Update recent feed data
This commit is contained in:
parent
3ae4a9f469
commit
1b18ceaf3d
2 changed files with 11 additions and 11 deletions
|
@ -4,7 +4,7 @@
|
||||||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||||
"stargazers_count": 112,
|
"stargazers_count": 113,
|
||||||
"forks_count": 31,
|
"forks_count": 31,
|
||||||
"created_at": "2025-03-14T07:36:58Z"
|
"created_at": "2025-03-14T07:36:58Z"
|
||||||
},
|
},
|
||||||
|
@ -233,15 +233,6 @@
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"created_at": "2025-04-07T22:43:56Z"
|
"created_at": "2025-04-07T22:43:56Z"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name": "CVE-2025-24813-POC",
|
|
||||||
"full_name": "La3B0z/CVE-2025-24813-POC",
|
|
||||||
"html_url": "https://github.com/La3B0z/CVE-2025-24813-POC",
|
|
||||||
"description": " CVE-2025-24813-POC JSP Web Shell Uploader",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"forks_count": 1,
|
|
||||||
"created_at": "2025-04-06T19:36:48Z"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "CVE-2025-24813-POC",
|
"name": "CVE-2025-24813-POC",
|
||||||
"full_name": "f8l124/CVE-2025-24813-POC",
|
"full_name": "f8l124/CVE-2025-24813-POC",
|
||||||
|
@ -251,6 +242,15 @@
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"created_at": "2025-04-09T15:20:32Z"
|
"created_at": "2025-04-09T15:20:32Z"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "CVE-2025-24813-POC",
|
||||||
|
"full_name": "La3B0z/CVE-2025-24813-POC",
|
||||||
|
"html_url": "https://github.com/La3B0z/CVE-2025-24813-POC",
|
||||||
|
"description": " CVE-2025-24813-POC JSP Web Shell Uploader",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"forks_count": 1,
|
||||||
|
"created_at": "2025-04-06T19:36:48Z"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "Spring-Boot-Tomcat-CVE-2025-24813",
|
"name": "Spring-Boot-Tomcat-CVE-2025-24813",
|
||||||
"full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
|
"full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||||
"stargazers_count": 112,
|
"stargazers_count": 113,
|
||||||
"forks_count": 31,
|
"forks_count": 31,
|
||||||
"created_at": "2025-03-14T07:36:58Z"
|
"created_at": "2025-03-14T07:36:58Z"
|
||||||
},
|
},
|
||||||
|
|
Loading…
Add table
Reference in a new issue