Update recent feed data
This commit is contained in:
parent
092d04dd34
commit
ea6a96cef5
8 changed files with 124 additions and 0 deletions
29
exploits/2022/CVE-2022-4577.json
Normal file
29
exploits/2022/CVE-2022-4577.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2022-45771-Pwndoc-LFI-to-RCE",
|
||||
"full_name": "p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE",
|
||||
"html_url": "https://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE",
|
||||
"description": "Pwndoc local file inclusion to remote code execution of Node.js code on the server",
|
||||
"stargazers_count": 46,
|
||||
"forks_count": 8,
|
||||
"created_at": "2022-12-13T10:03:14Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-45770",
|
||||
"full_name": "Marsel-marsel/CVE-2022-45770",
|
||||
"html_url": "https://github.com/Marsel-marsel/CVE-2022-45770",
|
||||
"description": "LPE exploit via windows driver",
|
||||
"stargazers_count": 8,
|
||||
"forks_count": 5,
|
||||
"created_at": "2023-01-21T10:32:02Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-45771",
|
||||
"full_name": "yuriisanin/CVE-2022-45771",
|
||||
"html_url": "https://github.com/yuriisanin/CVE-2022-45771",
|
||||
"description": "[PoC] Privilege escalation & code execution via LFI in PwnDoC ",
|
||||
"stargazers_count": 6,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-02-11T15:26:14Z"
|
||||
}
|
||||
]
|
11
exploits/2022/CVE-2022-4580.json
Normal file
11
exploits/2022/CVE-2022-4580.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2022-45808",
|
||||
"full_name": "RandomRobbieBF/CVE-2022-45808",
|
||||
"html_url": "https://github.com/RandomRobbieBF/CVE-2022-45808",
|
||||
"description": "LearnPress Plugin < 4.2.0 - Unauthenticated SQLi",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 2,
|
||||
"created_at": "2023-08-18T15:43:50Z"
|
||||
}
|
||||
]
|
11
exploits/2024/CVE-2024-44313.json
Normal file
11
exploits/2024/CVE-2024-44313.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-44313",
|
||||
"full_name": "cnetsec/CVE-2024-44313",
|
||||
"html_url": "https://github.com/cnetsec/CVE-2024-44313",
|
||||
"description": "Estudo de Caso EPSS",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-19T23:11:09Z"
|
||||
}
|
||||
]
|
11
exploits/2024/CVE-2024-4443.json
Normal file
11
exploits/2024/CVE-2024-4443.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-4443-Poc",
|
||||
"full_name": "truonghuuphuc/CVE-2024-4443-Poc",
|
||||
"html_url": "https://github.com/truonghuuphuc/CVE-2024-4443-Poc",
|
||||
"description": "CVE-2024-4443 Business Directory Plugin – Easy Listing Directories for WordPress <= 6.4.2 - Unauthenticated SQL Injection via listingfields Parameter",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-05-26T16:34:58Z"
|
||||
}
|
||||
]
|
29
exploits/2024/CVE-2024-4533.json
Normal file
29
exploits/2024/CVE-2024-4533.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-45337-POC",
|
||||
"full_name": "NHAS/CVE-2024-45337-POC",
|
||||
"html_url": "https://github.com/NHAS/CVE-2024-45337-POC",
|
||||
"description": "Proof of concept (POC) for CVE-2024-45337 ",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-12-17T22:07:53Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-45337",
|
||||
"full_name": "peace-maker/CVE-2024-45337",
|
||||
"html_url": "https://github.com/peace-maker/CVE-2024-45337",
|
||||
"description": "Proof of Concept for CVE-2024-45337 against Gitea and Forgejo",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-01-24T15:17:47Z"
|
||||
},
|
||||
{
|
||||
"name": "VULNERABLE-CVE-2024-45337",
|
||||
"full_name": "NHAS/VULNERABLE-CVE-2024-45337",
|
||||
"html_url": "https://github.com/NHAS/VULNERABLE-CVE-2024-45337",
|
||||
"description": "An example project that showcases golang code vulnerable to CVE-2024-45337",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-12-17T22:22:03Z"
|
||||
}
|
||||
]
|
11
exploits/2025/CVE-2025-22652.json
Normal file
11
exploits/2025/CVE-2025-22652.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2025-22652",
|
||||
"full_name": "DoTTak/CVE-2025-22652",
|
||||
"html_url": "https://github.com/DoTTak/CVE-2025-22652",
|
||||
"description": "PoC of CVE-2025-22652",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-02-04T05:39:49Z"
|
||||
}
|
||||
]
|
11
exploits/2025/CVE-2025-2690.json
Normal file
11
exploits/2025/CVE-2025-2690.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2025-26909",
|
||||
"full_name": "ZeroDayx/CVE-2025-26909",
|
||||
"html_url": "https://github.com/ZeroDayx/CVE-2025-26909",
|
||||
"description": "CVE-2025-26909",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-28T13:31:11Z"
|
||||
}
|
||||
]
|
11
exploits/2025/CVE-2025-26909.json
Normal file
11
exploits/2025/CVE-2025-26909.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2025-26909",
|
||||
"full_name": "ZeroDayx/CVE-2025-26909",
|
||||
"html_url": "https://github.com/ZeroDayx/CVE-2025-26909",
|
||||
"description": "CVE-2025-26909",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-28T13:31:11Z"
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue