Update recent feed data
This commit is contained in:
parent
64c3eba5df
commit
2186e04b57
6 changed files with 62 additions and 51 deletions
|
@ -7,14 +7,5 @@
|
|||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-04-03T06:41:47Z"
|
||||
},
|
||||
{
|
||||
"name": "platform_frameworks_av_AOSP10_r33_CVE-2023-20933",
|
||||
"full_name": "hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933",
|
||||
"html_url": "https://github.com/hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-04-05T06:04:42Z"
|
||||
}
|
||||
]
|
|
@ -5,7 +5,7 @@
|
|||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799",
|
||||
"description": null,
|
||||
"stargazers_count": 24,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"created_at": "2025-04-03T16:55:11Z"
|
||||
},
|
||||
{
|
||||
|
@ -13,8 +13,8 @@
|
|||
"full_name": "MatheuZSecurity/Exploit-CVE-2025-24799",
|
||||
"html_url": "https://github.com/MatheuZSecurity/Exploit-CVE-2025-24799",
|
||||
"description": "CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection",
|
||||
"stargazers_count": 15,
|
||||
"forks_count": 12,
|
||||
"stargazers_count": 21,
|
||||
"forks_count": 15,
|
||||
"created_at": "2025-04-15T04:57:39Z"
|
||||
},
|
||||
{
|
||||
|
@ -26,6 +26,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-04-16T19:04:44Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24799",
|
||||
"full_name": "galletitaconpate/CVE-2025-24799",
|
||||
"html_url": "https://github.com/galletitaconpate/CVE-2025-24799",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-05-22T20:49:43Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24799-PoC",
|
||||
"full_name": "realcodeb0ss/CVE-2025-24799-PoC",
|
||||
|
|
|
@ -1,4 +1,13 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2025-24801",
|
||||
"full_name": "fatkz/CVE-2025-24801",
|
||||
"html_url": "https://github.com/fatkz/CVE-2025-24801",
|
||||
"description": "CVE-2025-24801 Exploit ",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-05-05T23:22:18Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24801",
|
||||
"full_name": "r1beirin/CVE-2025-24801",
|
||||
|
@ -7,14 +16,5 @@
|
|||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-19T01:59:30Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24801",
|
||||
"full_name": "fatkz/CVE-2025-24801",
|
||||
"html_url": "https://github.com/fatkz/CVE-2025-24801",
|
||||
"description": "CVE-2025-24801 Exploit ",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-05-05T23:22:18Z"
|
||||
}
|
||||
]
|
|
@ -62,6 +62,15 @@
|
|||
"forks_count": 2,
|
||||
"created_at": "2025-05-25T13:34:18Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||
"stargazers_count": 5,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T19:12:39Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Exploit",
|
||||
"full_name": "msadeghkarimi/CVE-2025-24813-Exploit",
|
||||
|
@ -90,13 +99,13 @@
|
|||
"created_at": "2025-04-05T09:07:13Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||
"stargazers_count": 4,
|
||||
"name": "CVE-2025-24813-vulhub",
|
||||
"full_name": "Erosion2020/CVE-2025-24813-vulhub",
|
||||
"html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub",
|
||||
"description": "CVE-2025-24813的vulhub环境的POC脚本",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T19:12:39Z"
|
||||
"created_at": "2025-04-18T11:03:33Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813_POC",
|
||||
|
@ -125,15 +134,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-24T17:47:10Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-vulhub",
|
||||
"full_name": "Erosion2020/CVE-2025-24813-vulhub",
|
||||
"html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub",
|
||||
"description": "CVE-2025-24813的vulhub环境的POC脚本",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-18T11:03:33Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "issamjr/CVE-2025-24813-Scanner",
|
||||
|
|
|
@ -62,6 +62,15 @@
|
|||
"forks_count": 2,
|
||||
"created_at": "2025-05-25T13:34:18Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||
"stargazers_count": 5,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T19:12:39Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Exploit",
|
||||
"full_name": "msadeghkarimi/CVE-2025-24813-Exploit",
|
||||
|
@ -90,13 +99,13 @@
|
|||
"created_at": "2025-04-05T09:07:13Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||
"stargazers_count": 4,
|
||||
"name": "CVE-2025-24813-vulhub",
|
||||
"full_name": "Erosion2020/CVE-2025-24813-vulhub",
|
||||
"html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub",
|
||||
"description": "CVE-2025-24813的vulhub环境的POC脚本",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T19:12:39Z"
|
||||
"created_at": "2025-04-18T11:03:33Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813_POC",
|
||||
|
@ -125,15 +134,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-24T17:47:10Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-vulhub",
|
||||
"full_name": "Erosion2020/CVE-2025-24813-vulhub",
|
||||
"html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub",
|
||||
"description": "CVE-2025-24813的vulhub环境的POC脚本",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-18T11:03:33Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-POC",
|
||||
"full_name": "Alaatk/CVE-2025-24813-POC",
|
||||
|
|
11
exploits/2025/CVE-2025-2835.json
Normal file
11
exploits/2025/CVE-2025-2835.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2025-28355",
|
||||
"full_name": "abbisQQ/CVE-2025-28355",
|
||||
"html_url": "https://github.com/abbisQQ/CVE-2025-28355",
|
||||
"description": "It was identified that the https://github.com/Volmarg/personal-management-system application is vulnerable to CSRF attacks.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-18T07:43:41Z"
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue