Update recent feed data

This commit is contained in:
Brendan McDevitt 2025-05-06 01:14:50 +00:00
parent 5df9ce4e76
commit cfc9e0de19
5 changed files with 48 additions and 39 deletions

View file

@ -1,13 +1,4 @@
[
{
"name": "CVE-2024-57522",
"full_name": "HackWidMaddy/CVE-2024-57522",
"html_url": "https://github.com/HackWidMaddy/CVE-2024-57522",
"description": "CVE-2024-57522 - Stored XSS Vulnerability in Users.php - SourceCodester Packers and Movers Management System 1.0",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-01-15T18:45:35Z"
},
{
"name": "CVE-2024-57523.",
"full_name": "HackWidMaddy/CVE-2024-57523.",
@ -16,5 +7,14 @@
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-01-15T18:56:30Z"
},
{
"name": "CVE-2024-57522",
"full_name": "HackWidMaddy/CVE-2024-57522",
"html_url": "https://github.com/HackWidMaddy/CVE-2024-57522",
"description": "CVE-2024-57522 - Stored XSS Vulnerability in Users.php - SourceCodester Packers and Movers Management System 1.0",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-01-15T18:45:35Z"
}
]

View file

@ -7,5 +7,14 @@
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-19T01:59:30Z"
},
{
"name": "CVE-2025-24801",
"full_name": "fatkz/CVE-2025-24801",
"html_url": "https://github.com/fatkz/CVE-2025-24801",
"description": "CVE-2025-24801 Exploit ",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-05-05T23:22:18Z"
}
]

View file

@ -4,7 +4,7 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 111,
"stargazers_count": 112,
"forks_count": 31,
"created_at": "2025-03-14T07:36:58Z"
},
@ -152,6 +152,15 @@
"forks_count": 0,
"created_at": "2025-03-14T05:39:33Z"
},
{
"name": "CVE-2025-24813",
"full_name": "GadaLuBau1337/CVE-2025-24813",
"html_url": "https://github.com/GadaLuBau1337/CVE-2025-24813",
"description": null,
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-04-08T14:52:37Z"
},
{
"name": "CVE-2025-24813-Scanner",
"full_name": "Mattb709/CVE-2025-24813-Scanner",
@ -197,15 +206,6 @@
"forks_count": 0,
"created_at": "2025-04-27T13:50:24Z"
},
{
"name": "CVE-2025-24813",
"full_name": "GadaLuBau1337/CVE-2025-24813",
"html_url": "https://github.com/GadaLuBau1337/CVE-2025-24813",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-08T14:52:37Z"
},
{
"name": "lab-cve-2025-24813",
"full_name": "ps-interactive/lab-cve-2025-24813",
@ -215,15 +215,6 @@
"forks_count": 0,
"created_at": "2025-03-19T19:55:02Z"
},
{
"name": "CVE-2025-24813-checker",
"full_name": "horsehacks/CVE-2025-24813-checker",
"html_url": "https://github.com/horsehacks/CVE-2025-24813-checker",
"description": "Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-07T22:43:56Z"
},
{
"name": "Tomcat-CVE-2025-24813",
"full_name": "B1gN0Se/Tomcat-CVE-2025-24813",
@ -233,6 +224,15 @@
"forks_count": 0,
"created_at": "2025-03-31T19:01:28Z"
},
{
"name": "CVE-2025-24813-checker",
"full_name": "horsehacks/CVE-2025-24813-checker",
"html_url": "https://github.com/horsehacks/CVE-2025-24813-checker",
"description": "Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-07T22:43:56Z"
},
{
"name": "CVE-2025-24813-POC",
"full_name": "f8l124/CVE-2025-24813-POC",

View file

@ -4,7 +4,7 @@
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 111,
"stargazers_count": 112,
"forks_count": 31,
"created_at": "2025-03-14T07:36:58Z"
},
@ -152,6 +152,15 @@
"forks_count": 0,
"created_at": "2025-03-28T09:44:28Z"
},
{
"name": "CVE-2025-24813",
"full_name": "GadaLuBau1337/CVE-2025-24813",
"html_url": "https://github.com/GadaLuBau1337/CVE-2025-24813",
"description": null,
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-04-08T14:52:37Z"
},
{
"name": "CVE-2025-24813-Scanner",
"full_name": "Mattb709/CVE-2025-24813-Scanner",
@ -206,15 +215,6 @@
"forks_count": 0,
"created_at": "2025-04-07T22:43:56Z"
},
{
"name": "CVE-2025-24813",
"full_name": "GadaLuBau1337/CVE-2025-24813",
"html_url": "https://github.com/GadaLuBau1337/CVE-2025-24813",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-04-08T14:52:37Z"
},
{
"name": "Tomcat-CVE-2025-24813",
"full_name": "B1gN0Se/Tomcat-CVE-2025-24813",

View file

@ -4,7 +4,7 @@
"full_name": "zhuowei/CVE-2025-27363-proof-of-concept",
"html_url": "https://github.com/zhuowei/CVE-2025-27363-proof-of-concept",
"description": null,
"stargazers_count": 6,
"stargazers_count": 8,
"forks_count": 2,
"created_at": "2025-03-23T23:30:37Z"
}