From 2e2f4cad948c9da2d45c4a6d32a728cb7cbab185 Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Sun, 20 Jul 2025 01:12:32 +0000 Subject: [PATCH] Update recent feed data --- exploits/2025/CVE-2025-2479.json | 4 ++-- exploits/2025/CVE-2025-2481.json | 22 ++++++++--------- exploits/2025/CVE-2025-24813.json | 40 +++++++++++++++---------------- 3 files changed, 33 insertions(+), 33 deletions(-) diff --git a/exploits/2025/CVE-2025-2479.json b/exploits/2025/CVE-2025-2479.json index 6db0c2e..0ab0532 100644 --- a/exploits/2025/CVE-2025-2479.json +++ b/exploits/2025/CVE-2025-2479.json @@ -3,8 +3,8 @@ "name": "CVE-2025-24799", "full_name": "MuhammadWaseem29/CVE-2025-24799", "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799", - "description": null, - "stargazers_count": 25, + "description": "CVE-2025-24799 SQLi Scanner", + "stargazers_count": 26, "forks_count": 9, "created_at": "2025-04-03T16:55:11Z" }, diff --git a/exploits/2025/CVE-2025-2481.json b/exploits/2025/CVE-2025-2481.json index 3830219..0f8df59 100644 --- a/exploits/2025/CVE-2025-2481.json +++ b/exploits/2025/CVE-2025-2481.json @@ -4,8 +4,8 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 148, - "forks_count": 35, + "stargazers_count": 149, + "forks_count": 34, "created_at": "2025-03-14T07:36:58Z" }, { @@ -35,6 +35,15 @@ "forks_count": 2, "created_at": "2025-05-25T13:34:18Z" }, + { + "name": "CVE-2025-24813", + "full_name": "charis3306/CVE-2025-24813", + "html_url": "https://github.com/charis3306/CVE-2025-24813", + "description": "CVE-2025-24813利用工具", + "stargazers_count": 11, + "forks_count": 0, + "created_at": "2025-03-16T11:59:59Z" + }, { "name": "cve-2025-24813_poc", "full_name": "FY036/cve-2025-24813_poc", @@ -44,15 +53,6 @@ "forks_count": 1, "created_at": "2025-03-14T07:41:40Z" }, - { - "name": "CVE-2025-24813", - "full_name": "charis3306/CVE-2025-24813", - "html_url": "https://github.com/charis3306/CVE-2025-24813", - "description": "CVE-2025-24813利用工具", - "stargazers_count": 10, - "forks_count": 0, - "created_at": "2025-03-16T11:59:59Z" - }, { "name": "Poc_for_CVE-2025-24813", "full_name": "Franconyu/Poc_for_CVE-2025-24813", diff --git a/exploits/2025/CVE-2025-24813.json b/exploits/2025/CVE-2025-24813.json index e72ed06..df7b0f8 100644 --- a/exploits/2025/CVE-2025-24813.json +++ b/exploits/2025/CVE-2025-24813.json @@ -4,8 +4,8 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 148, - "forks_count": 35, + "stargazers_count": 149, + "forks_count": 34, "created_at": "2025-03-14T07:36:58Z" }, { @@ -35,6 +35,15 @@ "forks_count": 2, "created_at": "2025-05-25T13:34:18Z" }, + { + "name": "CVE-2025-24813", + "full_name": "charis3306/CVE-2025-24813", + "html_url": "https://github.com/charis3306/CVE-2025-24813", + "description": "CVE-2025-24813利用工具", + "stargazers_count": 11, + "forks_count": 0, + "created_at": "2025-03-16T11:59:59Z" + }, { "name": "cve-2025-24813_poc", "full_name": "FY036/cve-2025-24813_poc", @@ -44,15 +53,6 @@ "forks_count": 1, "created_at": "2025-03-14T07:41:40Z" }, - { - "name": "CVE-2025-24813", - "full_name": "charis3306/CVE-2025-24813", - "html_url": "https://github.com/charis3306/CVE-2025-24813", - "description": "CVE-2025-24813利用工具", - "stargazers_count": 10, - "forks_count": 0, - "created_at": "2025-03-16T11:59:59Z" - }, { "name": "Poc_for_CVE-2025-24813", "full_name": "Franconyu/Poc_for_CVE-2025-24813", @@ -224,15 +224,6 @@ "forks_count": 0, "created_at": "2025-04-27T13:50:24Z" }, - { - "name": "CVE-2025-24813", - "full_name": "x1ongsec/CVE-2025-24813", - "html_url": "https://github.com/x1ongsec/CVE-2025-24813", - "description": "tomcat CVE-2025-24813 反序列化RCE环境", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-06-21T14:20:44Z" - }, { "name": "CVE-2025-24813", "full_name": "manjula-aw/CVE-2025-24813", @@ -251,6 +242,15 @@ "forks_count": 0, "created_at": "2025-07-07T07:17:31Z" }, + { + "name": "CVE-2025-24813", + "full_name": "x1ongsec/CVE-2025-24813", + "html_url": "https://github.com/x1ongsec/CVE-2025-24813", + "description": "tomcat CVE-2025-24813 反序列化RCE环境", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-06-21T14:20:44Z" + }, { "name": "CVE-2025-24813-checker", "full_name": "horsehacks/CVE-2025-24813-checker",