Update recent feed data

This commit is contained in:
Brendan McDevitt 2025-07-15 01:11:55 +00:00
parent b454296ca4
commit 87c3211029
5 changed files with 40 additions and 20 deletions

View file

@ -22,7 +22,7 @@
"full_name": "yuriisanin/CVE-2022-45771",
"html_url": "https://github.com/yuriisanin/CVE-2022-45771",
"description": "[PoC] Privilege escalation & code execution via LFI in PwnDoC ",
"stargazers_count": 6,
"stargazers_count": 7,
"forks_count": 0,
"created_at": "2023-02-11T15:26:14Z"
}

View file

@ -0,0 +1,20 @@
[
{
"name": "CVE-2024-31964",
"full_name": "d-Raco/CVE-2024-31964",
"html_url": "https://github.com/d-Raco/CVE-2024-31964",
"description": "CVE-2024-31964 PoC: Mitel 6900w Series SIP Phone - Temporary Authentication Bypass",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-07-06T15:00:05Z"
},
{
"name": "CVE-2024-31969",
"full_name": "kingfakee7/CVE-2024-31969",
"html_url": "https://github.com/kingfakee7/CVE-2024-31969",
"description": "CVE-2024-31969 adalah privilege escalation local pada sudo ketika menggunakan sudoedit.",
"stargazers_count": 0,
"forks_count": 1,
"created_at": "2025-07-10T06:50:41Z"
}
]

View file

@ -4,8 +4,8 @@
"full_name": "MuhammadWaseem29/CVE-2025-24799",
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799",
"description": null,
"stargazers_count": 24,
"forks_count": 8,
"stargazers_count": 25,
"forks_count": 9,
"created_at": "2025-04-03T16:55:11Z"
},
{

View file

@ -4,7 +4,7 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 146,
"stargazers_count": 148,
"forks_count": 35,
"created_at": "2025-03-14T07:36:58Z"
},
@ -22,8 +22,8 @@
"full_name": "MuhammadWaseem29/CVE-2025-24813",
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
"description": null,
"stargazers_count": 32,
"forks_count": 8,
"stargazers_count": 33,
"forks_count": 9,
"created_at": "2025-04-05T18:57:08Z"
},
{
@ -58,7 +58,7 @@
"full_name": "Franconyu/Poc_for_CVE-2025-24813",
"html_url": "https://github.com/Franconyu/Poc_for_CVE-2025-24813",
"description": "CVE-2025-24813 poc",
"stargazers_count": 7,
"stargazers_count": 8,
"forks_count": 4,
"created_at": "2025-04-10T14:49:14Z"
},

View file

@ -4,7 +4,7 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 146,
"stargazers_count": 148,
"forks_count": 35,
"created_at": "2025-03-14T07:36:58Z"
},
@ -22,8 +22,8 @@
"full_name": "MuhammadWaseem29/CVE-2025-24813",
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
"description": null,
"stargazers_count": 32,
"forks_count": 8,
"stargazers_count": 33,
"forks_count": 9,
"created_at": "2025-04-05T18:57:08Z"
},
{
@ -58,7 +58,7 @@
"full_name": "Franconyu/Poc_for_CVE-2025-24813",
"html_url": "https://github.com/Franconyu/Poc_for_CVE-2025-24813",
"description": "CVE-2025-24813 poc",
"stargazers_count": 7,
"stargazers_count": 8,
"forks_count": 4,
"created_at": "2025-04-10T14:49:14Z"
},
@ -125,15 +125,6 @@
"forks_count": 0,
"created_at": "2025-04-12T17:38:02Z"
},
{
"name": "CVE-2025-24813",
"full_name": "beyond-devsecops/CVE-2025-24813",
"html_url": "https://github.com/beyond-devsecops/CVE-2025-24813",
"description": "Session Exploit",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-03-24T17:47:10Z"
},
{
"name": "CVE-2025-24813",
"full_name": "AlperenY-cs/CVE-2025-24813",
@ -143,6 +134,15 @@
"forks_count": 0,
"created_at": "2025-03-28T09:44:28Z"
},
{
"name": "CVE-2025-24813",
"full_name": "beyond-devsecops/CVE-2025-24813",
"html_url": "https://github.com/beyond-devsecops/CVE-2025-24813",
"description": "Session Exploit",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-03-24T17:47:10Z"
},
{
"name": "CVE-2025-24813-POC",
"full_name": "Alaatk/CVE-2025-24813-POC",