|
||||
"created_at": "2025-01-11T02:06:51Z"
|
||||
},
|
||||
|
@ -157,7 +175,7 @@
|
|||
"full_name": "xuemian168/CVE-2025-30208",
|
||||
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
|
||||
"description": "全网首发 CVE-2025-31125 CVE-2025-30208 CVE-2025-32395 Vite Scanner",
|
||||
"stargazers_count": 38,
|
||||
"stargazers_count": 41,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-03-26T10:26:12Z"
|
||||
},
|
||||
|
@ -166,10 +184,19 @@
|
|||
"full_name": "sfewer-r7/CVE-2025-0282",
|
||||
"html_url": "https://github.com/sfewer-r7/CVE-2025-0282",
|
||||
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
|
||||
"stargazers_count": 36,
|
||||
"stargazers_count": 39,
|
||||
"forks_count": 12,
|
||||
"created_at": "2025-01-16T14:45:53Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24016",
|
||||
"full_name": "MuhammadWaseem29/CVE-2025-24016",
|
||||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016",
|
||||
"description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ",
|
||||
"stargazers_count": 37,
|
||||
"forks_count": 5,
|
||||
"created_at": "2025-02-20T23:31:03Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24016",
|
||||
"full_name": "0xjessie21/CVE-2025-24016",
|
||||
|
@ -179,42 +206,42 @@
|
|||
"forks_count": 6,
|
||||
"created_at": "2025-02-16T11:01:12Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24104",
|
||||
"full_name": "ifpdz/CVE-2025-24104",
|
||||
"html_url": "https://github.com/ifpdz/CVE-2025-24104",
|
||||
"description": null,
|
||||
"stargazers_count": 35,
|
||||
"forks_count": 6,
|
||||
"created_at": "2025-01-24T10:41:12Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-23369",
|
||||
"full_name": "hakivvi/CVE-2025-23369",
|
||||
"html_url": "https://github.com/hakivvi/CVE-2025-23369",
|
||||
"description": "GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit",
|
||||
"stargazers_count": 35,
|
||||
"forks_count": 3,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-02-08T18:13:04Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24016",
|
||||
"full_name": "MuhammadWaseem29/CVE-2025-24016",
|
||||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016",
|
||||
"description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ",
|
||||
"stargazers_count": 32,
|
||||
"forks_count": 5,
|
||||
"created_at": "2025-02-20T23:31:03Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24104",
|
||||
"full_name": "ifpdz/CVE-2025-24104",
|
||||
"html_url": "https://github.com/ifpdz/CVE-2025-24104",
|
||||
"description": null,
|
||||
"stargazers_count": 32,
|
||||
"forks_count": 4,
|
||||
"created_at": "2025-01-24T10:41:12Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-0401",
|
||||
"full_name": "CyberSecurityUP/CVE-2025-0401",
|
||||
"html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401",
|
||||
"description": "Privilege Escalation using Passwd - April Fools prank",
|
||||
"stargazers_count": 31,
|
||||
"stargazers_count": 33,
|
||||
"forks_count": 8,
|
||||
"created_at": "2025-04-01T14:23:43Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-27636-Apache-Camel-PoC",
|
||||
"full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC",
|
||||
"html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC",
|
||||
"description": null,
|
||||
"stargazers_count": 32,
|
||||
"forks_count": 8,
|
||||
"created_at": "2025-03-09T09:42:11Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "MuhammadWaseem29/CVE-2025-24813",
|
||||
|
@ -224,22 +251,13 @@
|
|||
"forks_count": 6,
|
||||
"created_at": "2025-04-05T18:57:08Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-27636-Apache-Camel-PoC",
|
||||
"full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC",
|
||||
"html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC",
|
||||
"description": null,
|
||||
"stargazers_count": 29,
|
||||
"forks_count": 8,
|
||||
"created_at": "2025-03-09T09:42:11Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-0108-PoC",
|
||||
"full_name": "iSee857/CVE-2025-0108-PoC",
|
||||
"html_url": "https://github.com/iSee857/CVE-2025-0108-PoC",
|
||||
"description": "Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108)",
|
||||
"stargazers_count": 26,
|
||||
"forks_count": 19,
|
||||
"forks_count": 20,
|
||||
"created_at": "2025-02-13T06:39:25Z"
|
||||
},
|
||||
{
|
||||
|
@ -250,23 +268,5 @@
|
|||
"stargazers_count": 25,
|
||||
"forks_count": 14,
|
||||
"created_at": "2019-02-22T06:47:01Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-0282",
|
||||
"full_name": "watchtowrlabs/CVE-2025-0282",
|
||||
"html_url": "https://github.com/watchtowrlabs/CVE-2025-0282",
|
||||
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
|
||||
"stargazers_count": 24,
|
||||
"forks_count": 9,
|
||||
"created_at": "2025-01-15T18:27:12Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-1094-Exploit",
|
||||
"full_name": "soltanali0/CVE-2025-1094-Exploit",
|
||||
"html_url": "https://github.com/soltanali0/CVE-2025-1094-Exploit",
|
||||
"description": "WebSocket and SQL Injection Exploit Script",
|
||||
"stargazers_count": 24,
|
||||
"forks_count": 6,
|
||||
"created_at": "2025-02-27T11:08:10Z"
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue