Update recent feed data
This commit is contained in:
parent
1b18af9e08
commit
2e2f4cad94
3 changed files with 33 additions and 33 deletions
|
@ -3,8 +3,8 @@
|
|||
"name": "CVE-2025-24799",
|
||||
"full_name": "MuhammadWaseem29/CVE-2025-24799",
|
||||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799",
|
||||
"description": null,
|
||||
"stargazers_count": 25,
|
||||
"description": "CVE-2025-24799 SQLi Scanner",
|
||||
"stargazers_count": 26,
|
||||
"forks_count": 9,
|
||||
"created_at": "2025-04-03T16:55:11Z"
|
||||
},
|
||||
|
|
|
@ -4,8 +4,8 @@
|
|||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||
"stargazers_count": 148,
|
||||
"forks_count": 35,
|
||||
"stargazers_count": 149,
|
||||
"forks_count": 34,
|
||||
"created_at": "2025-03-14T07:36:58Z"
|
||||
},
|
||||
{
|
||||
|
@ -35,6 +35,15 @@
|
|||
"forks_count": 2,
|
||||
"created_at": "2025-05-25T13:34:18Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "charis3306/CVE-2025-24813",
|
||||
"html_url": "https://github.com/charis3306/CVE-2025-24813",
|
||||
"description": "CVE-2025-24813利用工具",
|
||||
"stargazers_count": 11,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-16T11:59:59Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2025-24813_poc",
|
||||
"full_name": "FY036/cve-2025-24813_poc",
|
||||
|
@ -44,15 +53,6 @@
|
|||
"forks_count": 1,
|
||||
"created_at": "2025-03-14T07:41:40Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "charis3306/CVE-2025-24813",
|
||||
"html_url": "https://github.com/charis3306/CVE-2025-24813",
|
||||
"description": "CVE-2025-24813利用工具",
|
||||
"stargazers_count": 10,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-16T11:59:59Z"
|
||||
},
|
||||
{
|
||||
"name": "Poc_for_CVE-2025-24813",
|
||||
"full_name": "Franconyu/Poc_for_CVE-2025-24813",
|
||||
|
|
|
@ -4,8 +4,8 @@
|
|||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||
"stargazers_count": 148,
|
||||
"forks_count": 35,
|
||||
"stargazers_count": 149,
|
||||
"forks_count": 34,
|
||||
"created_at": "2025-03-14T07:36:58Z"
|
||||
},
|
||||
{
|
||||
|
@ -35,6 +35,15 @@
|
|||
"forks_count": 2,
|
||||
"created_at": "2025-05-25T13:34:18Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "charis3306/CVE-2025-24813",
|
||||
"html_url": "https://github.com/charis3306/CVE-2025-24813",
|
||||
"description": "CVE-2025-24813利用工具",
|
||||
"stargazers_count": 11,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-16T11:59:59Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2025-24813_poc",
|
||||
"full_name": "FY036/cve-2025-24813_poc",
|
||||
|
@ -44,15 +53,6 @@
|
|||
"forks_count": 1,
|
||||
"created_at": "2025-03-14T07:41:40Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "charis3306/CVE-2025-24813",
|
||||
"html_url": "https://github.com/charis3306/CVE-2025-24813",
|
||||
"description": "CVE-2025-24813利用工具",
|
||||
"stargazers_count": 10,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-16T11:59:59Z"
|
||||
},
|
||||
{
|
||||
"name": "Poc_for_CVE-2025-24813",
|
||||
"full_name": "Franconyu/Poc_for_CVE-2025-24813",
|
||||
|
@ -224,15 +224,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-04-27T13:50:24Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "x1ongsec/CVE-2025-24813",
|
||||
"html_url": "https://github.com/x1ongsec/CVE-2025-24813",
|
||||
"description": "tomcat CVE-2025-24813 反序列化RCE环境",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-06-21T14:20:44Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "manjula-aw/CVE-2025-24813",
|
||||
|
@ -251,6 +242,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-07-07T07:17:31Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "x1ongsec/CVE-2025-24813",
|
||||
"html_url": "https://github.com/x1ongsec/CVE-2025-24813",
|
||||
"description": "tomcat CVE-2025-24813 反序列化RCE环境",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-06-21T14:20:44Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-checker",
|
||||
"full_name": "horsehacks/CVE-2025-24813-checker",
|
||||
|
|
Loading…
Add table
Reference in a new issue