From bc55599c6b4a975788ec7c2ab8244ccf6b5d81c5 Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Wed, 2 Jul 2025 01:12:17 +0000 Subject: [PATCH] Update recent feed data --- exploits/2024/CVE-2024-2403.json | 18 ++++----- exploits/2025/CVE-2025-1974.json | 65 ++++++++++++++++++++++--------- exploits/2025/CVE-2025-2025.json | 44 ++++++++++----------- exploits/2025/CVE-2025-30208.json | 21 +++++++--- 4 files changed, 92 insertions(+), 56 deletions(-) diff --git a/exploits/2024/CVE-2024-2403.json b/exploits/2024/CVE-2024-2403.json index 3c5b85b..1aea54e 100644 --- a/exploits/2024/CVE-2024-2403.json +++ b/exploits/2024/CVE-2024-2403.json @@ -1,13 +1,4 @@ [ - { - "name": "PoC-CVE-2024-24034", - "full_name": "ELIZEUOPAIN/PoC-CVE-2024-24034", - "html_url": "https://github.com/ELIZEUOPAIN/PoC-CVE-2024-24034", - "description": null, - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2024-02-06T16:47:07Z" - }, { "name": "PoC-CVE-2024-24035", "full_name": "ELIZEUOPAIN/PoC-CVE-2024-24035", @@ -16,5 +7,14 @@ "stargazers_count": 0, "forks_count": 0, "created_at": "2024-02-06T18:49:34Z" + }, + { + "name": "PoC-CVE-2024-24034", + "full_name": "ELIZEUOPAIN/PoC-CVE-2024-24034", + "html_url": "https://github.com/ELIZEUOPAIN/PoC-CVE-2024-24034", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2024-02-06T16:47:07Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-1974.json b/exploits/2025/CVE-2025-1974.json index a839dc2..e601116 100644 --- a/exploits/2025/CVE-2025-1974.json +++ b/exploits/2025/CVE-2025-1974.json @@ -4,8 +4,8 @@ "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available. ", - "stargazers_count": 72, - "forks_count": 13, + "stargazers_count": 85, + "forks_count": 14, "created_at": "2025-03-26T06:43:36Z" }, { @@ -13,8 +13,8 @@ "full_name": "yoshino-s/CVE-2025-1974", "html_url": "https://github.com/yoshino-s/CVE-2025-1974", "description": null, - "stargazers_count": 47, - "forks_count": 10, + "stargazers_count": 49, + "forks_count": 11, "created_at": "2025-03-25T13:23:01Z" }, { @@ -32,9 +32,18 @@ "html_url": "https://github.com/zwxxb/CVE-2025-1974", "description": "Poc for Ingress RCE ", "stargazers_count": 3, - "forks_count": 3, + "forks_count": 4, "created_at": "2025-03-26T14:49:29Z" }, + { + "name": "Blackash-CVE-2025-1974", + "full_name": "B1ack4sh/Blackash-CVE-2025-1974", + "html_url": "https://github.com/B1ack4sh/Blackash-CVE-2025-1974", + "description": "CVE-2025-1974", + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2025-06-26T09:24:29Z" + }, { "name": "CVE-2025-1974", "full_name": "chhhd/CVE-2025-1974", @@ -44,6 +53,15 @@ "forks_count": 1, "created_at": "2025-04-26T02:30:49Z" }, + { + "name": "POC-IngressNightmare-CVE-2025-1974", + "full_name": "rjhaikal/POC-IngressNightmare-CVE-2025-1974", + "html_url": "https://github.com/rjhaikal/POC-IngressNightmare-CVE-2025-1974", + "description": "POC IngressNightmare (CVE-2025-1974), modified from https://github.com/yoshino-s/CVE-2025-1974", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-03-28T16:57:02Z" + }, { "name": "CVE-2025-1974", "full_name": "0xBingo/CVE-2025-1974", @@ -62,15 +80,6 @@ "forks_count": 0, "created_at": "2025-04-27T05:07:01Z" }, - { - "name": "CVE-2025-1974", - "full_name": "yanmarques/CVE-2025-1974", - "html_url": "https://github.com/yanmarques/CVE-2025-1974", - "description": null, - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-03-25T18:49:23Z" - }, { "name": "CVE-2025-1974", "full_name": "zulloper/CVE-2025-1974", @@ -80,6 +89,15 @@ "forks_count": 0, "created_at": "2025-03-31T08:31:03Z" }, + { + "name": "CVE-2025-1974", + "full_name": "yanmarques/CVE-2025-1974", + "html_url": "https://github.com/yanmarques/CVE-2025-1974", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-25T18:49:23Z" + }, { "name": "CVE-2025-1974-go", "full_name": "Rubby2001/CVE-2025-1974-go", @@ -90,12 +108,21 @@ "created_at": "2025-04-10T07:25:03Z" }, { - "name": "POC-IngressNightmare-CVE-2025-1974", - "full_name": "rjhaikal/POC-IngressNightmare-CVE-2025-1974", - "html_url": "https://github.com/rjhaikal/POC-IngressNightmare-CVE-2025-1974", - "description": "POC IngressNightmare (CVE-2025-1974), modified from https://github.com/yoshino-s/CVE-2025-1974", + "name": "exploit-cve-2025-1974", + "full_name": "Rickerd12/exploit-cve-2025-1974", + "html_url": "https://github.com/Rickerd12/exploit-cve-2025-1974", + "description": null, "stargazers_count": 0, "forks_count": 0, - "created_at": "2025-03-28T16:57:02Z" + "created_at": "2025-05-19T14:51:41Z" + }, + { + "name": "CVE-2025-1974_IngressNightmare_PoC", + "full_name": "abrewer251/CVE-2025-1974_IngressNightmare_PoC", + "html_url": "https://github.com/abrewer251/CVE-2025-1974_IngressNightmare_PoC", + "description": null, + "stargazers_count": 0, + "forks_count": 1, + "created_at": "2025-05-06T23:49:22Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2025.json b/exploits/2025/CVE-2025-2025.json index 4bc9da8..fa81bbd 100644 --- a/exploits/2025/CVE-2025-2025.json +++ b/exploits/2025/CVE-2025-2025.json @@ -13,8 +13,8 @@ "full_name": "mverschu/CVE-2025-33073", "html_url": "https://github.com/mverschu/CVE-2025-33073", "description": "PoC Exploit for the NTLM reflection SMB flaw.", - "stargazers_count": 398, - "forks_count": 80, + "stargazers_count": 402, + "forks_count": 81, "created_at": "2025-06-13T12:15:14Z" }, { @@ -31,7 +31,7 @@ "full_name": "SeanHeelan/o3_finds_cve-2025-37899", "html_url": "https://github.com/SeanHeelan/o3_finds_cve-2025-37899", "description": "Artefacts for blog post on finding CVE-2025-37899 with o3", - "stargazers_count": 299, + "stargazers_count": 300, "forks_count": 43, "created_at": "2025-05-22T10:36:18Z" }, @@ -121,7 +121,7 @@ "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available. ", - "stargazers_count": 84, + "stargazers_count": 85, "forks_count": 14, "created_at": "2025-03-26T06:43:36Z" }, @@ -157,7 +157,7 @@ "full_name": "fearsoff-org/CVE-2025-49113", "html_url": "https://github.com/fearsoff-org/CVE-2025-49113", "description": null, - "stargazers_count": 67, + "stargazers_count": 68, "forks_count": 14, "created_at": "2025-06-04T15:49:43Z" }, @@ -188,6 +188,15 @@ "forks_count": 14, "created_at": "2025-05-31T12:20:36Z" }, + { + "name": "CVE-2025-49144_PoC", + "full_name": "TheTorjanCaptain/CVE-2025-49144_PoC", + "html_url": "https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC", + "description": "CVE-2025-49144 PoC for security researchers to test and try.", + "stargazers_count": 51, + "forks_count": 18, + "created_at": "2025-06-25T19:23:57Z" + }, { "name": "CVE-2025-24016", "full_name": "MuhammadWaseem29/CVE-2025-24016", @@ -198,13 +207,13 @@ "created_at": "2025-02-20T23:31:03Z" }, { - "name": "CVE-2025-49144_PoC", - "full_name": "TheTorjanCaptain/CVE-2025-49144_PoC", - "html_url": "https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC", - "description": "CVE-2025-49144 PoC for security researchers to test and try.", - "stargazers_count": 49, - "forks_count": 18, - "created_at": "2025-06-25T19:23:57Z" + "name": "CVE-2025-33053-Proof-Of-Concept", + "full_name": "DevBuiHieu/CVE-2025-33053-Proof-Of-Concept", + "html_url": "https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept", + "description": "CVE-2025-33053 Proof Of Concept (PoC)", + "stargazers_count": 50, + "forks_count": 15, + "created_at": "2025-06-12T06:48:55Z" }, { "name": "CVE-2025-1974", @@ -215,15 +224,6 @@ "forks_count": 11, "created_at": "2025-03-25T13:23:01Z" }, - { - "name": "CVE-2025-33053-Proof-Of-Concept", - "full_name": "DevBuiHieu/CVE-2025-33053-Proof-Of-Concept", - "html_url": "https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept", - "description": "CVE-2025-33053 Proof Of Concept (PoC)", - "stargazers_count": 49, - "forks_count": 15, - "created_at": "2025-06-12T06:48:55Z" - }, { "name": "CVE-2025-0282-Ivanti-exploit", "full_name": "absholi7ly/CVE-2025-0282-Ivanti-exploit", @@ -266,7 +266,7 @@ "html_url": "https://github.com/guinea-offensive-security/CVE-2025-6019", "description": null, "stargazers_count": 40, - "forks_count": 9, + "forks_count": 10, "created_at": "2025-06-19T02:42:21Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-30208.json b/exploits/2025/CVE-2025-30208.json index 53ef929..fdf83af 100644 --- a/exploits/2025/CVE-2025-30208.json +++ b/exploits/2025/CVE-2025-30208.json @@ -31,7 +31,7 @@ "full_name": "xaitx/CVE-2025-30208", "html_url": "https://github.com/xaitx/CVE-2025-30208", "description": "CVE-2025-30208 检测工具。python script && nuclei template", - "stargazers_count": 8, + "stargazers_count": 7, "forks_count": 1, "created_at": "2025-03-26T17:14:11Z" }, @@ -50,7 +50,7 @@ "html_url": "https://github.com/4xura/CVE-2025-30208", "description": "A PoC of the exploit script for the Arbitrary File Read vulnerability of Vite /@fs/ Path Traversal in the transformMiddleware (CVE-2025-30208). ", "stargazers_count": 3, - "forks_count": 0, + "forks_count": 2, "created_at": "2025-03-27T12:55:01Z" }, { @@ -71,6 +71,15 @@ "forks_count": 0, "created_at": "2025-03-26T17:18:46Z" }, + { + "name": "CVE-2025-30208", + "full_name": "ThemeHackers/CVE-2025-30208", + "html_url": "https://github.com/ThemeHackers/CVE-2025-30208", + "description": "CVE‑2025‑30208 is a medium-severity arbitrary file read vulnerability in the Vite development server (a popular frontend build tool)", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-06-27T10:13:24Z" + }, { "name": "CVE-2025-30208-Series", "full_name": "r0ngy40/CVE-2025-30208-Series", @@ -82,12 +91,12 @@ }, { "name": "CVE-2025-30208", - "full_name": "ThemeHackers/CVE-2025-30208", - "html_url": "https://github.com/ThemeHackers/CVE-2025-30208", + "full_name": "TH-SecForge/CVE-2025-30208", + "html_url": "https://github.com/TH-SecForge/CVE-2025-30208", "description": "CVE‑2025‑30208 is a medium-severity arbitrary file read vulnerability in the Vite development server (a popular frontend build tool)", - "stargazers_count": 2, + "stargazers_count": 1, "forks_count": 0, - "created_at": "2025-06-27T10:13:24Z" + "created_at": "2025-06-29T15:33:13Z" }, { "name": "CVE-2025-30208-PoC",