mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2026-03-12 19:28:34 +01:00
Auto Update 2025/05/24 18:33:43
This commit is contained in:
parent
4bd3e88d42
commit
d3d8109d85
25 changed files with 195 additions and 78 deletions
|
|
@ -60,5 +60,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 989631009,
|
||||
"name": "final-CVE-2016-5180",
|
||||
"full_name": "pouriam23\/final-CVE-2016-5180",
|
||||
"owner": {
|
||||
"login": "pouriam23",
|
||||
"id": 174950792,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174950792?v=4",
|
||||
"html_url": "https:\/\/github.com\/pouriam23",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pouriam23\/final-CVE-2016-5180",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-05-24T13:54:55Z",
|
||||
"updated_at": "2025-05-24T13:57:00Z",
|
||||
"pushed_at": "2025-05-24T13:56:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"forks": 46,
|
||||
"watchers": 215,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
|||
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"forks": 21,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-11T22:08:47Z",
|
||||
"updated_at": "2025-05-13T16:18:52Z",
|
||||
"updated_at": "2025-05-24T16:48:12Z",
|
||||
"pushed_at": "2021-10-13T22:32:36Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 151,
|
||||
"watchers": 152,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
|||
|
|
@ -107,10 +107,10 @@
|
|||
"description": "Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-04T15:34:03Z",
|
||||
"updated_at": "2025-04-17T02:17:06Z",
|
||||
"updated_at": "2025-05-24T12:43:29Z",
|
||||
"pushed_at": "2023-08-25T22:42:24Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 112,
|
||||
"watchers": 113,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
|||
|
|
@ -213,8 +213,8 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278\/OTHER Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2025-04-29T11:39:11Z",
|
||||
"updated_at": "2025-05-24T11:51:13Z",
|
||||
"pushed_at": "2025-05-24T11:51:10Z",
|
||||
"updated_at": "2025-05-24T17:52:04Z",
|
||||
"pushed_at": "2025-05-24T17:52:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -627,13 +627,13 @@
|
|||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"forks": 36,
|
||||
"watchers": 154,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2025-05-24T05:35:27Z",
|
||||
"updated_at": "2025-05-24T14:09:32Z",
|
||||
"pushed_at": "2025-02-21T14:10:58Z",
|
||||
"stargazers_count": 377,
|
||||
"watchers_count": 377,
|
||||
"stargazers_count": 378,
|
||||
"watchers_count": 378,
|
||||
"has_discussions": true,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
|
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 377,
|
||||
"watchers": 378,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
|||
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -33,7 +33,7 @@
|
|||
"proxy"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"forks": 40,
|
||||
"watchers": 308,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
|
|
|
|||
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -27,7 +27,7 @@
|
|||
"cve-2023-4357"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"forks": 35,
|
||||
"watchers": 215,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2025-05-24T00:01:37Z",
|
||||
"updated_at": "2025-05-24T13:42:52Z",
|
||||
"pushed_at": "2025-05-06T07:35:36Z",
|
||||
"stargazers_count": 1527,
|
||||
"watchers_count": 1527,
|
||||
"stargazers_count": 1528,
|
||||
"watchers_count": 1528,
|
||||
"has_discussions": false,
|
||||
"forks_count": 261,
|
||||
"allow_forking": true,
|
||||
|
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 261,
|
||||
"watchers": 1527,
|
||||
"watchers": 1528,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
|||
|
|
@ -215,5 +215,36 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 989682547,
|
||||
"name": "CVE-2023-50564",
|
||||
"full_name": "glynzr\/CVE-2023-50564",
|
||||
"owner": {
|
||||
"login": "glynzr",
|
||||
"id": 97050713,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97050713?v=4",
|
||||
"html_url": "https:\/\/github.com\/glynzr",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/glynzr\/CVE-2023-50564",
|
||||
"description": "Pluck v4.7.18 - Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2025-05-24T15:55:45Z",
|
||||
"updated_at": "2025-05-24T16:18:18Z",
|
||||
"pushed_at": "2025-05-24T16:18:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit POC for CVE-2024-22026 affecting Ivanti EPMM \"MobileIron Core\"",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-15T11:20:45Z",
|
||||
"updated_at": "2025-03-18T17:59:17Z",
|
||||
"updated_at": "2025-05-24T18:06:28Z",
|
||||
"pushed_at": "2024-05-15T11:40:29Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
|||
|
|
@ -452,8 +452,8 @@
|
|||
"description": "Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2025-04-03T13:54:25Z",
|
||||
"updated_at": "2025-05-24T11:32:59Z",
|
||||
"pushed_at": "2025-05-24T11:32:56Z",
|
||||
"updated_at": "2025-05-24T17:34:05Z",
|
||||
"pushed_at": "2025-05-24T17:34:02Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -424,19 +424,19 @@
|
|||
"description": "CVE-2024-36401-GeoServer Property 表达式注入 Rce woodpecker-framework 插件",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-22T03:57:12Z",
|
||||
"updated_at": "2025-04-28T11:10:53Z",
|
||||
"updated_at": "2025-05-24T13:46:29Z",
|
||||
"pushed_at": "2024-11-23T08:24:26Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 12,
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -145,8 +145,8 @@
|
|||
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2025-03-13T19:53:22Z",
|
||||
"updated_at": "2025-05-24T11:21:38Z",
|
||||
"pushed_at": "2025-05-24T11:21:35Z",
|
||||
"updated_at": "2025-05-24T17:22:28Z",
|
||||
"pushed_at": "2025-05-24T17:22:25Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,19 +14,19 @@
|
|||
"description": "Basic customization app using CVE-2025-24203. Patched in iOS 18.4.",
|
||||
"fork": false,
|
||||
"created_at": "2025-05-09T07:18:55Z",
|
||||
"updated_at": "2025-05-24T09:41:04Z",
|
||||
"pushed_at": "2025-05-24T04:04:34Z",
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"updated_at": "2025-05-24T16:12:58Z",
|
||||
"pushed_at": "2025-05-24T16:12:55Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 128,
|
||||
"forks": 16,
|
||||
"watchers": 130,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
@ -76,8 +76,8 @@
|
|||
"description": "Basic customization app using CVE-2025-24203. Patched in iOS 18.4.",
|
||||
"fork": false,
|
||||
"created_at": "2025-05-10T22:38:58Z",
|
||||
"updated_at": "2025-05-24T12:01:15Z",
|
||||
"pushed_at": "2025-05-24T12:01:12Z",
|
||||
"updated_at": "2025-05-24T18:02:25Z",
|
||||
"pushed_at": "2025-05-24T18:02:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
33
2025/CVE-2025-25014.json
Normal file
33
2025/CVE-2025-25014.json
Normal file
|
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 989650635,
|
||||
"name": "CVE-2025-25014",
|
||||
"full_name": "davidxbors\/CVE-2025-25014",
|
||||
"owner": {
|
||||
"login": "davidxbors",
|
||||
"id": 22767204,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22767204?v=4",
|
||||
"html_url": "https:\/\/github.com\/davidxbors",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/davidxbors\/CVE-2025-25014",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-05-24T14:40:13Z",
|
||||
"updated_at": "2025-05-24T14:43:58Z",
|
||||
"pushed_at": "2025-05-24T14:43:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -1136,15 +1136,15 @@
|
|||
{
|
||||
"id": 955434542,
|
||||
"name": "CVE-2025-29927",
|
||||
"full_name": "w3shi\/CVE-2025-29927",
|
||||
"full_name": "hyperledger-web3j\/CVE-2025-29927",
|
||||
"owner": {
|
||||
"login": "w3shi",
|
||||
"login": "hyperledger-web3j",
|
||||
"id": 169062599,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169062599?v=4",
|
||||
"html_url": "https:\/\/github.com\/w3shi",
|
||||
"html_url": "https:\/\/github.com\/hyperledger-web3j",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/w3shi\/CVE-2025-29927",
|
||||
"html_url": "https:\/\/github.com\/hyperledger-web3j\/CVE-2025-29927",
|
||||
"description": "A touch of security",
|
||||
"fork": false,
|
||||
"created_at": "2025-03-26T16:24:15Z",
|
||||
|
|
@ -1520,7 +1520,7 @@
|
|||
"description": "NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js",
|
||||
"fork": false,
|
||||
"created_at": "2025-03-28T11:09:25Z",
|
||||
"updated_at": "2025-05-20T10:26:34Z",
|
||||
"updated_at": "2025-05-24T14:08:33Z",
|
||||
"pushed_at": "2025-04-12T10:55:01Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
|
|
@ -1529,7 +1529,20 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"anonymous",
|
||||
"authentication-bypass",
|
||||
"automation",
|
||||
"cve-2025-29927",
|
||||
"ethical-hacking",
|
||||
"hacking",
|
||||
"middleware-bypass",
|
||||
"nextjs",
|
||||
"penetration-testing",
|
||||
"python",
|
||||
"security-testing",
|
||||
"vulnerability-scanner"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 37,
|
||||
|
|
|
|||
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
|||
|
|
@ -14,19 +14,19 @@
|
|||
"description": "1day practice - Escape macOS sandbox (partial) using RemoteViewServices",
|
||||
"fork": false,
|
||||
"created_at": "2025-05-12T23:51:04Z",
|
||||
"updated_at": "2025-05-20T11:10:04Z",
|
||||
"updated_at": "2025-05-24T14:26:43Z",
|
||||
"pushed_at": "2025-05-12T23:52:30Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 35,
|
||||
"forks": 6,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
@ -45,8 +45,8 @@
|
|||
"description": "1day practice - Escape macOS sandbox (partial) using RemoteViewServices",
|
||||
"fork": false,
|
||||
"created_at": "2025-05-15T00:55:10Z",
|
||||
"updated_at": "2025-05-24T12:05:35Z",
|
||||
"pushed_at": "2025-05-24T12:05:31Z",
|
||||
"updated_at": "2025-05-24T18:06:56Z",
|
||||
"pushed_at": "2025-05-24T18:06:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -419,8 +419,8 @@
|
|||
"description": "CVE-2025-32433 https:\/\/github.com\/erlang\/otp\/security\/advisories\/GHSA-37cp-fgq5-7wc2",
|
||||
"fork": false,
|
||||
"created_at": "2025-04-24T21:14:12Z",
|
||||
"updated_at": "2025-05-24T11:44:38Z",
|
||||
"pushed_at": "2025-05-24T11:44:35Z",
|
||||
"updated_at": "2025-05-24T17:45:20Z",
|
||||
"pushed_at": "2025-05-24T17:45:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Artefacts for blog post on finding CVE-2025-37899 with o3",
|
||||
"fork": false,
|
||||
"created_at": "2025-05-22T10:36:18Z",
|
||||
"updated_at": "2025-05-24T11:26:32Z",
|
||||
"updated_at": "2025-05-24T13:36:34Z",
|
||||
"pushed_at": "2025-05-22T10:37:04Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.",
|
||||
"fork": false,
|
||||
"created_at": "2025-05-01T16:35:56Z",
|
||||
"updated_at": "2025-05-24T11:54:26Z",
|
||||
"pushed_at": "2025-05-24T11:54:23Z",
|
||||
"updated_at": "2025-05-24T17:56:32Z",
|
||||
"pushed_at": "2025-05-24T17:56:28Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
|
|
@ -66,8 +66,8 @@
|
|||
"description": "Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.",
|
||||
"fork": false,
|
||||
"created_at": "2025-05-01T16:35:56Z",
|
||||
"updated_at": "2025-05-24T11:56:43Z",
|
||||
"pushed_at": "2025-05-24T11:56:40Z",
|
||||
"updated_at": "2025-05-24T17:55:08Z",
|
||||
"pushed_at": "2025-05-24T17:55:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
11
README.md
11
README.md
|
|
@ -995,6 +995,13 @@
|
|||
|
||||
- [airbus-cert/cve-2025-24985](https://github.com/airbus-cert/cve-2025-24985)
|
||||
|
||||
### CVE-2025-25014 (2025-05-06)
|
||||
|
||||
<code>A Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting endpoints.
|
||||
</code>
|
||||
|
||||
- [davidxbors/CVE-2025-25014](https://github.com/davidxbors/CVE-2025-25014)
|
||||
|
||||
### CVE-2025-25062 (2025-02-03)
|
||||
|
||||
<code>An XSS issue was discovered in Backdrop CMS 1.28.x before 1.28.5 and 1.29.x before 1.29.3. It doesn't sufficiently isolate long text content when the CKEditor 5 rich text editor is used. This allows a potential attacker to craft specialized HTML and JavaScript that may be executed when an administrator attempts to edit a piece of content. This vulnerability is mitigated by the fact that an attacker must have the ability to create long text content (such as through the node or comment forms) and an administrator must edit (not view) the content that contains the malicious content. This problem only exists when using the CKEditor 5 module.
|
||||
|
|
@ -1590,7 +1597,7 @@
|
|||
- [kOaDT/poc-cve-2025-29927](https://github.com/kOaDT/poc-cve-2025-29927)
|
||||
- [yugo-eliatrope/test-cve-2025-29927](https://github.com/yugo-eliatrope/test-cve-2025-29927)
|
||||
- [emadshanab/CVE-2025-29927](https://github.com/emadshanab/CVE-2025-29927)
|
||||
- [w3shi/CVE-2025-29927](https://github.com/w3shi/CVE-2025-29927)
|
||||
- [hyperledger-web3j/CVE-2025-29927](https://github.com/hyperledger-web3j/CVE-2025-29927)
|
||||
- [aleongx/CVE-2025-29927](https://github.com/aleongx/CVE-2025-29927)
|
||||
- [nicknisi/next-attack](https://github.com/nicknisi/next-attack)
|
||||
- [jmbowes/NextSecureScan](https://github.com/jmbowes/NextSecureScan)
|
||||
|
|
@ -20816,6 +20823,7 @@
|
|||
- [Mrterrestrial/CVE-2023-50564](https://github.com/Mrterrestrial/CVE-2023-50564)
|
||||
- [0xDTC/Pluck-CMS-v4.7.18-Remote-Code-Execution-CVE-2023-50564](https://github.com/0xDTC/Pluck-CMS-v4.7.18-Remote-Code-Execution-CVE-2023-50564)
|
||||
- [xpltive/CVE-2023-50564](https://github.com/xpltive/CVE-2023-50564)
|
||||
- [glynzr/CVE-2023-50564](https://github.com/glynzr/CVE-2023-50564)
|
||||
|
||||
### CVE-2023-50596
|
||||
- [chandraprarikraj/CVE-2023-50596](https://github.com/chandraprarikraj/CVE-2023-50596)
|
||||
|
|
@ -50957,6 +50965,7 @@
|
|||
|
||||
- [pouriam23/CVE-2016-5180](https://github.com/pouriam23/CVE-2016-5180)
|
||||
- [pouriam23/CVE-2016-5180-docker-](https://github.com/pouriam23/CVE-2016-5180-docker-)
|
||||
- [pouriam23/final-CVE-2016-5180](https://github.com/pouriam23/final-CVE-2016-5180)
|
||||
|
||||
### CVE-2016-5195 (2016-11-10)
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue