mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 22:53:11 +00:00
Filter trending PoCs to current-year updates
This commit is contained in:
138
docs/index.html
138
docs/index.html
@@ -56,131 +56,59 @@
|
||||
<section class="section">
|
||||
<div class="section-header">
|
||||
<h1>Trending PoCs</h1>
|
||||
<span class="muted">Pulled from the current-year table in README.md</span>
|
||||
<span class="muted">Current year, updated in the last 4 days</span>
|
||||
</div>
|
||||
<div class="table-wrap" data-trending>
|
||||
<table>
|
||||
<thead><tr><th>Stars</th><th>Updated</th><th>Name</th><th>Description</th></tr></thead>
|
||||
<tbody id="trending-body">
|
||||
<tr>
|
||||
<td>1241</td>
|
||||
<td>360</td>
|
||||
<td>2 hours ago</td>
|
||||
<td><a href="https://github.com/msanft/CVE-2025-55182" target="_blank">CVE-2025-55182</a></td>
|
||||
<td class="mono">Explanation and full RCE PoC for CVE-2025-55182</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>775</td>
|
||||
<td>3 hours ago</td>
|
||||
<td><a href="https://github.com/ejpir/CVE-2025-55182-research" target="_blank">CVE-2025-55182-research</a></td>
|
||||
<td class="mono">CVE-2025-55182 POC</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>495</td>
|
||||
<td>8 days ago</td>
|
||||
<td><a href="https://github.com/WyAtu/CVE-2018-20250" target="_blank">CVE-2018-20250</a></td>
|
||||
<td class="mono">exp for https://research.checkpoint.com/extracting-code-execution-from-winrar</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>607</td>
|
||||
<td>20 hours ago</td>
|
||||
<td><a href="https://github.com/mverschu/CVE-2025-33073" target="_blank">CVE-2025-33073</a></td>
|
||||
<td class="mono">PoC Exploit for the NTLM reflection SMB flaw.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>496</td>
|
||||
<td>4 days ago</td>
|
||||
<td><a href="https://github.com/pr0v3rbs/CVE-2025-32463_chwoot" target="_blank">CVE-2025-32463_chwoot</a></td>
|
||||
<td class="mono">Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>419</td>
|
||||
<td>5 hours ago</td>
|
||||
<td><a href="https://github.com/kh4sh3i/CVE-2025-32463" target="_blank">CVE-2025-32463</a></td>
|
||||
<td class="mono">Local Privilege Escalation to Root via Sudo chroot in Linux</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>305</td>
|
||||
<td>1 day ago</td>
|
||||
<td><a href="https://github.com/soltanali0/CVE-2025-53770-Exploit" target="_blank">CVE-2025-53770-Exploit</a></td>
|
||||
<td class="mono">SharePoint WebPart Injection Exploit Tool</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>289</td>
|
||||
<td>4 hours ago</td>
|
||||
<td><a href="https://github.com/emredavut/CVE-2025-55182" target="_blank">CVE-2025-55182</a></td>
|
||||
<td class="mono">RSC/Next.js RCE Vulnerability Detector & PoC Chrome Extension – CVE-2025-55182 & CVE-2025-66478</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>901</td>
|
||||
<td>1 hour ago</td>
|
||||
<td><a href="https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc" target="_blank">React2Shell-CVE-2025-55182-original-poc</a></td>
|
||||
<td class="mono">Original Proof-of-Concepts for React2Shell CVE-2025-55182</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>386</td>
|
||||
<td>4 days ago</td>
|
||||
<td><a href="https://github.com/0x6rss/CVE-2025-24071_PoC" target="_blank">CVE-2025-24071_PoC</a></td>
|
||||
<td class="mono">CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>207</td>
|
||||
<td>1 day ago</td>
|
||||
<td><a href="https://github.com/leesh3288/CVE-2025-32023" target="_blank">CVE-2025-32023</a></td>
|
||||
<td class="mono">PoC & Exploit for CVE-2025-32023 / PlaidCTF 2025 "Zerodeo"</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>396</td>
|
||||
<td>6 days ago</td>
|
||||
<td><a href="https://github.com/yuuouu/ColorOS-CVE-2025-10184" target="_blank">ColorOS-CVE-2025-10184</a></td>
|
||||
<td class="mono">ColorOS短信漏洞,以及用户自救方案</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>180</td>
|
||||
<td>6 days ago</td>
|
||||
<td><a href="https://github.com/absholi7ly/POC-CVE-2025-24813" target="_blank">POC-CVE-2025-24813</a></td>
|
||||
<td class="mono">his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>256</td>
|
||||
<td>15 minutes ago</td>
|
||||
<td><a href="https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-" target="_blank">CVE-2025-55182-advanced-scanner-</a></td>
|
||||
<td class="mono"></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>357</td>
|
||||
<td>1 hour ago</td>
|
||||
<td><a href="https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478" target="_blank">Next.js-RSC-RCE-Scanner-CVE-2025-66478</a></td>
|
||||
<td class="mono">A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnerability.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>198</td>
|
||||
<td>4 days ago</td>
|
||||
<td><a href="https://github.com/ThumpBo/CVE-2025-30208-EXP" target="_blank">CVE-2025-30208-EXP</a></td>
|
||||
<td class="mono">CVE-2025-30208-EXP</td>
|
||||
<td>4</td>
|
||||
<td>13 hours ago</td>
|
||||
<td><a href="https://github.com/wangxso/CVE-2025-66478-POC" target="_blank">CVE-2025-66478-POC</a></td>
|
||||
<td class="mono">CVE-2025-66478 Proof of Concept</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>73</td>
|
||||
<td>6 days ago</td>
|
||||
<td><a href="https://github.com/4daysday/cve-2025-8088" target="_blank">cve-2025-8088</a></td>
|
||||
<td class="mono">Path traversal tool based on cve-2025-8088</td>
|
||||
<td>4</td>
|
||||
<td>22 hours ago</td>
|
||||
<td><a href="https://github.com/bbaboha/CVE-2025-65318-and-CVE-2025-65319" target="_blank">CVE-2025-65318-and-CVE-2025-65319</a></td>
|
||||
<td class="mono">Insecure attachment handling when using Canary Mail or Blue mail</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>163</td>
|
||||
<td>78</td>
|
||||
<td>1 day ago</td>
|
||||
<td><a href="https://github.com/ZeroMemoryEx/CVE-2025-26125" target="_blank">CVE-2025-26125</a></td>
|
||||
<td class="mono">( 0day ) Local Privilege Escalation in IObit Malware Fighter</td>
|
||||
<td><a href="https://github.com/Ashwesker/Blackash-CVE-2025-55182" target="_blank">Blackash-CVE-2025-55182</a></td>
|
||||
<td class="mono">CVE-2025-55182</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>153</td>
|
||||
<td>8 days ago</td>
|
||||
<td><a href="https://github.com/hoefler02/CVE-2025-21756" target="_blank">CVE-2025-21756</a></td>
|
||||
<td class="mono">Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!</td>
|
||||
<td>17</td>
|
||||
<td>1 day ago</td>
|
||||
<td><a href="https://github.com/ThemeHackers/CVE-2025-55182" target="_blank">CVE-2025-55182</a></td>
|
||||
<td class="mono">a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC). It also includes a realistic "Lab Environment" to safely test and understand the vulnerability.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>136</td>
|
||||
<td>27 days ago</td>
|
||||
<td><a href="https://github.com/platsecurity/CVE-2025-32433" target="_blank">CVE-2025-32433</a></td>
|
||||
<td class="mono">CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2</td>
|
||||
<td>6</td>
|
||||
<td>1 day ago</td>
|
||||
<td><a href="https://github.com/cybertechajju/CVE-2025-55184-POC-Expolit" target="_blank">CVE-2025-55184-POC-Expolit</a></td>
|
||||
<td class="mono"></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>3</td>
|
||||
<td>1 day ago</td>
|
||||
<td><a href="https://github.com/ThemeHackers/CVE-2025-54100" target="_blank">CVE-2025-54100</a></td>
|
||||
<td class="mono">CVE-2025-54100 (CVSS 7.8 High) is a command injection vulnerability in the Invoke-WebRequest cmdlet of Windows PowerShell 5.1. It arises from improper neutralization of special elements during the automatic parsing of Web responses.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>5</td>
|
||||
<td>3 days ago</td>
|
||||
<td><a href="https://github.com/keklick1337/CVE-2025-55182-golang-PoC" target="_blank">CVE-2025-55182-golang-PoC</a></td>
|
||||
<td class="mono">CVE-2025-55182 React Server Components RCE - Go PoC</td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
Reference in New Issue
Block a user