From cf6039227a5e4f21035332b5db5f2cf02d39f7ef Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Mon, 31 Mar 2025 01:11:54 +0000 Subject: [PATCH] Update recent feed data --- exploits/2024/CVE-2024-27632.json | 11 +++++++++ exploits/2024/CVE-2024-28085.json | 11 +++++++++ exploits/2024/CVE-2024-4400.json | 38 +++++++++++++++++++++++++++++++ 3 files changed, 60 insertions(+) create mode 100644 exploits/2024/CVE-2024-27632.json create mode 100644 exploits/2024/CVE-2024-28085.json create mode 100644 exploits/2024/CVE-2024-4400.json diff --git a/exploits/2024/CVE-2024-27632.json b/exploits/2024/CVE-2024-27632.json new file mode 100644 index 0000000..ca9d689 --- /dev/null +++ b/exploits/2024/CVE-2024-27632.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-27632", + "full_name": "ally-petitt/CVE-2024-27632", + "html_url": "https://github.com/ally-petitt/CVE-2024-27632", + "description": "CVE-2024–27632 Reference", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2024-04-06T23:42:30Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-28085.json b/exploits/2024/CVE-2024-28085.json new file mode 100644 index 0000000..d9e71b3 --- /dev/null +++ b/exploits/2024/CVE-2024-28085.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-28085", + "full_name": "skyler-ferrante/CVE-2024-28085", + "html_url": "https://github.com/skyler-ferrante/CVE-2024-28085", + "description": "WallEscape vulnerability in util-linux", + "stargazers_count": 51, + "forks_count": 7, + "created_at": "2024-03-11T00:15:03Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-4400.json b/exploits/2024/CVE-2024-4400.json new file mode 100644 index 0000000..3cf54cf --- /dev/null +++ b/exploits/2024/CVE-2024-4400.json @@ -0,0 +1,38 @@ +[ + { + "name": "CVE-2024-44000-LiteSpeed-Cache", + "full_name": "absholi7ly/CVE-2024-44000-LiteSpeed-Cache", + "html_url": "https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache", + "description": "CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin. This vulnerability affects session management in LiteSpeed Cache, allowing attackers to gain unauthorized access to sensitive data.", + "stargazers_count": 13, + "forks_count": 8, + "created_at": "2024-09-06T03:38:13Z" + }, + { + "name": "CVE-2024-44000", + "full_name": "geniuszly/CVE-2024-44000", + "html_url": "https://github.com/geniuszly/CVE-2024-44000", + "description": "is a PoC tool designed to exploit insecurely exposed debug logs from WordPress sites and extract session cookies", + "stargazers_count": 4, + "forks_count": 0, + "created_at": "2024-10-10T15:58:10Z" + }, + { + "name": "CVE-2024-44000-LiteSpeed-Cache", + "full_name": "ifqygazhar/CVE-2024-44000-LiteSpeed-Cache", + "html_url": "https://github.com/ifqygazhar/CVE-2024-44000-LiteSpeed-Cache", + "description": "CVE-2024-44000-LiteSpeed-Cache", + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2024-09-16T14:13:52Z" + }, + { + "name": "CVE-2024-44000", + "full_name": "gbrsh/CVE-2024-44000", + "html_url": "https://github.com/gbrsh/CVE-2024-44000", + "description": "LiteSpeed Unauthorized Account Takeover", + "stargazers_count": 0, + "forks_count": 1, + "created_at": "2024-09-06T13:43:30Z" + } +] \ No newline at end of file