272 lines
No EOL
10 KiB
JSON
272 lines
No EOL
10 KiB
JSON
[
|
||
{
|
||
"name": "CVE-2018-20250",
|
||
"full_name": "WyAtu/CVE-2018-20250",
|
||
"html_url": "https://github.com/WyAtu/CVE-2018-20250",
|
||
"description": "exp for https://research.checkpoint.com/extracting-code-execution-from-winrar",
|
||
"stargazers_count": 489,
|
||
"forks_count": 177,
|
||
"created_at": "2019-02-22T04:52:08Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-24071_PoC",
|
||
"full_name": "0x6rss/CVE-2025-24071_PoC",
|
||
"html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC",
|
||
"description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File",
|
||
"stargazers_count": 218,
|
||
"forks_count": 36,
|
||
"created_at": "2025-03-16T20:10:19Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-21333-POC",
|
||
"full_name": "MrAle98/CVE-2025-21333-POC",
|
||
"html_url": "https://github.com/MrAle98/CVE-2025-21333-POC",
|
||
"description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY",
|
||
"stargazers_count": 180,
|
||
"forks_count": 31,
|
||
"created_at": "2025-02-27T12:36:55Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-21298",
|
||
"full_name": "ynwarcs/CVE-2025-21298",
|
||
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
|
||
"description": "Proof of concept & details for CVE-2025-21298",
|
||
"stargazers_count": 171,
|
||
"forks_count": 45,
|
||
"created_at": "2025-01-20T18:16:51Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-30208-EXP",
|
||
"full_name": "ThumpBo/CVE-2025-30208-EXP",
|
||
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
|
||
"description": "CVE-2025-30208-EXP",
|
||
"stargazers_count": 160,
|
||
"forks_count": 31,
|
||
"created_at": "2025-03-26T15:42:31Z"
|
||
},
|
||
{
|
||
"name": "7-Zip-CVE-2025-0411-POC",
|
||
"full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC",
|
||
"html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC",
|
||
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
|
||
"stargazers_count": 127,
|
||
"forks_count": 32,
|
||
"created_at": "2025-01-22T14:40:34Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-26125",
|
||
"full_name": "ZeroMemoryEx/CVE-2025-26125",
|
||
"html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125",
|
||
"description": "(0day) Local Privilege Escalation in IObit Malware Fighter",
|
||
"stargazers_count": 126,
|
||
"forks_count": 18,
|
||
"created_at": "2025-01-08T05:50:07Z"
|
||
},
|
||
{
|
||
"name": "POC-CVE-2025-24813",
|
||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||
"stargazers_count": 95,
|
||
"forks_count": 28,
|
||
"created_at": "2025-03-14T07:36:58Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-24813-PoC",
|
||
"full_name": "iSee857/CVE-2025-24813-PoC",
|
||
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
||
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
||
"stargazers_count": 75,
|
||
"forks_count": 23,
|
||
"created_at": "2025-03-13T10:00:03Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-21420-PoC",
|
||
"full_name": "Network-Sec/CVE-2025-21420-PoC",
|
||
"html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC",
|
||
"description": "We found a way to DLL sideload with cleanmgr.exe",
|
||
"stargazers_count": 72,
|
||
"forks_count": 18,
|
||
"created_at": "2025-02-17T08:59:22Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-29927",
|
||
"full_name": "aydinnyunus/CVE-2025-29927",
|
||
"html_url": "https://github.com/aydinnyunus/CVE-2025-29927",
|
||
"description": "CVE-2025-29927 Proof of Concept",
|
||
"stargazers_count": 68,
|
||
"forks_count": 24,
|
||
"created_at": "2025-03-23T12:13:35Z"
|
||
},
|
||
{
|
||
"name": "CVE_2019_2025_EXP",
|
||
"full_name": "jltxgcy/CVE_2019_2025_EXP",
|
||
"html_url": "https://github.com/jltxgcy/CVE_2019_2025_EXP",
|
||
"description": null,
|
||
"stargazers_count": 61,
|
||
"forks_count": 46,
|
||
"created_at": "2019-09-30T02:40:21Z"
|
||
},
|
||
{
|
||
"name": "ingressNightmare-CVE-2025-1974-exps",
|
||
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available",
|
||
"stargazers_count": 60,
|
||
"forks_count": 9,
|
||
"created_at": "2025-03-26T06:43:36Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-0282-Ivanti-exploit",
|
||
"full_name": "absholi7ly/CVE-2025-0282-Ivanti-exploit",
|
||
"html_url": "https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit",
|
||
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
|
||
"stargazers_count": 44,
|
||
"forks_count": 13,
|
||
"created_at": "2025-01-11T02:06:51Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-1974",
|
||
"full_name": "yoshino-s/CVE-2025-1974",
|
||
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
|
||
"description": null,
|
||
"stargazers_count": 43,
|
||
"forks_count": 10,
|
||
"created_at": "2025-03-25T13:23:01Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-24118",
|
||
"full_name": "jprx/CVE-2025-24118",
|
||
"html_url": "https://github.com/jprx/CVE-2025-24118",
|
||
"description": "An XNU kernel race condition bug",
|
||
"stargazers_count": 41,
|
||
"forks_count": 5,
|
||
"created_at": "2025-01-30T00:10:44Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-0282",
|
||
"full_name": "sfewer-r7/CVE-2025-0282",
|
||
"html_url": "https://github.com/sfewer-r7/CVE-2025-0282",
|
||
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
|
||
"stargazers_count": 36,
|
||
"forks_count": 12,
|
||
"created_at": "2025-01-16T14:45:53Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-24016",
|
||
"full_name": "0xjessie21/CVE-2025-24016",
|
||
"html_url": "https://github.com/0xjessie21/CVE-2025-24016",
|
||
"description": "CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)",
|
||
"stargazers_count": 35,
|
||
"forks_count": 6,
|
||
"created_at": "2025-02-16T11:01:12Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-23369",
|
||
"full_name": "hakivvi/CVE-2025-23369",
|
||
"html_url": "https://github.com/hakivvi/CVE-2025-23369",
|
||
"description": "GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit",
|
||
"stargazers_count": 35,
|
||
"forks_count": 3,
|
||
"created_at": "2025-02-08T18:13:04Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-24016",
|
||
"full_name": "MuhammadWaseem29/CVE-2025-24016",
|
||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016",
|
||
"description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ",
|
||
"stargazers_count": 32,
|
||
"forks_count": 5,
|
||
"created_at": "2025-02-20T23:31:03Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-24104",
|
||
"full_name": "ifpdz/CVE-2025-24104",
|
||
"html_url": "https://github.com/ifpdz/CVE-2025-24104",
|
||
"description": null,
|
||
"stargazers_count": 32,
|
||
"forks_count": 4,
|
||
"created_at": "2025-01-24T10:41:12Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-30208",
|
||
"full_name": "xuemian168/CVE-2025-30208",
|
||
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
|
||
"description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation",
|
||
"stargazers_count": 31,
|
||
"forks_count": 1,
|
||
"created_at": "2025-03-26T10:26:12Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-0401",
|
||
"full_name": "CyberSecurityUP/CVE-2025-0401",
|
||
"html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401",
|
||
"description": "Privilege Escalation using Passwd",
|
||
"stargazers_count": 28,
|
||
"forks_count": 5,
|
||
"created_at": "2025-04-01T14:23:43Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-27636-Apache-Camel-PoC",
|
||
"full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC",
|
||
"html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC",
|
||
"description": null,
|
||
"stargazers_count": 28,
|
||
"forks_count": 8,
|
||
"created_at": "2025-03-09T09:42:11Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-0108-PoC",
|
||
"full_name": "iSee857/CVE-2025-0108-PoC",
|
||
"html_url": "https://github.com/iSee857/CVE-2025-0108-PoC",
|
||
"description": "Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108)",
|
||
"stargazers_count": 26,
|
||
"forks_count": 19,
|
||
"created_at": "2025-02-13T06:39:25Z"
|
||
},
|
||
{
|
||
"name": "CVE-2018-20250",
|
||
"full_name": "QAX-A-Team/CVE-2018-20250",
|
||
"html_url": "https://github.com/QAX-A-Team/CVE-2018-20250",
|
||
"description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]",
|
||
"stargazers_count": 25,
|
||
"forks_count": 14,
|
||
"created_at": "2019-02-22T06:47:01Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-0282",
|
||
"full_name": "watchtowrlabs/CVE-2025-0282",
|
||
"html_url": "https://github.com/watchtowrlabs/CVE-2025-0282",
|
||
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
|
||
"stargazers_count": 23,
|
||
"forks_count": 9,
|
||
"created_at": "2025-01-15T18:27:12Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-1094-Exploit",
|
||
"full_name": "soltanali0/CVE-2025-1094-Exploit",
|
||
"html_url": "https://github.com/soltanali0/CVE-2025-1094-Exploit",
|
||
"description": "WebSocket and SQL Injection Exploit Script",
|
||
"stargazers_count": 23,
|
||
"forks_count": 5,
|
||
"created_at": "2025-02-27T11:08:10Z"
|
||
},
|
||
{
|
||
"name": "CVE-2018-20250-WinRAR-ACE",
|
||
"full_name": "easis/CVE-2018-20250-WinRAR-ACE",
|
||
"html_url": "https://github.com/easis/CVE-2018-20250-WinRAR-ACE",
|
||
"description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).",
|
||
"stargazers_count": 21,
|
||
"forks_count": 18,
|
||
"created_at": "2019-02-23T01:20:34Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-20029",
|
||
"full_name": "mbadanoiu/CVE-2025-20029",
|
||
"html_url": "https://github.com/mbadanoiu/CVE-2025-20029",
|
||
"description": "CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP",
|
||
"stargazers_count": 20,
|
||
"forks_count": 5,
|
||
"created_at": "2025-02-23T18:36:11Z"
|
||
}
|
||
] |