diff --git a/exploits/2024/CVE-2024-5752.json b/exploits/2024/CVE-2024-5752.json index bbf6ce1..148f662 100644 --- a/exploits/2024/CVE-2024-5752.json +++ b/exploits/2024/CVE-2024-5752.json @@ -1,13 +1,4 @@ [ - { - "name": "CVE-2024-57522", - "full_name": "HackWidMaddy/CVE-2024-57522", - "html_url": "https://github.com/HackWidMaddy/CVE-2024-57522", - "description": "CVE-2024-57522 - Stored XSS Vulnerability in Users.php - SourceCodester Packers and Movers Management System 1.0", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-01-15T18:45:35Z" - }, { "name": "CVE-2024-57523.", "full_name": "HackWidMaddy/CVE-2024-57523.", @@ -16,5 +7,14 @@ "stargazers_count": 0, "forks_count": 0, "created_at": "2025-01-15T18:56:30Z" + }, + { + "name": "CVE-2024-57522", + "full_name": "HackWidMaddy/CVE-2024-57522", + "html_url": "https://github.com/HackWidMaddy/CVE-2024-57522", + "description": "CVE-2024-57522 - Stored XSS Vulnerability in Users.php - SourceCodester Packers and Movers Management System 1.0", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-01-15T18:45:35Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2480.json b/exploits/2025/CVE-2025-2480.json index 69677b2..a83f5ad 100644 --- a/exploits/2025/CVE-2025-2480.json +++ b/exploits/2025/CVE-2025-2480.json @@ -7,5 +7,14 @@ "stargazers_count": 0, "forks_count": 0, "created_at": "2025-04-19T01:59:30Z" + }, + { + "name": "CVE-2025-24801", + "full_name": "fatkz/CVE-2025-24801", + "html_url": "https://github.com/fatkz/CVE-2025-24801", + "description": "CVE-2025-24801 Exploit ", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-05-05T23:22:18Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2481.json b/exploits/2025/CVE-2025-2481.json index 978d59e..4aa2bd9 100644 --- a/exploits/2025/CVE-2025-2481.json +++ b/exploits/2025/CVE-2025-2481.json @@ -4,7 +4,7 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 111, + "stargazers_count": 112, "forks_count": 31, "created_at": "2025-03-14T07:36:58Z" }, @@ -152,6 +152,15 @@ "forks_count": 0, "created_at": "2025-03-14T05:39:33Z" }, + { + "name": "CVE-2025-24813", + "full_name": "GadaLuBau1337/CVE-2025-24813", + "html_url": "https://github.com/GadaLuBau1337/CVE-2025-24813", + "description": null, + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-04-08T14:52:37Z" + }, { "name": "CVE-2025-24813-Scanner", "full_name": "Mattb709/CVE-2025-24813-Scanner", @@ -197,15 +206,6 @@ "forks_count": 0, "created_at": "2025-04-27T13:50:24Z" }, - { - "name": "CVE-2025-24813", - "full_name": "GadaLuBau1337/CVE-2025-24813", - "html_url": "https://github.com/GadaLuBau1337/CVE-2025-24813", - "description": null, - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-08T14:52:37Z" - }, { "name": "lab-cve-2025-24813", "full_name": "ps-interactive/lab-cve-2025-24813", @@ -215,15 +215,6 @@ "forks_count": 0, "created_at": "2025-03-19T19:55:02Z" }, - { - "name": "CVE-2025-24813-checker", - "full_name": "horsehacks/CVE-2025-24813-checker", - "html_url": "https://github.com/horsehacks/CVE-2025-24813-checker", - "description": "Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-07T22:43:56Z" - }, { "name": "Tomcat-CVE-2025-24813", "full_name": "B1gN0Se/Tomcat-CVE-2025-24813", @@ -233,6 +224,15 @@ "forks_count": 0, "created_at": "2025-03-31T19:01:28Z" }, + { + "name": "CVE-2025-24813-checker", + "full_name": "horsehacks/CVE-2025-24813-checker", + "html_url": "https://github.com/horsehacks/CVE-2025-24813-checker", + "description": "Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-07T22:43:56Z" + }, { "name": "CVE-2025-24813-POC", "full_name": "f8l124/CVE-2025-24813-POC", diff --git a/exploits/2025/CVE-2025-24813.json b/exploits/2025/CVE-2025-24813.json index a7b40b2..6b368d9 100644 --- a/exploits/2025/CVE-2025-24813.json +++ b/exploits/2025/CVE-2025-24813.json @@ -4,7 +4,7 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 111, + "stargazers_count": 112, "forks_count": 31, "created_at": "2025-03-14T07:36:58Z" }, @@ -152,6 +152,15 @@ "forks_count": 0, "created_at": "2025-03-28T09:44:28Z" }, + { + "name": "CVE-2025-24813", + "full_name": "GadaLuBau1337/CVE-2025-24813", + "html_url": "https://github.com/GadaLuBau1337/CVE-2025-24813", + "description": null, + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-04-08T14:52:37Z" + }, { "name": "CVE-2025-24813-Scanner", "full_name": "Mattb709/CVE-2025-24813-Scanner", @@ -206,15 +215,6 @@ "forks_count": 0, "created_at": "2025-04-07T22:43:56Z" }, - { - "name": "CVE-2025-24813", - "full_name": "GadaLuBau1337/CVE-2025-24813", - "html_url": "https://github.com/GadaLuBau1337/CVE-2025-24813", - "description": null, - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-08T14:52:37Z" - }, { "name": "Tomcat-CVE-2025-24813", "full_name": "B1gN0Se/Tomcat-CVE-2025-24813", diff --git a/exploits/2025/CVE-2025-2736.json b/exploits/2025/CVE-2025-2736.json index 4b827e7..fb00420 100644 --- a/exploits/2025/CVE-2025-2736.json +++ b/exploits/2025/CVE-2025-2736.json @@ -4,7 +4,7 @@ "full_name": "zhuowei/CVE-2025-27363-proof-of-concept", "html_url": "https://github.com/zhuowei/CVE-2025-27363-proof-of-concept", "description": null, - "stargazers_count": 6, + "stargazers_count": 8, "forks_count": 2, "created_at": "2025-03-23T23:30:37Z" }