Update recent feed data

This commit is contained in:
Brendan McDevitt 2025-05-08 01:14:32 +00:00
parent 3ae4a9f469
commit 1b18ceaf3d
2 changed files with 11 additions and 11 deletions

View file

@ -4,7 +4,7 @@
"full_name": "absholi7ly/POC-CVE-2025-24813", "full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 112, "stargazers_count": 113,
"forks_count": 31, "forks_count": 31,
"created_at": "2025-03-14T07:36:58Z" "created_at": "2025-03-14T07:36:58Z"
}, },
@ -233,15 +233,6 @@
"forks_count": 0, "forks_count": 0,
"created_at": "2025-04-07T22:43:56Z" "created_at": "2025-04-07T22:43:56Z"
}, },
{
"name": "CVE-2025-24813-POC",
"full_name": "La3B0z/CVE-2025-24813-POC",
"html_url": "https://github.com/La3B0z/CVE-2025-24813-POC",
"description": " CVE-2025-24813-POC JSP Web Shell Uploader",
"stargazers_count": 0,
"forks_count": 1,
"created_at": "2025-04-06T19:36:48Z"
},
{ {
"name": "CVE-2025-24813-POC", "name": "CVE-2025-24813-POC",
"full_name": "f8l124/CVE-2025-24813-POC", "full_name": "f8l124/CVE-2025-24813-POC",
@ -251,6 +242,15 @@
"forks_count": 0, "forks_count": 0,
"created_at": "2025-04-09T15:20:32Z" "created_at": "2025-04-09T15:20:32Z"
}, },
{
"name": "CVE-2025-24813-POC",
"full_name": "La3B0z/CVE-2025-24813-POC",
"html_url": "https://github.com/La3B0z/CVE-2025-24813-POC",
"description": " CVE-2025-24813-POC JSP Web Shell Uploader",
"stargazers_count": 0,
"forks_count": 1,
"created_at": "2025-04-06T19:36:48Z"
},
{ {
"name": "Spring-Boot-Tomcat-CVE-2025-24813", "name": "Spring-Boot-Tomcat-CVE-2025-24813",
"full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813", "full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",

View file

@ -4,7 +4,7 @@
"full_name": "absholi7ly/POC-CVE-2025-24813", "full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 112, "stargazers_count": 113,
"forks_count": 31, "forks_count": 31,
"created_at": "2025-03-14T07:36:58Z" "created_at": "2025-03-14T07:36:58Z"
}, },