Update recent feed data
This commit is contained in:
parent
b454296ca4
commit
87c3211029
5 changed files with 40 additions and 20 deletions
|
@ -22,7 +22,7 @@
|
|||
"full_name": "yuriisanin/CVE-2022-45771",
|
||||
"html_url": "https://github.com/yuriisanin/CVE-2022-45771",
|
||||
"description": "[PoC] Privilege escalation & code execution via LFI in PwnDoC ",
|
||||
"stargazers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-02-11T15:26:14Z"
|
||||
}
|
||||
|
|
20
exploits/2024/CVE-2024-3196.json
Normal file
20
exploits/2024/CVE-2024-3196.json
Normal file
|
@ -0,0 +1,20 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-31964",
|
||||
"full_name": "d-Raco/CVE-2024-31964",
|
||||
"html_url": "https://github.com/d-Raco/CVE-2024-31964",
|
||||
"description": "CVE-2024-31964 PoC: Mitel 6900w Series SIP Phone - Temporary Authentication Bypass",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-07-06T15:00:05Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-31969",
|
||||
"full_name": "kingfakee7/CVE-2024-31969",
|
||||
"html_url": "https://github.com/kingfakee7/CVE-2024-31969",
|
||||
"description": "CVE-2024-31969 adalah privilege escalation local pada sudo ketika menggunakan sudoedit.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-07-10T06:50:41Z"
|
||||
}
|
||||
]
|
|
@ -4,8 +4,8 @@
|
|||
"full_name": "MuhammadWaseem29/CVE-2025-24799",
|
||||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799",
|
||||
"description": null,
|
||||
"stargazers_count": 24,
|
||||
"forks_count": 8,
|
||||
"stargazers_count": 25,
|
||||
"forks_count": 9,
|
||||
"created_at": "2025-04-03T16:55:11Z"
|
||||
},
|
||||
{
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||
"stargazers_count": 146,
|
||||
"stargazers_count": 148,
|
||||
"forks_count": 35,
|
||||
"created_at": "2025-03-14T07:36:58Z"
|
||||
},
|
||||
|
@ -22,8 +22,8 @@
|
|||
"full_name": "MuhammadWaseem29/CVE-2025-24813",
|
||||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
|
||||
"description": null,
|
||||
"stargazers_count": 32,
|
||||
"forks_count": 8,
|
||||
"stargazers_count": 33,
|
||||
"forks_count": 9,
|
||||
"created_at": "2025-04-05T18:57:08Z"
|
||||
},
|
||||
{
|
||||
|
@ -58,7 +58,7 @@
|
|||
"full_name": "Franconyu/Poc_for_CVE-2025-24813",
|
||||
"html_url": "https://github.com/Franconyu/Poc_for_CVE-2025-24813",
|
||||
"description": "CVE-2025-24813 poc",
|
||||
"stargazers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"forks_count": 4,
|
||||
"created_at": "2025-04-10T14:49:14Z"
|
||||
},
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||
"stargazers_count": 146,
|
||||
"stargazers_count": 148,
|
||||
"forks_count": 35,
|
||||
"created_at": "2025-03-14T07:36:58Z"
|
||||
},
|
||||
|
@ -22,8 +22,8 @@
|
|||
"full_name": "MuhammadWaseem29/CVE-2025-24813",
|
||||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
|
||||
"description": null,
|
||||
"stargazers_count": 32,
|
||||
"forks_count": 8,
|
||||
"stargazers_count": 33,
|
||||
"forks_count": 9,
|
||||
"created_at": "2025-04-05T18:57:08Z"
|
||||
},
|
||||
{
|
||||
|
@ -58,7 +58,7 @@
|
|||
"full_name": "Franconyu/Poc_for_CVE-2025-24813",
|
||||
"html_url": "https://github.com/Franconyu/Poc_for_CVE-2025-24813",
|
||||
"description": "CVE-2025-24813 poc",
|
||||
"stargazers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"forks_count": 4,
|
||||
"created_at": "2025-04-10T14:49:14Z"
|
||||
},
|
||||
|
@ -125,15 +125,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T17:38:02Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "beyond-devsecops/CVE-2025-24813",
|
||||
"html_url": "https://github.com/beyond-devsecops/CVE-2025-24813",
|
||||
"description": "Session Exploit",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-24T17:47:10Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "AlperenY-cs/CVE-2025-24813",
|
||||
|
@ -143,6 +134,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-28T09:44:28Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "beyond-devsecops/CVE-2025-24813",
|
||||
"html_url": "https://github.com/beyond-devsecops/CVE-2025-24813",
|
||||
"description": "Session Exploit",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-24T17:47:10Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-POC",
|
||||
"full_name": "Alaatk/CVE-2025-24813-POC",
|
||||
|
|
Loading…
Add table
Reference in a new issue