diff --git a/exploits/2015/CVE-2015-6420.json b/exploits/2015/CVE-2015-6420.json new file mode 100644 index 0000000..04186d4 --- /dev/null +++ b/exploits/2015/CVE-2015-6420.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2015-6420", + "full_name": "Leeziao/CVE-2015-6420", + "html_url": "https://github.com/Leeziao/CVE-2015-6420", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-16T03:03:28Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2025.json b/exploits/2025/CVE-2025-2025.json index dc3faaa..e449b12 100644 --- a/exploits/2025/CVE-2025-2025.json +++ b/exploits/2025/CVE-2025-2025.json @@ -13,7 +13,7 @@ "full_name": "0x6rss/CVE-2025-24071_PoC", "html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC", "description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File", - "stargazers_count": 230, + "stargazers_count": 240, "forks_count": 37, "created_at": "2025-03-16T20:10:19Z" }, @@ -31,7 +31,7 @@ "full_name": "ynwarcs/CVE-2025-21298", "html_url": "https://github.com/ynwarcs/CVE-2025-21298", "description": "Proof of concept & details for CVE-2025-21298", - "stargazers_count": 173, + "stargazers_count": 175, "forks_count": 45, "created_at": "2025-01-20T18:16:51Z" }, @@ -40,7 +40,7 @@ "full_name": "ThumpBo/CVE-2025-30208-EXP", "html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP", "description": "CVE-2025-30208-EXP", - "stargazers_count": 168, + "stargazers_count": 171, "forks_count": 31, "created_at": "2025-03-26T15:42:31Z" }, @@ -49,7 +49,7 @@ "full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC", "html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC", "description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.", - "stargazers_count": 128, + "stargazers_count": 129, "forks_count": 32, "created_at": "2025-01-22T14:40:34Z" }, @@ -67,8 +67,8 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 102, - "forks_count": 28, + "stargazers_count": 107, + "forks_count": 29, "created_at": "2025-03-14T07:36:58Z" }, { @@ -76,7 +76,7 @@ "full_name": "iSee857/CVE-2025-24813-PoC", "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", - "stargazers_count": 78, + "stargazers_count": 79, "forks_count": 25, "created_at": "2025-03-13T10:00:03Z" }, @@ -85,7 +85,7 @@ "full_name": "Network-Sec/CVE-2025-21420-PoC", "html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC", "description": "We found a way to DLL sideload with cleanmgr.exe", - "stargazers_count": 72, + "stargazers_count": 74, "forks_count": 18, "created_at": "2025-02-17T08:59:22Z" }, @@ -94,8 +94,8 @@ "full_name": "aydinnyunus/CVE-2025-29927", "html_url": "https://github.com/aydinnyunus/CVE-2025-29927", "description": "CVE-2025-29927 Proof of Concept", - "stargazers_count": 69, - "forks_count": 25, + "stargazers_count": 70, + "forks_count": 26, "created_at": "2025-03-23T12:13:35Z" }, { @@ -103,7 +103,7 @@ "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available", - "stargazers_count": 64, + "stargazers_count": 70, "forks_count": 11, "created_at": "2025-03-26T06:43:36Z" }, @@ -116,12 +116,21 @@ "forks_count": 46, "created_at": "2019-09-30T02:40:21Z" }, + { + "name": "CVE-2025-22457", + "full_name": "sfewer-r7/CVE-2025-22457", + "html_url": "https://github.com/sfewer-r7/CVE-2025-22457", + "description": "PoC for CVE-2025-22457", + "stargazers_count": 48, + "forks_count": 8, + "created_at": "2025-04-09T14:39:25Z" + }, { "name": "CVE-2025-1974", "full_name": "yoshino-s/CVE-2025-1974", "html_url": "https://github.com/yoshino-s/CVE-2025-1974", "description": null, - "stargazers_count": 44, + "stargazers_count": 45, "forks_count": 10, "created_at": "2025-03-25T13:23:01Z" }, @@ -130,7 +139,7 @@ "full_name": "absholi7ly/CVE-2025-0282-Ivanti-exploit", "html_url": "https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit", "description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.", - "stargazers_count": 44, + "stargazers_count": 45, "forks_count": 13, "created_at": "2025-01-11T02:06:51Z" }, @@ -147,8 +156,8 @@ "name": "CVE-2025-30208", "full_name": "xuemian168/CVE-2025-30208", "html_url": "https://github.com/xuemian168/CVE-2025-30208", - "description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation", - "stargazers_count": 37, + "description": "全网首发 CVE-2025-31125 CVE-2025-30208 CVE-2025-32395 Vite Scanner", + "stargazers_count": 38, "forks_count": 1, "created_at": "2025-03-26T10:26:12Z" }, @@ -166,7 +175,7 @@ "full_name": "0xjessie21/CVE-2025-24016", "html_url": "https://github.com/0xjessie21/CVE-2025-24016", "description": "CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)", - "stargazers_count": 35, + "stargazers_count": 36, "forks_count": 6, "created_at": "2025-02-16T11:01:12Z" }, @@ -211,7 +220,7 @@ "full_name": "MuhammadWaseem29/CVE-2025-24813", "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813", "description": null, - "stargazers_count": 29, + "stargazers_count": 30, "forks_count": 6, "created_at": "2025-04-05T18:57:08Z" }, @@ -256,17 +265,8 @@ "full_name": "soltanali0/CVE-2025-1094-Exploit", "html_url": "https://github.com/soltanali0/CVE-2025-1094-Exploit", "description": "WebSocket and SQL Injection Exploit Script", - "stargazers_count": 23, - "forks_count": 5, + "stargazers_count": 24, + "forks_count": 6, "created_at": "2025-02-27T11:08:10Z" - }, - { - "name": "CVE-2025-24799", - "full_name": "MuhammadWaseem29/CVE-2025-24799", - "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799", - "description": null, - "stargazers_count": 22, - "forks_count": 5, - "created_at": "2025-04-03T16:55:11Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-30567.json b/exploits/2025/CVE-2025-30567.json index 5bf1d9d..e857cc8 100644 --- a/exploits/2025/CVE-2025-30567.json +++ b/exploits/2025/CVE-2025-30567.json @@ -7,5 +7,23 @@ "stargazers_count": 1, "forks_count": 0, "created_at": "2025-03-26T14:37:34Z" + }, + { + "name": "CVE-2025-30567-PoC", + "full_name": "realcodeb0ss/CVE-2025-30567-PoC", + "html_url": "https://github.com/realcodeb0ss/CVE-2025-30567-PoC", + "description": "CVE-2025-30567 - WordPress WP01 < Path traversal", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-03T22:52:06Z" + }, + { + "name": "CVE-2025-30567-PoC", + "full_name": "KaxuFF/CVE-2025-30567-PoC", + "html_url": "https://github.com/KaxuFF/CVE-2025-30567-PoC", + "description": "CVE-2025-30567 - WordPress WP01 < Path traversal", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-06T14:38:16Z" } ] \ No newline at end of file