Update recent feed data

This commit is contained in:
Brendan McDevitt 2025-07-09 01:11:55 +00:00
parent 8c11bf265e
commit 5c171fb9a9
3 changed files with 94 additions and 103 deletions

View file

@ -5,7 +5,7 @@
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799",
"description": null,
"stargazers_count": 24,
"forks_count": 7,
"forks_count": 8,
"created_at": "2025-04-03T16:55:11Z"
},
{
@ -13,7 +13,7 @@
"full_name": "MatheuZSecurity/Exploit-CVE-2025-24799",
"html_url": "https://github.com/MatheuZSecurity/Exploit-CVE-2025-24799",
"description": "CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection",
"stargazers_count": 21,
"stargazers_count": 22,
"forks_count": 15,
"created_at": "2025-04-15T04:57:39Z"
},
@ -22,7 +22,7 @@
"full_name": "Alainx277/CVE-2025-24797",
"html_url": "https://github.com/Alainx277/CVE-2025-24797",
"description": "Meshtastic buffer overflow vulnerability - CVE-2025-24797",
"stargazers_count": 1,
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-04-16T19:04:44Z"
},
@ -34,14 +34,5 @@
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-05-22T20:49:43Z"
},
{
"name": "CVE-2025-24799-PoC",
"full_name": "realcodeb0ss/CVE-2025-24799-PoC",
"html_url": "https://github.com/realcodeb0ss/CVE-2025-24799-PoC",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-31T15:48:12Z"
}
]

View file

@ -4,7 +4,7 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 142,
"stargazers_count": 146,
"forks_count": 35,
"created_at": "2025-03-14T07:36:58Z"
},
@ -14,7 +14,7 @@
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
"stargazers_count": 86,
"forks_count": 25,
"forks_count": 26,
"created_at": "2025-03-13T10:00:03Z"
},
{
@ -26,6 +26,15 @@
"forks_count": 8,
"created_at": "2025-04-05T18:57:08Z"
},
{
"name": "Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"full_name": "mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"html_url": "https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"description": "Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)",
"stargazers_count": 12,
"forks_count": 2,
"created_at": "2025-05-25T13:34:18Z"
},
{
"name": "cve-2025-24813_poc",
"full_name": "FY036/cve-2025-24813_poc",
@ -44,15 +53,6 @@
"forks_count": 0,
"created_at": "2025-03-16T11:59:59Z"
},
{
"name": "Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"full_name": "mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"html_url": "https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"description": "Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)",
"stargazers_count": 8,
"forks_count": 2,
"created_at": "2025-05-25T13:34:18Z"
},
{
"name": "Poc_for_CVE-2025-24813",
"full_name": "Franconyu/Poc_for_CVE-2025-24813",
@ -117,13 +117,13 @@
"created_at": "2025-03-14T03:11:40Z"
},
{
"name": "CVE-2025-24813",
"full_name": "beyond-devsecops/CVE-2025-24813",
"html_url": "https://github.com/beyond-devsecops/CVE-2025-24813",
"description": "Session Exploit",
"stargazers_count": 2,
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2025-03-24T17:47:10Z"
"created_at": "2025-04-12T17:38:02Z"
},
{
"name": "CVE-2025-24813",
@ -134,6 +134,15 @@
"forks_count": 0,
"created_at": "2025-03-28T09:44:28Z"
},
{
"name": "CVE-2025-24813",
"full_name": "beyond-devsecops/CVE-2025-24813",
"html_url": "https://github.com/beyond-devsecops/CVE-2025-24813",
"description": "Session Exploit",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-03-24T17:47:10Z"
},
{
"name": "CVE-2025-24813-Scanner",
"full_name": "issamjr/CVE-2025-24813-Scanner",
@ -161,15 +170,6 @@
"forks_count": 1,
"created_at": "2025-03-17T22:39:38Z"
},
{
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-04-12T17:38:02Z"
},
{
"name": "CVE-2025-24813",
"full_name": "gregk4sec/CVE-2025-24813",
@ -206,15 +206,6 @@
"forks_count": 0,
"created_at": "2025-05-11T19:50:11Z"
},
{
"name": "CVE-2025-24813",
"full_name": "x1ongsec/CVE-2025-24813",
"html_url": "https://github.com/x1ongsec/CVE-2025-24813",
"description": "tomcat CVE-2025-24813 反序列化RCE环境",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-06-21T14:20:44Z"
},
{
"name": "CVE-2025-24813",
"full_name": "manjula-aw/CVE-2025-24813",
@ -224,6 +215,15 @@
"forks_count": 0,
"created_at": "2025-03-30T09:39:45Z"
},
{
"name": "CVE-2025-24813",
"full_name": "GongWook/CVE-2025-24813",
"html_url": "https://github.com/GongWook/CVE-2025-24813",
"description": "POC",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-07-07T07:17:31Z"
},
{
"name": "CVE-2025-24813",
"full_name": "Eduardo-hardvester/CVE-2025-24813",
@ -233,6 +233,15 @@
"forks_count": 0,
"created_at": "2025-05-10T15:58:12Z"
},
{
"name": "CVE-2025-24813",
"full_name": "x1ongsec/CVE-2025-24813",
"html_url": "https://github.com/x1ongsec/CVE-2025-24813",
"description": "tomcat CVE-2025-24813 反序列化RCE环境",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-06-21T14:20:44Z"
},
{
"name": "CVE-2025-24813",
"full_name": "hakankarabacak/CVE-2025-24813",
@ -242,6 +251,15 @@
"forks_count": 0,
"created_at": "2025-04-27T13:50:24Z"
},
{
"name": "lab-cve-2025-24813",
"full_name": "ps-interactive/lab-cve-2025-24813",
"html_url": "https://github.com/ps-interactive/lab-cve-2025-24813",
"description": "Resources for teh Apache Tomcat CVE lab",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-19T19:55:02Z"
},
{
"name": "Tomcat-CVE-2025-24813",
"full_name": "B1gN0Se/Tomcat-CVE-2025-24813",
@ -250,23 +268,5 @@
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-31T19:01:28Z"
},
{
"name": "CVE-2025-24813-checker",
"full_name": "horsehacks/CVE-2025-24813-checker",
"html_url": "https://github.com/horsehacks/CVE-2025-24813-checker",
"description": "Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-07T22:43:56Z"
},
{
"name": "CVE-2025-24813-POC",
"full_name": "f8l124/CVE-2025-24813-POC",
"html_url": "https://github.com/f8l124/CVE-2025-24813-POC",
"description": "A simple, easy-to-use POC for CVE-2025-42813 (Apache Tomcat versions below 9.0.99).",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-09T15:20:32Z"
}
]

View file

@ -4,7 +4,7 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 142,
"stargazers_count": 146,
"forks_count": 35,
"created_at": "2025-03-14T07:36:58Z"
},
@ -14,7 +14,7 @@
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
"stargazers_count": 86,
"forks_count": 25,
"forks_count": 26,
"created_at": "2025-03-13T10:00:03Z"
},
{
@ -26,6 +26,15 @@
"forks_count": 8,
"created_at": "2025-04-05T18:57:08Z"
},
{
"name": "Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"full_name": "mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"html_url": "https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"description": "Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)",
"stargazers_count": 12,
"forks_count": 2,
"created_at": "2025-05-25T13:34:18Z"
},
{
"name": "cve-2025-24813_poc",
"full_name": "FY036/cve-2025-24813_poc",
@ -44,15 +53,6 @@
"forks_count": 0,
"created_at": "2025-03-16T11:59:59Z"
},
{
"name": "Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"full_name": "mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"html_url": "https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"description": "Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)",
"stargazers_count": 8,
"forks_count": 2,
"created_at": "2025-05-25T13:34:18Z"
},
{
"name": "Poc_for_CVE-2025-24813",
"full_name": "Franconyu/Poc_for_CVE-2025-24813",
@ -116,6 +116,15 @@
"forks_count": 0,
"created_at": "2025-03-14T03:11:40Z"
},
{
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2025-04-12T17:38:02Z"
},
{
"name": "CVE-2025-24813",
"full_name": "beyond-devsecops/CVE-2025-24813",
@ -161,15 +170,6 @@
"forks_count": 1,
"created_at": "2025-03-17T22:39:38Z"
},
{
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-04-12T17:38:02Z"
},
{
"name": "CVE-2025-24813",
"full_name": "gregk4sec/CVE-2025-24813",
@ -206,6 +206,15 @@
"forks_count": 0,
"created_at": "2025-05-11T19:50:11Z"
},
{
"name": "CVE-2025-24813",
"full_name": "Eduardo-hardvester/CVE-2025-24813",
"html_url": "https://github.com/Eduardo-hardvester/CVE-2025-24813",
"description": "Remote Code Execution (RCE) vulnerability in Apache Tomcat.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-05-10T15:58:12Z"
},
{
"name": "CVE-2025-24813",
"full_name": "hakankarabacak/CVE-2025-24813",
@ -224,15 +233,6 @@
"forks_count": 0,
"created_at": "2025-06-21T14:20:44Z"
},
{
"name": "CVE-2025-24813",
"full_name": "Eduardo-hardvester/CVE-2025-24813",
"html_url": "https://github.com/Eduardo-hardvester/CVE-2025-24813",
"description": "Remote Code Execution (RCE) vulnerability in Apache Tomcat.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-05-10T15:58:12Z"
},
{
"name": "CVE-2025-24813",
"full_name": "manjula-aw/CVE-2025-24813",
@ -242,6 +242,15 @@
"forks_count": 0,
"created_at": "2025-03-30T09:39:45Z"
},
{
"name": "CVE-2025-24813",
"full_name": "GongWook/CVE-2025-24813",
"html_url": "https://github.com/GongWook/CVE-2025-24813",
"description": "POC",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-07-07T07:17:31Z"
},
{
"name": "CVE-2025-24813-checker",
"full_name": "horsehacks/CVE-2025-24813-checker",
@ -259,14 +268,5 @@
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-31T19:01:28Z"
},
{
"name": "CVE-2025-24813-POC",
"full_name": "La3B0z/CVE-2025-24813-POC",
"html_url": "https://github.com/La3B0z/CVE-2025-24813-POC",
"description": " CVE-2025-24813-POC JSP Web Shell Uploader",
"stargazers_count": 0,
"forks_count": 1,
"created_at": "2025-04-06T19:36:48Z"
}
]