From ab77dc6d3ba7765ee47e15d441b4b81b1689cb69 Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Sun, 4 May 2025 01:15:49 +0000 Subject: [PATCH] Update recent feed data --- exploits/2022/CVE-2022-35405.json | 11 ++ exploits/2024/CVE-2024-25292.json | 2 +- exploits/2024/CVE-2024-4577.json | 272 ++++++++++++++++++++++++++++++ exploits/2025/CVE-2025-1974.json | 30 +++- exploits/2025/CVE-2025-2025.json | 158 ++++++++--------- 5 files changed, 387 insertions(+), 86 deletions(-) create mode 100644 exploits/2022/CVE-2022-35405.json create mode 100644 exploits/2024/CVE-2024-4577.json diff --git a/exploits/2022/CVE-2022-35405.json b/exploits/2022/CVE-2022-35405.json new file mode 100644 index 0000000..3fd0fc8 --- /dev/null +++ b/exploits/2022/CVE-2022-35405.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2022-35405", + "full_name": "viniciuspereiras/CVE-2022-35405", + "html_url": "https://github.com/viniciuspereiras/CVE-2022-35405", + "description": "ManageEngine PAM360, Password Manager Pro, and Access Manager Plus unauthenticated remote code execution vulnerability PoC-exploit", + "stargazers_count": 29, + "forks_count": 8, + "created_at": "2022-07-18T20:52:01Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-25292.json b/exploits/2024/CVE-2024-25292.json index 7f249d0..11093e8 100644 --- a/exploits/2024/CVE-2024-25292.json +++ b/exploits/2024/CVE-2024-25292.json @@ -3,7 +3,7 @@ "name": "CVE-2024-25292", "full_name": "EQSTLab/CVE-2024-25292", "html_url": "https://github.com/EQSTLab/CVE-2024-25292", - "description": "XXE to RCE in RenderTune v1.1.4 exploit", + "description": "XSS to RCE in RenderTune v1.1.4 exploit", "stargazers_count": 1, "forks_count": 2, "created_at": "2024-09-06T06:16:29Z" diff --git a/exploits/2024/CVE-2024-4577.json b/exploits/2024/CVE-2024-4577.json new file mode 100644 index 0000000..e880e8f --- /dev/null +++ b/exploits/2024/CVE-2024-4577.json @@ -0,0 +1,272 @@ +[ + { + "name": "CVE-2024-4577", + "full_name": "watchtowrlabs/CVE-2024-4577", + "html_url": "https://github.com/watchtowrlabs/CVE-2024-4577", + "description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC", + "stargazers_count": 276, + "forks_count": 61, + "created_at": "2024-06-07T09:52:54Z" + }, + { + "name": "CVE-2024-4577-PHP-RCE", + "full_name": "xcanwin/CVE-2024-4577-PHP-RCE", + "html_url": "https://github.com/xcanwin/CVE-2024-4577-PHP-RCE", + "description": "[漏洞复现] 全球首款利用PHP默认环境(XAMPP)的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。", + "stargazers_count": 144, + "forks_count": 34, + "created_at": "2024-06-08T13:04:45Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "TAM-K592/CVE-2024-4577", + "html_url": "https://github.com/TAM-K592/CVE-2024-4577", + "description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.", + "stargazers_count": 79, + "forks_count": 18, + "created_at": "2024-06-07T05:50:23Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "11whoami99/CVE-2024-4577", + "html_url": "https://github.com/11whoami99/CVE-2024-4577", + "description": "POC & $BASH script for CVE-2024-4577", + "stargazers_count": 44, + "forks_count": 10, + "created_at": "2024-06-07T09:51:39Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "Chocapikk/CVE-2024-4577", + "html_url": "https://github.com/Chocapikk/CVE-2024-4577", + "description": "PHP CGI Argument Injection vulnerability", + "stargazers_count": 29, + "forks_count": 13, + "created_at": "2024-06-09T14:18:21Z" + }, + { + "name": "CVE-2024-4577-PHP-RCE", + "full_name": "ZephrFish/CVE-2024-4577-PHP-RCE", + "html_url": "https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE", + "description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template", + "stargazers_count": 26, + "forks_count": 12, + "created_at": "2024-06-08T12:23:35Z" + }, + { + "name": "CVE-2024-4577-RCE-PoC", + "full_name": "BTtea/CVE-2024-4577-RCE-PoC", + "html_url": "https://github.com/BTtea/CVE-2024-4577-RCE-PoC", + "description": "CVE-2024-4577 RCE PoC", + "stargazers_count": 23, + "forks_count": 2, + "created_at": "2024-11-06T05:30:33Z" + }, + { + "name": "CVE-2024-4577-RCE", + "full_name": "gh-ost00/CVE-2024-4577-RCE", + "html_url": "https://github.com/gh-ost00/CVE-2024-4577-RCE", + "description": "PHP CGI Argument Injection (CVE-2024-4577) RCE", + "stargazers_count": 20, + "forks_count": 5, + "created_at": "2024-08-20T02:56:03Z" + }, + { + "name": "CVE-2024-4577-Nuclei-Template", + "full_name": "huseyinstif/CVE-2024-4577-Nuclei-Template", + "html_url": "https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template", + "description": null, + "stargazers_count": 19, + "forks_count": 2, + "created_at": "2024-06-07T10:40:37Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "gotr00t0day/CVE-2024-4577", + "html_url": "https://github.com/gotr00t0day/CVE-2024-4577", + "description": "Argument injection vulnerability in PHP", + "stargazers_count": 11, + "forks_count": 3, + "created_at": "2024-06-15T02:49:37Z" + }, + { + "name": "CVE-2024-4577-EXPLOIT", + "full_name": "K3ysTr0K3R/CVE-2024-4577-EXPLOIT", + "html_url": "https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT", + "description": "A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)", + "stargazers_count": 9, + "forks_count": 2, + "created_at": "2024-06-09T23:32:11Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "manuelinfosec/CVE-2024-4577", + "html_url": "https://github.com/manuelinfosec/CVE-2024-4577", + "description": "Proof Of Concept RCE exploit for critical vulnerability in PHP <8.2.15 (Windows), allowing attackers to execute arbitrary commands.", + "stargazers_count": 9, + "forks_count": 0, + "created_at": "2024-06-08T05:27:44Z" + }, + { + "name": "CVE-2024-4577-RCE", + "full_name": "l0n3m4n/CVE-2024-4577-RCE", + "html_url": "https://github.com/l0n3m4n/CVE-2024-4577-RCE", + "description": "PoC - PHP CGI Argument Injection CVE-2024-4577 (Scanner and Exploit)", + "stargazers_count": 7, + "forks_count": 2, + "created_at": "2024-07-06T19:37:14Z" + }, + { + "name": "CVE-2024-4577-PHP-RCE", + "full_name": "waived/CVE-2024-4577-PHP-RCE", + "html_url": "https://github.com/waived/CVE-2024-4577-PHP-RCE", + "description": "Automated PHP remote code execution scanner for CVE-2024-4577", + "stargazers_count": 5, + "forks_count": 1, + "created_at": "2024-07-15T21:31:14Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "longhoangth18/CVE-2024-4577", + "html_url": "https://github.com/longhoangth18/CVE-2024-4577", + "description": null, + "stargazers_count": 4, + "forks_count": 1, + "created_at": "2024-10-14T09:11:06Z" + }, + { + "name": "CVE-2024-4577-RCE-ATTACK", + "full_name": "bibo318/CVE-2024-4577-RCE-ATTACK", + "html_url": "https://github.com/bibo318/CVE-2024-4577-RCE-ATTACK", + "description": "ATTACK PoC - PHP CVE-2024-4577 ", + "stargazers_count": 4, + "forks_count": 0, + "created_at": "2024-07-11T02:22:32Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "Sh0ckFR/CVE-2024-4577", + "html_url": "https://github.com/Sh0ckFR/CVE-2024-4577", + "description": "Fixed and minimalist PoC of the CVE-2024-4577", + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2024-06-13T14:25:04Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "zomasec/CVE-2024-4577", + "html_url": "https://github.com/zomasec/CVE-2024-4577", + "description": "CVE-2024-4577 Exploit POC ", + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2024-06-08T06:36:14Z" + }, + { + "name": "CVE-2024-4577-checker", + "full_name": "JeninSutradhar/CVE-2024-4577-checker", + "html_url": "https://github.com/JeninSutradhar/CVE-2024-4577-checker", + "description": "A Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability in PHP-CGI.", + "stargazers_count": 3, + "forks_count": 1, + "created_at": "2024-10-04T13:10:19Z" + }, + { + "name": "CVE-2024-4577-nuclei", + "full_name": "0x20c/CVE-2024-4577-nuclei", + "html_url": "https://github.com/0x20c/CVE-2024-4577-nuclei", + "description": "CVE-2024-4577 nuclei-templates", + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2024-06-08T03:12:28Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "Junp0/CVE-2024-4577", + "html_url": "https://github.com/Junp0/CVE-2024-4577", + "description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC", + "stargazers_count": 2, + "forks_count": 3, + "created_at": "2024-06-07T09:42:40Z" + }, + { + "name": "cve-2024-4577", + "full_name": "aaddmin1122345/cve-2024-4577", + "html_url": "https://github.com/aaddmin1122345/cve-2024-4577", + "description": "CVE-2024-4577", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2024-06-12T04:50:25Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "AlperenY-cs/CVE-2024-4577", + "html_url": "https://github.com/AlperenY-cs/CVE-2024-4577", + "description": "Create lab for CVE-2024-4577", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2024-06-28T14:11:15Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "VictorShem/CVE-2024-4577", + "html_url": "https://github.com/VictorShem/CVE-2024-4577", + "description": "CVE-2024-4577 POC", + "stargazers_count": 2, + "forks_count": 1, + "created_at": "2024-06-17T17:53:31Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "phirojshah/CVE-2024-4577", + "html_url": "https://github.com/phirojshah/CVE-2024-4577", + "description": null, + "stargazers_count": 2, + "forks_count": 1, + "created_at": "2024-09-12T19:27:52Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "ggfzx/CVE-2024-4577", + "html_url": "https://github.com/ggfzx/CVE-2024-4577", + "description": null, + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2024-06-26T07:07:49Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "taida957789/CVE-2024-4577", + "html_url": "https://github.com/taida957789/CVE-2024-4577", + "description": null, + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2024-06-07T10:58:57Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "sug4r-wr41th/CVE-2024-4577", + "html_url": "https://github.com/sug4r-wr41th/CVE-2024-4577", + "description": "PHP CGI CVE-2024-4577 PoC", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-04-12T12:28:11Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "nemu1k5ma/CVE-2024-4577", + "html_url": "https://github.com/nemu1k5ma/CVE-2024-4577", + "description": "php-cgi RCE快速检测", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2024-06-12T02:16:09Z" + }, + { + "name": "CVE-2024-4577", + "full_name": "Wh02m1/CVE-2024-4577", + "html_url": "https://github.com/Wh02m1/CVE-2024-4577", + "description": null, + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2024-06-07T12:49:20Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-1974.json b/exploits/2025/CVE-2025-1974.json index 7cbf115..a839dc2 100644 --- a/exploits/2025/CVE-2025-1974.json +++ b/exploits/2025/CVE-2025-1974.json @@ -3,9 +3,9 @@ "name": "ingressNightmare-CVE-2025-1974-exps", "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", - "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available", - "stargazers_count": 64, - "forks_count": 11, + "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available. ", + "stargazers_count": 72, + "forks_count": 13, "created_at": "2025-03-26T06:43:36Z" }, { @@ -13,7 +13,7 @@ "full_name": "yoshino-s/CVE-2025-1974", "html_url": "https://github.com/yoshino-s/CVE-2025-1974", "description": null, - "stargazers_count": 44, + "stargazers_count": 47, "forks_count": 10, "created_at": "2025-03-25T13:23:01Z" }, @@ -22,7 +22,7 @@ "full_name": "hi-unc1e/CVE-2025-1974-poc", "html_url": "https://github.com/hi-unc1e/CVE-2025-1974-poc", "description": "PoC of CVE-2025-1974, modified from the world-first PoC~", - "stargazers_count": 3, + "stargazers_count": 4, "forks_count": 2, "created_at": "2025-03-26T16:54:37Z" }, @@ -31,10 +31,19 @@ "full_name": "zwxxb/CVE-2025-1974", "html_url": "https://github.com/zwxxb/CVE-2025-1974", "description": "Poc for Ingress RCE ", - "stargazers_count": 2, + "stargazers_count": 3, "forks_count": 3, "created_at": "2025-03-26T14:49:29Z" }, + { + "name": "CVE-2025-1974", + "full_name": "chhhd/CVE-2025-1974", + "html_url": "https://github.com/chhhd/CVE-2025-1974", + "description": null, + "stargazers_count": 1, + "forks_count": 1, + "created_at": "2025-04-26T02:30:49Z" + }, { "name": "CVE-2025-1974", "full_name": "0xBingo/CVE-2025-1974", @@ -44,6 +53,15 @@ "forks_count": 0, "created_at": "2025-03-27T03:28:01Z" }, + { + "name": "CVE-2025-1974", + "full_name": "salt318/CVE-2025-1974", + "html_url": "https://github.com/salt318/CVE-2025-1974", + "description": "WHS3기 가상화 취약한(CVE) Docker 환경 구성 과제", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-27T05:07:01Z" + }, { "name": "CVE-2025-1974", "full_name": "yanmarques/CVE-2025-1974", diff --git a/exploits/2025/CVE-2025-2025.json b/exploits/2025/CVE-2025-2025.json index e449b12..020e288 100644 --- a/exploits/2025/CVE-2025-2025.json +++ b/exploits/2025/CVE-2025-2025.json @@ -13,8 +13,8 @@ "full_name": "0x6rss/CVE-2025-24071_PoC", "html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC", "description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File", - "stargazers_count": 240, - "forks_count": 37, + "stargazers_count": 272, + "forks_count": 40, "created_at": "2025-03-16T20:10:19Z" }, { @@ -22,28 +22,28 @@ "full_name": "MrAle98/CVE-2025-21333-POC", "html_url": "https://github.com/MrAle98/CVE-2025-21333-POC", "description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY", - "stargazers_count": 182, + "stargazers_count": 187, "forks_count": 31, "created_at": "2025-02-27T12:36:55Z" }, - { - "name": "CVE-2025-21298", - "full_name": "ynwarcs/CVE-2025-21298", - "html_url": "https://github.com/ynwarcs/CVE-2025-21298", - "description": "Proof of concept & details for CVE-2025-21298", - "stargazers_count": 175, - "forks_count": 45, - "created_at": "2025-01-20T18:16:51Z" - }, { "name": "CVE-2025-30208-EXP", "full_name": "ThumpBo/CVE-2025-30208-EXP", "html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP", "description": "CVE-2025-30208-EXP", - "stargazers_count": 171, - "forks_count": 31, + "stargazers_count": 180, + "forks_count": 32, "created_at": "2025-03-26T15:42:31Z" }, + { + "name": "CVE-2025-21298", + "full_name": "ynwarcs/CVE-2025-21298", + "html_url": "https://github.com/ynwarcs/CVE-2025-21298", + "description": "Proof of concept & details for CVE-2025-21298", + "stargazers_count": 176, + "forks_count": 44, + "created_at": "2025-01-20T18:16:51Z" + }, { "name": "7-Zip-CVE-2025-0411-POC", "full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC", @@ -67,16 +67,25 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 107, - "forks_count": 29, + "stargazers_count": 111, + "forks_count": 31, "created_at": "2025-03-14T07:36:58Z" }, + { + "name": "CVE-2025-32433", + "full_name": "ProDefense/CVE-2025-32433", + "html_url": "https://github.com/ProDefense/CVE-2025-32433", + "description": "CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2", + "stargazers_count": 95, + "forks_count": 25, + "created_at": "2025-04-18T00:35:11Z" + }, { "name": "CVE-2025-24813-PoC", "full_name": "iSee857/CVE-2025-24813-PoC", "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", - "stargazers_count": 79, + "stargazers_count": 83, "forks_count": 25, "created_at": "2025-03-13T10:00:03Z" }, @@ -85,10 +94,19 @@ "full_name": "Network-Sec/CVE-2025-21420-PoC", "html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC", "description": "We found a way to DLL sideload with cleanmgr.exe", - "stargazers_count": 74, + "stargazers_count": 76, "forks_count": 18, "created_at": "2025-02-17T08:59:22Z" }, + { + "name": "ingressNightmare-CVE-2025-1974-exps", + "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", + "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", + "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available. ", + "stargazers_count": 72, + "forks_count": 13, + "created_at": "2025-03-26T06:43:36Z" + }, { "name": "CVE-2025-29927", "full_name": "aydinnyunus/CVE-2025-29927", @@ -99,13 +117,13 @@ "created_at": "2025-03-23T12:13:35Z" }, { - "name": "ingressNightmare-CVE-2025-1974-exps", - "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", - "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", - "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available", - "stargazers_count": 70, - "forks_count": 11, - "created_at": "2025-03-26T06:43:36Z" + "name": "CVE-2025-21756", + "full_name": "hoefler02/CVE-2025-21756", + "html_url": "https://github.com/hoefler02/CVE-2025-21756", + "description": "Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!", + "stargazers_count": 63, + "forks_count": 9, + "created_at": "2025-04-18T14:22:15Z" }, { "name": "CVE_2019_2025_EXP", @@ -121,8 +139,8 @@ "full_name": "sfewer-r7/CVE-2025-22457", "html_url": "https://github.com/sfewer-r7/CVE-2025-22457", "description": "PoC for CVE-2025-22457", - "stargazers_count": 48, - "forks_count": 8, + "stargazers_count": 58, + "forks_count": 13, "created_at": "2025-04-09T14:39:25Z" }, { @@ -130,7 +148,7 @@ "full_name": "yoshino-s/CVE-2025-1974", "html_url": "https://github.com/yoshino-s/CVE-2025-1974", "description": null, - "stargazers_count": 45, + "stargazers_count": 47, "forks_count": 10, "created_at": "2025-03-25T13:23:01Z" }, @@ -139,7 +157,7 @@ "full_name": "absholi7ly/CVE-2025-0282-Ivanti-exploit", "html_url": "https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit", "description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.", - "stargazers_count": 45, + "stargazers_count": 47, "forks_count": 13, "created_at": "2025-01-11T02:06:51Z" }, @@ -157,7 +175,7 @@ "full_name": "xuemian168/CVE-2025-30208", "html_url": "https://github.com/xuemian168/CVE-2025-30208", "description": "全网首发 CVE-2025-31125 CVE-2025-30208 CVE-2025-32395 Vite Scanner", - "stargazers_count": 38, + "stargazers_count": 41, "forks_count": 1, "created_at": "2025-03-26T10:26:12Z" }, @@ -166,10 +184,19 @@ "full_name": "sfewer-r7/CVE-2025-0282", "html_url": "https://github.com/sfewer-r7/CVE-2025-0282", "description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways", - "stargazers_count": 36, + "stargazers_count": 39, "forks_count": 12, "created_at": "2025-01-16T14:45:53Z" }, + { + "name": "CVE-2025-24016", + "full_name": "MuhammadWaseem29/CVE-2025-24016", + "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016", + "description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ", + "stargazers_count": 37, + "forks_count": 5, + "created_at": "2025-02-20T23:31:03Z" + }, { "name": "CVE-2025-24016", "full_name": "0xjessie21/CVE-2025-24016", @@ -179,42 +206,42 @@ "forks_count": 6, "created_at": "2025-02-16T11:01:12Z" }, + { + "name": "CVE-2025-24104", + "full_name": "ifpdz/CVE-2025-24104", + "html_url": "https://github.com/ifpdz/CVE-2025-24104", + "description": null, + "stargazers_count": 35, + "forks_count": 6, + "created_at": "2025-01-24T10:41:12Z" + }, { "name": "CVE-2025-23369", "full_name": "hakivvi/CVE-2025-23369", "html_url": "https://github.com/hakivvi/CVE-2025-23369", "description": "GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit", "stargazers_count": 35, - "forks_count": 3, + "forks_count": 1, "created_at": "2025-02-08T18:13:04Z" }, - { - "name": "CVE-2025-24016", - "full_name": "MuhammadWaseem29/CVE-2025-24016", - "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016", - "description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ", - "stargazers_count": 32, - "forks_count": 5, - "created_at": "2025-02-20T23:31:03Z" - }, - { - "name": "CVE-2025-24104", - "full_name": "ifpdz/CVE-2025-24104", - "html_url": "https://github.com/ifpdz/CVE-2025-24104", - "description": null, - "stargazers_count": 32, - "forks_count": 4, - "created_at": "2025-01-24T10:41:12Z" - }, { "name": "CVE-2025-0401", "full_name": "CyberSecurityUP/CVE-2025-0401", "html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401", "description": "Privilege Escalation using Passwd - April Fools prank", - "stargazers_count": 31, + "stargazers_count": 33, "forks_count": 8, "created_at": "2025-04-01T14:23:43Z" }, + { + "name": "CVE-2025-27636-Apache-Camel-PoC", + "full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC", + "html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC", + "description": null, + "stargazers_count": 32, + "forks_count": 8, + "created_at": "2025-03-09T09:42:11Z" + }, { "name": "CVE-2025-24813", "full_name": "MuhammadWaseem29/CVE-2025-24813", @@ -224,22 +251,13 @@ "forks_count": 6, "created_at": "2025-04-05T18:57:08Z" }, - { - "name": "CVE-2025-27636-Apache-Camel-PoC", - "full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC", - "html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC", - "description": null, - "stargazers_count": 29, - "forks_count": 8, - "created_at": "2025-03-09T09:42:11Z" - }, { "name": "CVE-2025-0108-PoC", "full_name": "iSee857/CVE-2025-0108-PoC", "html_url": "https://github.com/iSee857/CVE-2025-0108-PoC", "description": "Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108)", "stargazers_count": 26, - "forks_count": 19, + "forks_count": 20, "created_at": "2025-02-13T06:39:25Z" }, { @@ -250,23 +268,5 @@ "stargazers_count": 25, "forks_count": 14, "created_at": "2019-02-22T06:47:01Z" - }, - { - "name": "CVE-2025-0282", - "full_name": "watchtowrlabs/CVE-2025-0282", - "html_url": "https://github.com/watchtowrlabs/CVE-2025-0282", - "description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)", - "stargazers_count": 24, - "forks_count": 9, - "created_at": "2025-01-15T18:27:12Z" - }, - { - "name": "CVE-2025-1094-Exploit", - "full_name": "soltanali0/CVE-2025-1094-Exploit", - "html_url": "https://github.com/soltanali0/CVE-2025-1094-Exploit", - "description": "WebSocket and SQL Injection Exploit Script", - "stargazers_count": 24, - "forks_count": 6, - "created_at": "2025-02-27T11:08:10Z" } ] \ No newline at end of file