Update recent feed data
This commit is contained in:
parent
b55fc934f8
commit
ac027eaa21
3 changed files with 49 additions and 49 deletions
|
@ -1,13 +1,4 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-57523.",
|
||||
"full_name": "HackWidMaddy/CVE-2024-57523.",
|
||||
"html_url": "https://github.com/HackWidMaddy/CVE-2024-57523.",
|
||||
"description": "CVE-2024-57523 - CSRF Vulnerability in Users.php - SourceCodester Packers and Movers Management System 1.0",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-01-15T18:56:30Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-57522",
|
||||
"full_name": "HackWidMaddy/CVE-2024-57522",
|
||||
|
@ -16,5 +7,14 @@
|
|||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-01-15T18:45:35Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-57523.",
|
||||
"full_name": "HackWidMaddy/CVE-2024-57523.",
|
||||
"html_url": "https://github.com/HackWidMaddy/CVE-2024-57523.",
|
||||
"description": "CVE-2024-57523 - CSRF Vulnerability in Users.php - SourceCodester Packers and Movers Management System 1.0",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-01-15T18:56:30Z"
|
||||
}
|
||||
]
|
|
@ -4,7 +4,7 @@
|
|||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||
"stargazers_count": 110,
|
||||
"stargazers_count": 111,
|
||||
"forks_count": 30,
|
||||
"created_at": "2025-03-14T07:36:58Z"
|
||||
},
|
||||
|
@ -13,7 +13,7 @@
|
|||
"full_name": "iSee857/CVE-2025-24813-PoC",
|
||||
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
||||
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
||||
"stargazers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"forks_count": 25,
|
||||
"created_at": "2025-03-13T10:00:03Z"
|
||||
},
|
||||
|
@ -134,15 +134,6 @@
|
|||
"forks_count": 1,
|
||||
"created_at": "2025-03-17T22:39:38Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "gregk4sec/CVE-2025-24813",
|
||||
"html_url": "https://github.com/gregk4sec/CVE-2025-24813",
|
||||
"description": "Security Researcher",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-14T05:39:33Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "AlperenY-cs/CVE-2025-24813",
|
||||
|
@ -152,6 +143,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-28T09:44:28Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "gregk4sec/CVE-2025-24813",
|
||||
"html_url": "https://github.com/gregk4sec/CVE-2025-24813",
|
||||
"description": "Security Researcher",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-14T05:39:33Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||
|
@ -179,15 +179,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T17:38:02Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "manjula-aw/CVE-2025-24813",
|
||||
"html_url": "https://github.com/manjula-aw/CVE-2025-24813",
|
||||
"description": "This repository contains a shell script based POC on Apache Tomcat CVE-2025-24813. It allow you to easily test the vulnerability on any version of Apache Tomcat",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-30T09:39:45Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "hakankarabacak/CVE-2025-24813",
|
||||
|
@ -197,6 +188,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-04-27T13:50:24Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "manjula-aw/CVE-2025-24813",
|
||||
"html_url": "https://github.com/manjula-aw/CVE-2025-24813",
|
||||
"description": "This repository contains a shell script based POC on Apache Tomcat CVE-2025-24813. It allow you to easily test the vulnerability on any version of Apache Tomcat",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-30T09:39:45Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "GadaLuBau1337/CVE-2025-24813",
|
||||
|
@ -251,15 +251,6 @@
|
|||
"forks_count": 1,
|
||||
"created_at": "2025-04-06T19:36:48Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-noPoC",
|
||||
"full_name": "Heimd411/CVE-2025-24813-noPoC",
|
||||
"html_url": "https://github.com/Heimd411/CVE-2025-24813-noPoC",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-07T16:17:06Z"
|
||||
},
|
||||
{
|
||||
"name": "Spring-Boot-Tomcat-CVE-2025-24813",
|
||||
"full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
|
||||
|
@ -268,5 +259,14 @@
|
|||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-20T22:52:00Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-noPoC",
|
||||
"full_name": "Heimd411/CVE-2025-24813-noPoC",
|
||||
"html_url": "https://github.com/Heimd411/CVE-2025-24813-noPoC",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-07T16:17:06Z"
|
||||
}
|
||||
]
|
|
@ -4,7 +4,7 @@
|
|||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||
"stargazers_count": 110,
|
||||
"stargazers_count": 111,
|
||||
"forks_count": 30,
|
||||
"created_at": "2025-03-14T07:36:58Z"
|
||||
},
|
||||
|
@ -13,7 +13,7 @@
|
|||
"full_name": "iSee857/CVE-2025-24813-PoC",
|
||||
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
||||
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
||||
"stargazers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"forks_count": 25,
|
||||
"created_at": "2025-03-13T10:00:03Z"
|
||||
},
|
||||
|
@ -179,6 +179,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T17:38:02Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "hakankarabacak/CVE-2025-24813",
|
||||
"html_url": "https://github.com/hakankarabacak/CVE-2025-24813",
|
||||
"description": "Proof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-27T13:50:24Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "manjula-aw/CVE-2025-24813",
|
||||
|
@ -206,15 +215,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-04-08T14:52:37Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "hakankarabacak/CVE-2025-24813",
|
||||
"html_url": "https://github.com/hakankarabacak/CVE-2025-24813",
|
||||
"description": "Proof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-27T13:50:24Z"
|
||||
},
|
||||
{
|
||||
"name": "Tomcat-CVE-2025-24813",
|
||||
"full_name": "B1gN0Se/Tomcat-CVE-2025-24813",
|
||||
|
|
Loading…
Add table
Reference in a new issue