Update recent feed data
This commit is contained in:
parent
00bbd0b5da
commit
d25e367c28
3 changed files with 57 additions and 28 deletions
11
exploits/2015/CVE-2015-6420.json
Normal file
11
exploits/2015/CVE-2015-6420.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2015-6420",
|
||||
"full_name": "Leeziao/CVE-2015-6420",
|
||||
"html_url": "https://github.com/Leeziao/CVE-2015-6420",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-16T03:03:28Z"
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"full_name": "0x6rss/CVE-2025-24071_PoC",
|
||||
"html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC",
|
||||
"description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File",
|
||||
"stargazers_count": 230,
|
||||
"stargazers_count": 240,
|
||||
"forks_count": 37,
|
||||
"created_at": "2025-03-16T20:10:19Z"
|
||||
},
|
||||
|
@ -31,7 +31,7 @@
|
|||
"full_name": "ynwarcs/CVE-2025-21298",
|
||||
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
|
||||
"description": "Proof of concept & details for CVE-2025-21298",
|
||||
"stargazers_count": 173,
|
||||
"stargazers_count": 175,
|
||||
"forks_count": 45,
|
||||
"created_at": "2025-01-20T18:16:51Z"
|
||||
},
|
||||
|
@ -40,7 +40,7 @@
|
|||
"full_name": "ThumpBo/CVE-2025-30208-EXP",
|
||||
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
|
||||
"description": "CVE-2025-30208-EXP",
|
||||
"stargazers_count": 168,
|
||||
"stargazers_count": 171,
|
||||
"forks_count": 31,
|
||||
"created_at": "2025-03-26T15:42:31Z"
|
||||
},
|
||||
|
@ -49,7 +49,7 @@
|
|||
"full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC",
|
||||
"html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC",
|
||||
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
|
||||
"stargazers_count": 128,
|
||||
"stargazers_count": 129,
|
||||
"forks_count": 32,
|
||||
"created_at": "2025-01-22T14:40:34Z"
|
||||
},
|
||||
|
@ -67,8 +67,8 @@
|
|||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||
"stargazers_count": 102,
|
||||
"forks_count": 28,
|
||||
"stargazers_count": 107,
|
||||
"forks_count": 29,
|
||||
"created_at": "2025-03-14T07:36:58Z"
|
||||
},
|
||||
{
|
||||
|
@ -76,7 +76,7 @@
|
|||
"full_name": "iSee857/CVE-2025-24813-PoC",
|
||||
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
||||
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
||||
"stargazers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"forks_count": 25,
|
||||
"created_at": "2025-03-13T10:00:03Z"
|
||||
},
|
||||
|
@ -85,7 +85,7 @@
|
|||
"full_name": "Network-Sec/CVE-2025-21420-PoC",
|
||||
"html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC",
|
||||
"description": "We found a way to DLL sideload with cleanmgr.exe",
|
||||
"stargazers_count": 72,
|
||||
"stargazers_count": 74,
|
||||
"forks_count": 18,
|
||||
"created_at": "2025-02-17T08:59:22Z"
|
||||
},
|
||||
|
@ -94,8 +94,8 @@
|
|||
"full_name": "aydinnyunus/CVE-2025-29927",
|
||||
"html_url": "https://github.com/aydinnyunus/CVE-2025-29927",
|
||||
"description": "CVE-2025-29927 Proof of Concept",
|
||||
"stargazers_count": 69,
|
||||
"forks_count": 25,
|
||||
"stargazers_count": 70,
|
||||
"forks_count": 26,
|
||||
"created_at": "2025-03-23T12:13:35Z"
|
||||
},
|
||||
{
|
||||
|
@ -103,7 +103,7 @@
|
|||
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||||
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||||
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available",
|
||||
"stargazers_count": 64,
|
||||
"stargazers_count": 70,
|
||||
"forks_count": 11,
|
||||
"created_at": "2025-03-26T06:43:36Z"
|
||||
},
|
||||
|
@ -116,12 +116,21 @@
|
|||
"forks_count": 46,
|
||||
"created_at": "2019-09-30T02:40:21Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-22457",
|
||||
"full_name": "sfewer-r7/CVE-2025-22457",
|
||||
"html_url": "https://github.com/sfewer-r7/CVE-2025-22457",
|
||||
"description": "PoC for CVE-2025-22457",
|
||||
"stargazers_count": 48,
|
||||
"forks_count": 8,
|
||||
"created_at": "2025-04-09T14:39:25Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-1974",
|
||||
"full_name": "yoshino-s/CVE-2025-1974",
|
||||
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
|
||||
"description": null,
|
||||
"stargazers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"forks_count": 10,
|
||||
"created_at": "2025-03-25T13:23:01Z"
|
||||
},
|
||||
|
@ -130,7 +139,7 @@
|
|||
"full_name": "absholi7ly/CVE-2025-0282-Ivanti-exploit",
|
||||
"html_url": "https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit",
|
||||
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
|
||||
"stargazers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"forks_count": 13,
|
||||
"created_at": "2025-01-11T02:06:51Z"
|
||||
},
|
||||
|
@ -147,8 +156,8 @@
|
|||
"name": "CVE-2025-30208",
|
||||
"full_name": "xuemian168/CVE-2025-30208",
|
||||
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
|
||||
"description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation",
|
||||
"stargazers_count": 37,
|
||||
"description": "全网首发 CVE-2025-31125 CVE-2025-30208 CVE-2025-32395 Vite Scanner",
|
||||
"stargazers_count": 38,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-03-26T10:26:12Z"
|
||||
},
|
||||
|
@ -166,7 +175,7 @@
|
|||
"full_name": "0xjessie21/CVE-2025-24016",
|
||||
"html_url": "https://github.com/0xjessie21/CVE-2025-24016",
|
||||
"description": "CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)",
|
||||
"stargazers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"forks_count": 6,
|
||||
"created_at": "2025-02-16T11:01:12Z"
|
||||
},
|
||||
|
@ -211,7 +220,7 @@
|
|||
"full_name": "MuhammadWaseem29/CVE-2025-24813",
|
||||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
|
||||
"description": null,
|
||||
"stargazers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"forks_count": 6,
|
||||
"created_at": "2025-04-05T18:57:08Z"
|
||||
},
|
||||
|
@ -256,17 +265,8 @@
|
|||
"full_name": "soltanali0/CVE-2025-1094-Exploit",
|
||||
"html_url": "https://github.com/soltanali0/CVE-2025-1094-Exploit",
|
||||
"description": "WebSocket and SQL Injection Exploit Script",
|
||||
"stargazers_count": 23,
|
||||
"forks_count": 5,
|
||||
"stargazers_count": 24,
|
||||
"forks_count": 6,
|
||||
"created_at": "2025-02-27T11:08:10Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24799",
|
||||
"full_name": "MuhammadWaseem29/CVE-2025-24799",
|
||||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799",
|
||||
"description": null,
|
||||
"stargazers_count": 22,
|
||||
"forks_count": 5,
|
||||
"created_at": "2025-04-03T16:55:11Z"
|
||||
}
|
||||
]
|
|
@ -7,5 +7,23 @@
|
|||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-26T14:37:34Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-30567-PoC",
|
||||
"full_name": "realcodeb0ss/CVE-2025-30567-PoC",
|
||||
"html_url": "https://github.com/realcodeb0ss/CVE-2025-30567-PoC",
|
||||
"description": "CVE-2025-30567 - WordPress WP01 < Path traversal",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-03T22:52:06Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-30567-PoC",
|
||||
"full_name": "KaxuFF/CVE-2025-30567-PoC",
|
||||
"html_url": "https://github.com/KaxuFF/CVE-2025-30567-PoC",
|
||||
"description": "CVE-2025-30567 - WordPress WP01 < Path traversal",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-06T14:38:16Z"
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue