Update recent feed data
This commit is contained in:
parent
847fdea2d3
commit
cf6039227a
3 changed files with 60 additions and 0 deletions
11
exploits/2024/CVE-2024-27632.json
Normal file
11
exploits/2024/CVE-2024-27632.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-27632",
|
||||
"full_name": "ally-petitt/CVE-2024-27632",
|
||||
"html_url": "https://github.com/ally-petitt/CVE-2024-27632",
|
||||
"description": "CVE-2024–27632 Reference",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-04-06T23:42:30Z"
|
||||
}
|
||||
]
|
11
exploits/2024/CVE-2024-28085.json
Normal file
11
exploits/2024/CVE-2024-28085.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-28085",
|
||||
"full_name": "skyler-ferrante/CVE-2024-28085",
|
||||
"html_url": "https://github.com/skyler-ferrante/CVE-2024-28085",
|
||||
"description": "WallEscape vulnerability in util-linux",
|
||||
"stargazers_count": 51,
|
||||
"forks_count": 7,
|
||||
"created_at": "2024-03-11T00:15:03Z"
|
||||
}
|
||||
]
|
38
exploits/2024/CVE-2024-4400.json
Normal file
38
exploits/2024/CVE-2024-4400.json
Normal file
|
@ -0,0 +1,38 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-44000-LiteSpeed-Cache",
|
||||
"full_name": "absholi7ly/CVE-2024-44000-LiteSpeed-Cache",
|
||||
"html_url": "https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache",
|
||||
"description": "CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin. This vulnerability affects session management in LiteSpeed Cache, allowing attackers to gain unauthorized access to sensitive data.",
|
||||
"stargazers_count": 13,
|
||||
"forks_count": 8,
|
||||
"created_at": "2024-09-06T03:38:13Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-44000",
|
||||
"full_name": "geniuszly/CVE-2024-44000",
|
||||
"html_url": "https://github.com/geniuszly/CVE-2024-44000",
|
||||
"description": "is a PoC tool designed to exploit insecurely exposed debug logs from WordPress sites and extract session cookies",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-10-10T15:58:10Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-44000-LiteSpeed-Cache",
|
||||
"full_name": "ifqygazhar/CVE-2024-44000-LiteSpeed-Cache",
|
||||
"html_url": "https://github.com/ifqygazhar/CVE-2024-44000-LiteSpeed-Cache",
|
||||
"description": "CVE-2024-44000-LiteSpeed-Cache",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-09-16T14:13:52Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-44000",
|
||||
"full_name": "gbrsh/CVE-2024-44000",
|
||||
"html_url": "https://github.com/gbrsh/CVE-2024-44000",
|
||||
"description": "LiteSpeed Unauthorized Account Takeover",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2024-09-06T13:43:30Z"
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue