Update recent feed data

This commit is contained in:
Brendan McDevitt 2025-04-26 01:15:10 +00:00
parent e0a795e50d
commit 04cf9ed899
3 changed files with 87 additions and 76 deletions

View file

@ -4,7 +4,7 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 108,
"stargazers_count": 110,
"forks_count": 30,
"created_at": "2025-03-14T07:36:58Z"
},
@ -13,7 +13,7 @@
"full_name": "iSee857/CVE-2025-24813-PoC",
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
"stargazers_count": 79,
"stargazers_count": 82,
"forks_count": 25,
"created_at": "2025-03-13T10:00:03Z"
},
@ -107,6 +107,15 @@
"forks_count": 0,
"created_at": "2025-03-17T03:58:34Z"
},
{
"name": "CVE-2025-24813-vulhub",
"full_name": "Erosion2020/CVE-2025-24813-vulhub",
"html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub",
"description": "CVE-2025-24813的vulhub环境的POC脚本",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-04-18T11:03:33Z"
},
{
"name": "CVE-2025-24813-apache-tomcat",
"full_name": "imbas007/CVE-2025-24813-apache-tomcat",
@ -134,15 +143,6 @@
"forks_count": 0,
"created_at": "2025-03-28T09:44:28Z"
},
{
"name": "CVE-2025-24813-vulhub",
"full_name": "Erosion2020/CVE-2025-24813-vulhub",
"html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub",
"description": "CVE-2025-24813的vulhub环境的POC脚本",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-04-18T11:03:33Z"
},
{
"name": "CVE-2025-24813-POC",
"full_name": "Alaatk/CVE-2025-24813-POC",
@ -152,6 +152,15 @@
"forks_count": 0,
"created_at": "2025-03-21T18:05:27Z"
},
{
"name": "CVE-2025-24813-Scanner",
"full_name": "Mattb709/CVE-2025-24813-Scanner",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-04-12T19:12:39Z"
},
{
"name": "CVE-2025-24813-PoC",
"full_name": "tonyarris/CVE-2025-24813-PoC",
@ -161,6 +170,15 @@
"forks_count": 0,
"created_at": "2025-03-22T15:16:41Z"
},
{
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-04-12T17:38:02Z"
},
{
"name": "CVE-2025-24813",
"full_name": "manjula-aw/CVE-2025-24813",
@ -179,15 +197,6 @@
"forks_count": 0,
"created_at": "2025-04-08T14:52:37Z"
},
{
"name": "CVE-2025-24813-checker",
"full_name": "horsehacks/CVE-2025-24813-checker",
"html_url": "https://github.com/horsehacks/CVE-2025-24813-checker",
"description": "Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-07T22:43:56Z"
},
{
"name": "Tomcat-CVE-2025-24813",
"full_name": "B1gN0Se/Tomcat-CVE-2025-24813",
@ -197,6 +206,15 @@
"forks_count": 0,
"created_at": "2025-03-31T19:01:28Z"
},
{
"name": "CVE-2025-24813-checker",
"full_name": "horsehacks/CVE-2025-24813-checker",
"html_url": "https://github.com/horsehacks/CVE-2025-24813-checker",
"description": "Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-07T22:43:56Z"
},
{
"name": "lab-cve-2025-24813",
"full_name": "ps-interactive/lab-cve-2025-24813",
@ -215,15 +233,6 @@
"forks_count": 1,
"created_at": "2025-04-06T19:36:48Z"
},
{
"name": "CVE-2025-24813-Scanner",
"full_name": "Mattb709/CVE-2025-24813-Scanner",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-12T19:12:39Z"
},
{
"name": "CVE-2025-24813-POC",
"full_name": "f8l124/CVE-2025-24813-POC",
@ -233,15 +242,6 @@
"forks_count": 0,
"created_at": "2025-04-09T15:20:32Z"
},
{
"name": "Spring-Boot-Tomcat-CVE-2025-24813",
"full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
"html_url": "https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
"description": "POC for CVE-2025-24813 using Spring-Boot",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-20T22:52:00Z"
},
{
"name": "CVE-2025-24813-noPoC",
"full_name": "Heimd411/CVE-2025-24813-noPoC",
@ -251,6 +251,15 @@
"forks_count": 0,
"created_at": "2025-04-07T16:17:06Z"
},
{
"name": "Spring-Boot-Tomcat-CVE-2025-24813",
"full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
"html_url": "https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
"description": "POC for CVE-2025-24813 using Spring-Boot",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-20T22:52:00Z"
},
{
"name": "Apache-Tomcat-Vulnerability-POC-CVE-2025-24813",
"full_name": "michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813",
@ -259,14 +268,5 @@
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-19T14:32:01Z"
},
{
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-12T17:38:02Z"
}
]

View file

@ -4,7 +4,7 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 108,
"stargazers_count": 110,
"forks_count": 30,
"created_at": "2025-03-14T07:36:58Z"
},
@ -13,7 +13,7 @@
"full_name": "iSee857/CVE-2025-24813-PoC",
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
"stargazers_count": 79,
"stargazers_count": 82,
"forks_count": 25,
"created_at": "2025-03-13T10:00:03Z"
},
@ -98,6 +98,15 @@
"forks_count": 0,
"created_at": "2025-03-24T17:47:10Z"
},
{
"name": "CVE-2025-24813-vulhub",
"full_name": "Erosion2020/CVE-2025-24813-vulhub",
"html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub",
"description": "CVE-2025-24813的vulhub环境的POC脚本",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-04-18T11:03:33Z"
},
{
"name": "CVE-2025-24813-Scanner",
"full_name": "issamjr/CVE-2025-24813-Scanner",
@ -134,15 +143,6 @@
"forks_count": 0,
"created_at": "2025-03-28T09:44:28Z"
},
{
"name": "CVE-2025-24813-vulhub",
"full_name": "Erosion2020/CVE-2025-24813-vulhub",
"html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub",
"description": "CVE-2025-24813的vulhub环境的POC脚本",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-04-18T11:03:33Z"
},
{
"name": "CVE-2025-24813-POC",
"full_name": "Alaatk/CVE-2025-24813-POC",
@ -152,6 +152,15 @@
"forks_count": 0,
"created_at": "2025-03-21T18:05:27Z"
},
{
"name": "CVE-2025-24813-Scanner",
"full_name": "Mattb709/CVE-2025-24813-Scanner",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-04-12T19:12:39Z"
},
{
"name": "CVE-2025-24813-PoC",
"full_name": "tonyarris/CVE-2025-24813-PoC",
@ -161,6 +170,15 @@
"forks_count": 0,
"created_at": "2025-03-22T15:16:41Z"
},
{
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-04-12T17:38:02Z"
},
{
"name": "CVE-2025-24813",
"full_name": "manjula-aw/CVE-2025-24813",
@ -206,15 +224,6 @@
"forks_count": 1,
"created_at": "2025-04-06T19:36:48Z"
},
{
"name": "CVE-2025-24813-Scanner",
"full_name": "Mattb709/CVE-2025-24813-Scanner",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-12T19:12:39Z"
},
{
"name": "lab-cve-2025-24813",
"full_name": "ps-interactive/lab-cve-2025-24813",
@ -259,14 +268,5 @@
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-19T14:32:01Z"
},
{
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-12T17:38:02Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2025-24963",
"full_name": "0xdeviner/CVE-2025-24963",
"html_url": "https://github.com/0xdeviner/CVE-2025-24963",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-23T08:01:49Z"
}
]