Update recent feed data

This commit is contained in:
Brendan McDevitt 2025-06-07 17:54:06 +00:00
parent 58ce4e6181
commit 7d1e9261f9
10 changed files with 206 additions and 128 deletions

View file

@ -4,7 +4,7 @@
"full_name": "hfiref0x/CVE-2015-1701",
"html_url": "https://github.com/hfiref0x/CVE-2015-1701",
"description": "Win32k LPE vulnerability used in APT attack",
"stargazers_count": 287,
"stargazers_count": 288,
"forks_count": 176,
"created_at": "2015-05-12T18:04:48Z"
},

View file

@ -4,8 +4,8 @@
"full_name": "duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC",
"html_url": "https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC",
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
"stargazers_count": 271,
"forks_count": 40,
"stargazers_count": 270,
"forks_count": 39,
"created_at": "2023-02-02T15:34:28Z"
},
{
@ -13,7 +13,7 @@
"full_name": "voidz0r/CVE-2022-44268",
"html_url": "https://github.com/voidz0r/CVE-2022-44268",
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
"stargazers_count": 215,
"stargazers_count": 216,
"forks_count": 25,
"created_at": "2023-02-05T18:42:27Z"
},
@ -152,15 +152,6 @@
"forks_count": 0,
"created_at": "2023-11-14T21:54:17Z"
},
{
"name": "cve-2022-44268",
"full_name": "Pog-Frog/cve-2022-44268",
"html_url": "https://github.com/Pog-Frog/cve-2022-44268",
"description": null,
"stargazers_count": 0,
"forks_count": 1,
"created_at": "2023-07-14T17:46:15Z"
},
{
"name": "CVE-2022-44268",
"full_name": "FlojBoj/CVE-2022-44268",
@ -170,6 +161,15 @@
"forks_count": 0,
"created_at": "2024-09-02T09:11:45Z"
},
{
"name": "cve-2022-44268",
"full_name": "Pog-Frog/cve-2022-44268",
"html_url": "https://github.com/Pog-Frog/cve-2022-44268",
"description": null,
"stargazers_count": 0,
"forks_count": 1,
"created_at": "2023-07-14T17:46:15Z"
},
{
"name": "CVE-2022-44268-pilgrimage",
"full_name": "katseyres2/CVE-2022-44268-pilgrimage",
@ -180,13 +180,13 @@
"created_at": "2025-05-02T21:31:39Z"
},
{
"name": "heroku-CVE-2022-44268-reproduction",
"full_name": "nfm/heroku-CVE-2022-44268-reproduction",
"html_url": "https://github.com/nfm/heroku-CVE-2022-44268-reproduction",
"description": null,
"name": "Automate_Exploit_CVE-2022-44268",
"full_name": "J0ey17/Automate_Exploit_CVE-2022-44268",
"html_url": "https://github.com/J0ey17/Automate_Exploit_CVE-2022-44268",
"description": "An exploit automation script that builds upon the work of Voidzone security.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2023-02-21T01:15:07Z"
"created_at": "2025-06-04T20:06:08Z"
},
{
"name": "IMAGE-MAGICK-CVE-2022-44268",
@ -206,6 +206,15 @@
"forks_count": 0,
"created_at": "2023-02-04T03:50:07Z"
},
{
"name": "heroku-CVE-2022-44268-reproduction",
"full_name": "nfm/heroku-CVE-2022-44268-reproduction",
"html_url": "https://github.com/nfm/heroku-CVE-2022-44268-reproduction",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2023-02-21T01:15:07Z"
},
{
"name": "CVE-2022-44268-fixed-PoC",
"full_name": "CygnusX-26/CVE-2022-44268-fixed-PoC",

View file

@ -0,0 +1,38 @@
[
{
"name": "CVE-2023-37779",
"full_name": "jyoti818680/CVE-2023-37779",
"html_url": "https://github.com/jyoti818680/CVE-2023-37779",
"description": null,
"stargazers_count": 0,
"forks_count": 1,
"created_at": "2023-07-28T13:07:45Z"
},
{
"name": "CVE-2023-37778",
"full_name": "jyoti818680/CVE-2023-37778",
"html_url": "https://github.com/jyoti818680/CVE-2023-37778",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2023-07-28T11:18:21Z"
},
{
"name": "CVE-2023-37771",
"full_name": "anky-123/CVE-2023-37771",
"html_url": "https://github.com/anky-123/CVE-2023-37771",
"description": "CVE",
"stargazers_count": 0,
"forks_count": 1,
"created_at": "2023-07-19T14:51:04Z"
},
{
"name": "CVE-2023-37772",
"full_name": "anky-123/CVE-2023-37772",
"html_url": "https://github.com/anky-123/CVE-2023-37772",
"description": null,
"stargazers_count": 0,
"forks_count": 1,
"created_at": "2023-07-27T18:48:10Z"
}
]

View file

@ -0,0 +1,20 @@
[
{
"name": "CVE-2023-38891",
"full_name": "jselliott/CVE-2023-38891",
"html_url": "https://github.com/jselliott/CVE-2023-38891",
"description": "Authenticated SQL Injection Vulnerability in VTiger Open Source CRM v7.5",
"stargazers_count": 1,
"forks_count": 1,
"created_at": "2023-09-12T22:58:41Z"
},
{
"name": "CVE-2023-38890",
"full_name": "akshadjoshi/CVE-2023-38890",
"html_url": "https://github.com/akshadjoshi/CVE-2023-38890",
"description": "poc",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2023-08-18T16:37:39Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2024-11042",
"full_name": "gothburz/CVE-2024-11042",
"html_url": "https://github.com/gothburz/CVE-2024-11042",
"description": "Proof-of-concept for In invoke-ai/invokeai version v5.0.2 Arbitrary File Deletion.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-21T16:55:49Z"
}
]

View file

@ -1,13 +1,4 @@
[
{
"name": "CVE-2024-55968",
"full_name": "null-event/CVE-2024-55968",
"html_url": "https://github.com/null-event/CVE-2024-55968",
"description": "POC for DTEX LPE (CVE-2024-55968)",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2024-12-17T21:08:11Z"
},
{
"name": "CVE-2024-55968",
"full_name": "Wi1DN00B/CVE-2024-55968",
@ -16,5 +7,14 @@
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2024-12-17T21:07:59Z"
},
{
"name": "CVE-2024-55968",
"full_name": "null-event/CVE-2024-55968",
"html_url": "https://github.com/null-event/CVE-2024-55968",
"description": "POC for DTEX LPE (CVE-2024-55968)",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2024-12-17T21:08:11Z"
}
]

View file

@ -4,7 +4,7 @@
"full_name": "UnionTech-Software/libtheora-CVE-2024-56431-PoC",
"html_url": "https://github.com/UnionTech-Software/libtheora-CVE-2024-56431-PoC",
"description": null,
"stargazers_count": 0,
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2024-12-25T03:58:50Z"
}

View file

@ -4,8 +4,8 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 116,
"forks_count": 31,
"stargazers_count": 134,
"forks_count": 33,
"created_at": "2025-03-14T07:36:58Z"
},
{
@ -13,7 +13,7 @@
"full_name": "iSee857/CVE-2025-24813-PoC",
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
"stargazers_count": 84,
"stargazers_count": 85,
"forks_count": 25,
"created_at": "2025-03-13T10:00:03Z"
},
@ -23,7 +23,7 @@
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
"description": null,
"stargazers_count": 30,
"forks_count": 6,
"forks_count": 7,
"created_at": "2025-04-05T18:57:08Z"
},
{
@ -53,6 +53,15 @@
"forks_count": 3,
"created_at": "2025-04-10T14:49:14Z"
},
{
"name": "Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"full_name": "mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"html_url": "https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"description": "Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)",
"stargazers_count": 7,
"forks_count": 2,
"created_at": "2025-05-25T13:34:18Z"
},
{
"name": "CVE-2025-24813-Exploit",
"full_name": "msadeghkarimi/CVE-2025-24813-Exploit",
@ -80,6 +89,15 @@
"forks_count": 0,
"created_at": "2025-04-05T09:07:13Z"
},
{
"name": "CVE-2025-24813-Scanner",
"full_name": "Mattb709/CVE-2025-24813-Scanner",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
"stargazers_count": 4,
"forks_count": 0,
"created_at": "2025-04-12T19:12:39Z"
},
{
"name": "CVE-2025-24813_POC",
"full_name": "N0c1or/CVE-2025-24813_POC",
@ -89,6 +107,15 @@
"forks_count": 0,
"created_at": "2025-03-14T03:11:40Z"
},
{
"name": "CVE-2025-24813",
"full_name": "AlperenY-cs/CVE-2025-24813",
"html_url": "https://github.com/AlperenY-cs/CVE-2025-24813",
"description": " Create lab for CVE-2025-24813",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-03-28T09:44:28Z"
},
{
"name": "CVE-2025-24813",
"full_name": "beyond-devsecops/CVE-2025-24813",
@ -121,19 +148,10 @@
"full_name": "Alaatk/CVE-2025-24813-POC",
"html_url": "https://github.com/Alaatk/CVE-2025-24813-POC",
"description": "CVE-2025-24813 Apache Tomcat RCE Proof of Concept (PoC)",
"stargazers_count": 2,
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2025-03-21T18:05:27Z"
},
{
"name": "CVE-2025-24813-Scanner",
"full_name": "Mattb709/CVE-2025-24813-Scanner",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-04-12T19:12:39Z"
},
{
"name": "CVE-2025-24813-apache-tomcat",
"full_name": "imbas007/CVE-2025-24813-apache-tomcat",
@ -144,13 +162,13 @@
"created_at": "2025-03-17T22:39:38Z"
},
{
"name": "CVE-2025-24813",
"full_name": "AlperenY-cs/CVE-2025-24813",
"html_url": "https://github.com/AlperenY-cs/CVE-2025-24813",
"description": " Create lab for CVE-2025-24813",
"stargazers_count": 1,
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-03-28T09:44:28Z"
"created_at": "2025-04-12T17:38:02Z"
},
{
"name": "CVE-2025-24813",
@ -179,24 +197,6 @@
"forks_count": 0,
"created_at": "2025-03-22T15:16:41Z"
},
{
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-04-12T17:38:02Z"
},
{
"name": "CVE-2025-24813",
"full_name": "Eduardo-hardvester/CVE-2025-24813",
"html_url": "https://github.com/Eduardo-hardvester/CVE-2025-24813",
"description": "Remote Code Execution (RCE) vulnerability in Apache Tomcat.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-05-10T15:58:12Z"
},
{
"name": "CVE-2025-24813",
"full_name": "fatkz/CVE-2025-24813",
@ -215,6 +215,15 @@
"forks_count": 0,
"created_at": "2025-03-30T09:39:45Z"
},
{
"name": "CVE-2025-24813",
"full_name": "Eduardo-hardvester/CVE-2025-24813",
"html_url": "https://github.com/Eduardo-hardvester/CVE-2025-24813",
"description": "Remote Code Execution (RCE) vulnerability in Apache Tomcat.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-05-10T15:58:12Z"
},
{
"name": "CVE-2025-24813",
"full_name": "hakankarabacak/CVE-2025-24813",
@ -251,15 +260,6 @@
"forks_count": 0,
"created_at": "2025-04-07T22:43:56Z"
},
{
"name": "CVE-2025-24813-POC",
"full_name": "f8l124/CVE-2025-24813-POC",
"html_url": "https://github.com/f8l124/CVE-2025-24813-POC",
"description": "A simple, easy-to-use POC for CVE-2025-42813 (Apache Tomcat versions below 9.0.99).",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-09T15:20:32Z"
},
{
"name": "CVE-2025-24813-POC",
"full_name": "La3B0z/CVE-2025-24813-POC",

View file

@ -4,8 +4,8 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 116,
"forks_count": 31,
"stargazers_count": 134,
"forks_count": 33,
"created_at": "2025-03-14T07:36:58Z"
},
{
@ -13,7 +13,7 @@
"full_name": "iSee857/CVE-2025-24813-PoC",
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
"stargazers_count": 84,
"stargazers_count": 85,
"forks_count": 25,
"created_at": "2025-03-13T10:00:03Z"
},
@ -23,7 +23,7 @@
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
"description": null,
"stargazers_count": 30,
"forks_count": 6,
"forks_count": 7,
"created_at": "2025-04-05T18:57:08Z"
},
{
@ -53,6 +53,15 @@
"forks_count": 3,
"created_at": "2025-04-10T14:49:14Z"
},
{
"name": "Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"full_name": "mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"html_url": "https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
"description": "Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)",
"stargazers_count": 7,
"forks_count": 2,
"created_at": "2025-05-25T13:34:18Z"
},
{
"name": "CVE-2025-24813-Exploit",
"full_name": "msadeghkarimi/CVE-2025-24813-Exploit",
@ -80,6 +89,15 @@
"forks_count": 0,
"created_at": "2025-04-05T09:07:13Z"
},
{
"name": "CVE-2025-24813-Scanner",
"full_name": "Mattb709/CVE-2025-24813-Scanner",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
"stargazers_count": 4,
"forks_count": 0,
"created_at": "2025-04-12T19:12:39Z"
},
{
"name": "CVE-2025-24813_POC",
"full_name": "N0c1or/CVE-2025-24813_POC",
@ -89,6 +107,15 @@
"forks_count": 0,
"created_at": "2025-03-14T03:11:40Z"
},
{
"name": "CVE-2025-24813",
"full_name": "AlperenY-cs/CVE-2025-24813",
"html_url": "https://github.com/AlperenY-cs/CVE-2025-24813",
"description": " Create lab for CVE-2025-24813",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-03-28T09:44:28Z"
},
{
"name": "CVE-2025-24813",
"full_name": "beyond-devsecops/CVE-2025-24813",
@ -112,19 +139,10 @@
"full_name": "Alaatk/CVE-2025-24813-POC",
"html_url": "https://github.com/Alaatk/CVE-2025-24813-POC",
"description": "CVE-2025-24813 Apache Tomcat RCE Proof of Concept (PoC)",
"stargazers_count": 2,
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2025-03-21T18:05:27Z"
},
{
"name": "CVE-2025-24813-Scanner",
"full_name": "Mattb709/CVE-2025-24813-Scanner",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-04-12T19:12:39Z"
},
{
"name": "CVE-2025-24813-Scanner",
"full_name": "issamjr/CVE-2025-24813-Scanner",
@ -143,6 +161,15 @@
"forks_count": 1,
"created_at": "2025-03-17T22:39:38Z"
},
{
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-04-12T17:38:02Z"
},
{
"name": "CVE-2025-24813",
"full_name": "gregk4sec/CVE-2025-24813",
@ -152,15 +179,6 @@
"forks_count": 0,
"created_at": "2025-03-14T05:39:33Z"
},
{
"name": "CVE-2025-24813",
"full_name": "AlperenY-cs/CVE-2025-24813",
"html_url": "https://github.com/AlperenY-cs/CVE-2025-24813",
"description": " Create lab for CVE-2025-24813",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-03-28T09:44:28Z"
},
{
"name": "CVE-2025-24813",
"full_name": "GadaLuBau1337/CVE-2025-24813",
@ -180,13 +198,13 @@
"created_at": "2025-03-22T15:16:41Z"
},
{
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
"stargazers_count": 1,
"name": "CVE-2025-24813",
"full_name": "fatkz/CVE-2025-24813",
"html_url": "https://github.com/fatkz/CVE-2025-24813",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-12T17:38:02Z"
"created_at": "2025-05-11T19:50:11Z"
},
{
"name": "CVE-2025-24813",
@ -199,12 +217,12 @@
},
{
"name": "CVE-2025-24813",
"full_name": "fatkz/CVE-2025-24813",
"html_url": "https://github.com/fatkz/CVE-2025-24813",
"description": null,
"full_name": "hakankarabacak/CVE-2025-24813",
"html_url": "https://github.com/hakankarabacak/CVE-2025-24813",
"description": "Proof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-05-11T19:50:11Z"
"created_at": "2025-04-27T13:50:24Z"
},
{
"name": "CVE-2025-24813",
@ -215,15 +233,6 @@
"forks_count": 0,
"created_at": "2025-03-30T09:39:45Z"
},
{
"name": "CVE-2025-24813",
"full_name": "hakankarabacak/CVE-2025-24813",
"html_url": "https://github.com/hakankarabacak/CVE-2025-24813",
"description": "Proof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-27T13:50:24Z"
},
{
"name": "CVE-2025-24813-checker",
"full_name": "horsehacks/CVE-2025-24813-checker",
@ -259,14 +268,5 @@
"stargazers_count": 0,
"forks_count": 1,
"created_at": "2025-04-06T19:36:48Z"
},
{
"name": "CVE-2025-24813-POC",
"full_name": "f8l124/CVE-2025-24813-POC",
"html_url": "https://github.com/f8l124/CVE-2025-24813-POC",
"description": "A simple, easy-to-use POC for CVE-2025-42813 (Apache Tomcat versions below 9.0.99).",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-09T15:20:32Z"
}
]

View file

@ -4,8 +4,8 @@
"full_name": "Alchemist3dot14/CVE-2025-2783",
"html_url": "https://github.com/Alchemist3dot14/CVE-2025-2783",
"description": "Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and logging. Safe for red team demos, detection engineering, and educational use.",
"stargazers_count": 10,
"forks_count": 1,
"stargazers_count": 17,
"forks_count": 2,
"created_at": "2025-04-06T03:49:01Z"
}
]