Update recent feed data

This commit is contained in:
Brendan McDevitt 2025-04-17 01:11:16 +00:00
parent 00bbd0b5da
commit d25e367c28
3 changed files with 57 additions and 28 deletions

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2015-6420",
"full_name": "Leeziao/CVE-2015-6420",
"html_url": "https://github.com/Leeziao/CVE-2015-6420",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-16T03:03:28Z"
}
]

View file

@ -13,7 +13,7 @@
"full_name": "0x6rss/CVE-2025-24071_PoC",
"html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC",
"description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File",
"stargazers_count": 230,
"stargazers_count": 240,
"forks_count": 37,
"created_at": "2025-03-16T20:10:19Z"
},
@ -31,7 +31,7 @@
"full_name": "ynwarcs/CVE-2025-21298",
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
"description": "Proof of concept & details for CVE-2025-21298",
"stargazers_count": 173,
"stargazers_count": 175,
"forks_count": 45,
"created_at": "2025-01-20T18:16:51Z"
},
@ -40,7 +40,7 @@
"full_name": "ThumpBo/CVE-2025-30208-EXP",
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
"description": "CVE-2025-30208-EXP",
"stargazers_count": 168,
"stargazers_count": 171,
"forks_count": 31,
"created_at": "2025-03-26T15:42:31Z"
},
@ -49,7 +49,7 @@
"full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC",
"html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC",
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
"stargazers_count": 128,
"stargazers_count": 129,
"forks_count": 32,
"created_at": "2025-01-22T14:40:34Z"
},
@ -67,8 +67,8 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 102,
"forks_count": 28,
"stargazers_count": 107,
"forks_count": 29,
"created_at": "2025-03-14T07:36:58Z"
},
{
@ -76,7 +76,7 @@
"full_name": "iSee857/CVE-2025-24813-PoC",
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
"stargazers_count": 78,
"stargazers_count": 79,
"forks_count": 25,
"created_at": "2025-03-13T10:00:03Z"
},
@ -85,7 +85,7 @@
"full_name": "Network-Sec/CVE-2025-21420-PoC",
"html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC",
"description": "We found a way to DLL sideload with cleanmgr.exe",
"stargazers_count": 72,
"stargazers_count": 74,
"forks_count": 18,
"created_at": "2025-02-17T08:59:22Z"
},
@ -94,8 +94,8 @@
"full_name": "aydinnyunus/CVE-2025-29927",
"html_url": "https://github.com/aydinnyunus/CVE-2025-29927",
"description": "CVE-2025-29927 Proof of Concept",
"stargazers_count": 69,
"forks_count": 25,
"stargazers_count": 70,
"forks_count": 26,
"created_at": "2025-03-23T12:13:35Z"
},
{
@ -103,7 +103,7 @@
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 mirror UID injection -- all available",
"stargazers_count": 64,
"stargazers_count": 70,
"forks_count": 11,
"created_at": "2025-03-26T06:43:36Z"
},
@ -116,12 +116,21 @@
"forks_count": 46,
"created_at": "2019-09-30T02:40:21Z"
},
{
"name": "CVE-2025-22457",
"full_name": "sfewer-r7/CVE-2025-22457",
"html_url": "https://github.com/sfewer-r7/CVE-2025-22457",
"description": "PoC for CVE-2025-22457",
"stargazers_count": 48,
"forks_count": 8,
"created_at": "2025-04-09T14:39:25Z"
},
{
"name": "CVE-2025-1974",
"full_name": "yoshino-s/CVE-2025-1974",
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
"description": null,
"stargazers_count": 44,
"stargazers_count": 45,
"forks_count": 10,
"created_at": "2025-03-25T13:23:01Z"
},
@ -130,7 +139,7 @@
"full_name": "absholi7ly/CVE-2025-0282-Ivanti-exploit",
"html_url": "https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit",
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
"stargazers_count": 44,
"stargazers_count": 45,
"forks_count": 13,
"created_at": "2025-01-11T02:06:51Z"
},
@ -147,8 +156,8 @@
"name": "CVE-2025-30208",
"full_name": "xuemian168/CVE-2025-30208",
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
"description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation",
"stargazers_count": 37,
"description": "全网首发 CVE-2025-31125 CVE-2025-30208 CVE-2025-32395 Vite Scanner",
"stargazers_count": 38,
"forks_count": 1,
"created_at": "2025-03-26T10:26:12Z"
},
@ -166,7 +175,7 @@
"full_name": "0xjessie21/CVE-2025-24016",
"html_url": "https://github.com/0xjessie21/CVE-2025-24016",
"description": "CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)",
"stargazers_count": 35,
"stargazers_count": 36,
"forks_count": 6,
"created_at": "2025-02-16T11:01:12Z"
},
@ -211,7 +220,7 @@
"full_name": "MuhammadWaseem29/CVE-2025-24813",
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
"description": null,
"stargazers_count": 29,
"stargazers_count": 30,
"forks_count": 6,
"created_at": "2025-04-05T18:57:08Z"
},
@ -256,17 +265,8 @@
"full_name": "soltanali0/CVE-2025-1094-Exploit",
"html_url": "https://github.com/soltanali0/CVE-2025-1094-Exploit",
"description": "WebSocket and SQL Injection Exploit Script",
"stargazers_count": 23,
"forks_count": 5,
"stargazers_count": 24,
"forks_count": 6,
"created_at": "2025-02-27T11:08:10Z"
},
{
"name": "CVE-2025-24799",
"full_name": "MuhammadWaseem29/CVE-2025-24799",
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799",
"description": null,
"stargazers_count": 22,
"forks_count": 5,
"created_at": "2025-04-03T16:55:11Z"
}
]

View file

@ -7,5 +7,23 @@
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-03-26T14:37:34Z"
},
{
"name": "CVE-2025-30567-PoC",
"full_name": "realcodeb0ss/CVE-2025-30567-PoC",
"html_url": "https://github.com/realcodeb0ss/CVE-2025-30567-PoC",
"description": "CVE-2025-30567 - WordPress WP01 < Path traversal",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-03T22:52:06Z"
},
{
"name": "CVE-2025-30567-PoC",
"full_name": "KaxuFF/CVE-2025-30567-PoC",
"html_url": "https://github.com/KaxuFF/CVE-2025-30567-PoC",
"description": "CVE-2025-30567 - WordPress WP01 < Path traversal",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-06T14:38:16Z"
}
]