Update recent feed data
This commit is contained in:
parent
e0a795e50d
commit
04cf9ed899
3 changed files with 87 additions and 76 deletions
|
@ -4,7 +4,7 @@
|
|||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||
"stargazers_count": 108,
|
||||
"stargazers_count": 110,
|
||||
"forks_count": 30,
|
||||
"created_at": "2025-03-14T07:36:58Z"
|
||||
},
|
||||
|
@ -13,7 +13,7 @@
|
|||
"full_name": "iSee857/CVE-2025-24813-PoC",
|
||||
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
||||
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
||||
"stargazers_count": 79,
|
||||
"stargazers_count": 82,
|
||||
"forks_count": 25,
|
||||
"created_at": "2025-03-13T10:00:03Z"
|
||||
},
|
||||
|
@ -107,6 +107,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-17T03:58:34Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-vulhub",
|
||||
"full_name": "Erosion2020/CVE-2025-24813-vulhub",
|
||||
"html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub",
|
||||
"description": "CVE-2025-24813的vulhub环境的POC脚本",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-18T11:03:33Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-apache-tomcat",
|
||||
"full_name": "imbas007/CVE-2025-24813-apache-tomcat",
|
||||
|
@ -134,15 +143,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-28T09:44:28Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-vulhub",
|
||||
"full_name": "Erosion2020/CVE-2025-24813-vulhub",
|
||||
"html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub",
|
||||
"description": "CVE-2025-24813的vulhub环境的POC脚本",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-18T11:03:33Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-POC",
|
||||
"full_name": "Alaatk/CVE-2025-24813-POC",
|
||||
|
@ -152,6 +152,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-21T18:05:27Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T19:12:39Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-PoC",
|
||||
"full_name": "tonyarris/CVE-2025-24813-PoC",
|
||||
|
@ -161,6 +170,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-22T15:16:41Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T17:38:02Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "manjula-aw/CVE-2025-24813",
|
||||
|
@ -179,15 +197,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-04-08T14:52:37Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-checker",
|
||||
"full_name": "horsehacks/CVE-2025-24813-checker",
|
||||
"html_url": "https://github.com/horsehacks/CVE-2025-24813-checker",
|
||||
"description": "Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-07T22:43:56Z"
|
||||
},
|
||||
{
|
||||
"name": "Tomcat-CVE-2025-24813",
|
||||
"full_name": "B1gN0Se/Tomcat-CVE-2025-24813",
|
||||
|
@ -197,6 +206,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-31T19:01:28Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-checker",
|
||||
"full_name": "horsehacks/CVE-2025-24813-checker",
|
||||
"html_url": "https://github.com/horsehacks/CVE-2025-24813-checker",
|
||||
"description": "Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-07T22:43:56Z"
|
||||
},
|
||||
{
|
||||
"name": "lab-cve-2025-24813",
|
||||
"full_name": "ps-interactive/lab-cve-2025-24813",
|
||||
|
@ -215,15 +233,6 @@
|
|||
"forks_count": 1,
|
||||
"created_at": "2025-04-06T19:36:48Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T19:12:39Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-POC",
|
||||
"full_name": "f8l124/CVE-2025-24813-POC",
|
||||
|
@ -233,15 +242,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-04-09T15:20:32Z"
|
||||
},
|
||||
{
|
||||
"name": "Spring-Boot-Tomcat-CVE-2025-24813",
|
||||
"full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
|
||||
"html_url": "https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
|
||||
"description": "POC for CVE-2025-24813 using Spring-Boot",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-20T22:52:00Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-noPoC",
|
||||
"full_name": "Heimd411/CVE-2025-24813-noPoC",
|
||||
|
@ -251,6 +251,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-04-07T16:17:06Z"
|
||||
},
|
||||
{
|
||||
"name": "Spring-Boot-Tomcat-CVE-2025-24813",
|
||||
"full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
|
||||
"html_url": "https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
|
||||
"description": "POC for CVE-2025-24813 using Spring-Boot",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-20T22:52:00Z"
|
||||
},
|
||||
{
|
||||
"name": "Apache-Tomcat-Vulnerability-POC-CVE-2025-24813",
|
||||
"full_name": "michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813",
|
||||
|
@ -259,14 +268,5 @@
|
|||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-19T14:32:01Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T17:38:02Z"
|
||||
}
|
||||
]
|
|
@ -4,7 +4,7 @@
|
|||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||
"stargazers_count": 108,
|
||||
"stargazers_count": 110,
|
||||
"forks_count": 30,
|
||||
"created_at": "2025-03-14T07:36:58Z"
|
||||
},
|
||||
|
@ -13,7 +13,7 @@
|
|||
"full_name": "iSee857/CVE-2025-24813-PoC",
|
||||
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
||||
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
||||
"stargazers_count": 79,
|
||||
"stargazers_count": 82,
|
||||
"forks_count": 25,
|
||||
"created_at": "2025-03-13T10:00:03Z"
|
||||
},
|
||||
|
@ -98,6 +98,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-24T17:47:10Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-vulhub",
|
||||
"full_name": "Erosion2020/CVE-2025-24813-vulhub",
|
||||
"html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub",
|
||||
"description": "CVE-2025-24813的vulhub环境的POC脚本",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-18T11:03:33Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "issamjr/CVE-2025-24813-Scanner",
|
||||
|
@ -134,15 +143,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-28T09:44:28Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-vulhub",
|
||||
"full_name": "Erosion2020/CVE-2025-24813-vulhub",
|
||||
"html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub",
|
||||
"description": "CVE-2025-24813的vulhub环境的POC脚本",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-18T11:03:33Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-POC",
|
||||
"full_name": "Alaatk/CVE-2025-24813-POC",
|
||||
|
@ -152,6 +152,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-21T18:05:27Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T19:12:39Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-PoC",
|
||||
"full_name": "tonyarris/CVE-2025-24813-PoC",
|
||||
|
@ -161,6 +170,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-22T15:16:41Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T17:38:02Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "manjula-aw/CVE-2025-24813",
|
||||
|
@ -206,15 +224,6 @@
|
|||
"forks_count": 1,
|
||||
"created_at": "2025-04-06T19:36:48Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T19:12:39Z"
|
||||
},
|
||||
{
|
||||
"name": "lab-cve-2025-24813",
|
||||
"full_name": "ps-interactive/lab-cve-2025-24813",
|
||||
|
@ -259,14 +268,5 @@
|
|||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-19T14:32:01Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T17:38:02Z"
|
||||
}
|
||||
]
|
11
exploits/2025/CVE-2025-2496.json
Normal file
11
exploits/2025/CVE-2025-2496.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2025-24963",
|
||||
"full_name": "0xdeviner/CVE-2025-24963",
|
||||
"html_url": "https://github.com/0xdeviner/CVE-2025-24963",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-23T08:01:49Z"
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue