Update recent feed data

This commit is contained in:
Brendan McDevitt 2025-05-10 01:14:55 +00:00
parent 65f884b7d6
commit af87bb55dc
4 changed files with 12 additions and 12 deletions

View file

@ -1,13 +1,4 @@
[
{
"name": "CVE-2024-57523.",
"full_name": "HackWidMaddy/CVE-2024-57523.",
"html_url": "https://github.com/HackWidMaddy/CVE-2024-57523.",
"description": "CVE-2024-57523 - CSRF Vulnerability in Users.php - SourceCodester Packers and Movers Management System 1.0",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-01-15T18:56:30Z"
},
{
"name": "CVE-2024-57522",
"full_name": "HackWidMaddy/CVE-2024-57522",
@ -16,5 +7,14 @@
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-01-15T18:45:35Z"
},
{
"name": "CVE-2024-57523.",
"full_name": "HackWidMaddy/CVE-2024-57523.",
"html_url": "https://github.com/HackWidMaddy/CVE-2024-57523.",
"description": "CVE-2024-57523 - CSRF Vulnerability in Users.php - SourceCodester Packers and Movers Management System 1.0",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-01-15T18:56:30Z"
}
]

View file

@ -4,7 +4,7 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 113,
"stargazers_count": 116,
"forks_count": 31,
"created_at": "2025-03-14T07:36:58Z"
},

View file

@ -4,7 +4,7 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 113,
"stargazers_count": 116,
"forks_count": 31,
"created_at": "2025-03-14T07:36:58Z"
},

View file

@ -4,7 +4,7 @@
"full_name": "zhuowei/CVE-2025-27363-proof-of-concept",
"html_url": "https://github.com/zhuowei/CVE-2025-27363-proof-of-concept",
"description": null,
"stargazers_count": 10,
"stargazers_count": 16,
"forks_count": 2,
"created_at": "2025-03-23T23:30:37Z"
}