From 04cf9ed899288e0945524c615389cbfe0b8dbbe7 Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Sat, 26 Apr 2025 01:15:10 +0000 Subject: [PATCH] Update recent feed data --- exploits/2025/CVE-2025-2481.json | 94 +++++++++++++++---------------- exploits/2025/CVE-2025-24813.json | 58 +++++++++---------- exploits/2025/CVE-2025-2496.json | 11 ++++ 3 files changed, 87 insertions(+), 76 deletions(-) create mode 100644 exploits/2025/CVE-2025-2496.json diff --git a/exploits/2025/CVE-2025-2481.json b/exploits/2025/CVE-2025-2481.json index ce651cf..00b331a 100644 --- a/exploits/2025/CVE-2025-2481.json +++ b/exploits/2025/CVE-2025-2481.json @@ -4,7 +4,7 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 108, + "stargazers_count": 110, "forks_count": 30, "created_at": "2025-03-14T07:36:58Z" }, @@ -13,7 +13,7 @@ "full_name": "iSee857/CVE-2025-24813-PoC", "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", - "stargazers_count": 79, + "stargazers_count": 82, "forks_count": 25, "created_at": "2025-03-13T10:00:03Z" }, @@ -107,6 +107,15 @@ "forks_count": 0, "created_at": "2025-03-17T03:58:34Z" }, + { + "name": "CVE-2025-24813-vulhub", + "full_name": "Erosion2020/CVE-2025-24813-vulhub", + "html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub", + "description": "CVE-2025-24813的vulhub环境的POC脚本", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-04-18T11:03:33Z" + }, { "name": "CVE-2025-24813-apache-tomcat", "full_name": "imbas007/CVE-2025-24813-apache-tomcat", @@ -134,15 +143,6 @@ "forks_count": 0, "created_at": "2025-03-28T09:44:28Z" }, - { - "name": "CVE-2025-24813-vulhub", - "full_name": "Erosion2020/CVE-2025-24813-vulhub", - "html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub", - "description": "CVE-2025-24813的vulhub环境的POC脚本", - "stargazers_count": 1, - "forks_count": 0, - "created_at": "2025-04-18T11:03:33Z" - }, { "name": "CVE-2025-24813-POC", "full_name": "Alaatk/CVE-2025-24813-POC", @@ -152,6 +152,15 @@ "forks_count": 0, "created_at": "2025-03-21T18:05:27Z" }, + { + "name": "CVE-2025-24813-Scanner", + "full_name": "Mattb709/CVE-2025-24813-Scanner", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", + "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-04-12T19:12:39Z" + }, { "name": "CVE-2025-24813-PoC", "full_name": "tonyarris/CVE-2025-24813-PoC", @@ -161,6 +170,15 @@ "forks_count": 0, "created_at": "2025-03-22T15:16:41Z" }, + { + "name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-04-12T17:38:02Z" + }, { "name": "CVE-2025-24813", "full_name": "manjula-aw/CVE-2025-24813", @@ -179,15 +197,6 @@ "forks_count": 0, "created_at": "2025-04-08T14:52:37Z" }, - { - "name": "CVE-2025-24813-checker", - "full_name": "horsehacks/CVE-2025-24813-checker", - "html_url": "https://github.com/horsehacks/CVE-2025-24813-checker", - "description": "Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-07T22:43:56Z" - }, { "name": "Tomcat-CVE-2025-24813", "full_name": "B1gN0Se/Tomcat-CVE-2025-24813", @@ -197,6 +206,15 @@ "forks_count": 0, "created_at": "2025-03-31T19:01:28Z" }, + { + "name": "CVE-2025-24813-checker", + "full_name": "horsehacks/CVE-2025-24813-checker", + "html_url": "https://github.com/horsehacks/CVE-2025-24813-checker", + "description": "Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-07T22:43:56Z" + }, { "name": "lab-cve-2025-24813", "full_name": "ps-interactive/lab-cve-2025-24813", @@ -215,15 +233,6 @@ "forks_count": 1, "created_at": "2025-04-06T19:36:48Z" }, - { - "name": "CVE-2025-24813-Scanner", - "full_name": "Mattb709/CVE-2025-24813-Scanner", - "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", - "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-12T19:12:39Z" - }, { "name": "CVE-2025-24813-POC", "full_name": "f8l124/CVE-2025-24813-POC", @@ -233,15 +242,6 @@ "forks_count": 0, "created_at": "2025-04-09T15:20:32Z" }, - { - "name": "Spring-Boot-Tomcat-CVE-2025-24813", - "full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813", - "html_url": "https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813", - "description": "POC for CVE-2025-24813 using Spring-Boot", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-03-20T22:52:00Z" - }, { "name": "CVE-2025-24813-noPoC", "full_name": "Heimd411/CVE-2025-24813-noPoC", @@ -251,6 +251,15 @@ "forks_count": 0, "created_at": "2025-04-07T16:17:06Z" }, + { + "name": "Spring-Boot-Tomcat-CVE-2025-24813", + "full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813", + "html_url": "https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813", + "description": "POC for CVE-2025-24813 using Spring-Boot", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-20T22:52:00Z" + }, { "name": "Apache-Tomcat-Vulnerability-POC-CVE-2025-24813", "full_name": "michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813", @@ -259,14 +268,5 @@ "stargazers_count": 0, "forks_count": 0, "created_at": "2025-03-19T14:32:01Z" - }, - { - "name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-12T17:38:02Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-24813.json b/exploits/2025/CVE-2025-24813.json index ed635b9..8c7476f 100644 --- a/exploits/2025/CVE-2025-24813.json +++ b/exploits/2025/CVE-2025-24813.json @@ -4,7 +4,7 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 108, + "stargazers_count": 110, "forks_count": 30, "created_at": "2025-03-14T07:36:58Z" }, @@ -13,7 +13,7 @@ "full_name": "iSee857/CVE-2025-24813-PoC", "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", - "stargazers_count": 79, + "stargazers_count": 82, "forks_count": 25, "created_at": "2025-03-13T10:00:03Z" }, @@ -98,6 +98,15 @@ "forks_count": 0, "created_at": "2025-03-24T17:47:10Z" }, + { + "name": "CVE-2025-24813-vulhub", + "full_name": "Erosion2020/CVE-2025-24813-vulhub", + "html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub", + "description": "CVE-2025-24813的vulhub环境的POC脚本", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-04-18T11:03:33Z" + }, { "name": "CVE-2025-24813-Scanner", "full_name": "issamjr/CVE-2025-24813-Scanner", @@ -134,15 +143,6 @@ "forks_count": 0, "created_at": "2025-03-28T09:44:28Z" }, - { - "name": "CVE-2025-24813-vulhub", - "full_name": "Erosion2020/CVE-2025-24813-vulhub", - "html_url": "https://github.com/Erosion2020/CVE-2025-24813-vulhub", - "description": "CVE-2025-24813的vulhub环境的POC脚本", - "stargazers_count": 1, - "forks_count": 0, - "created_at": "2025-04-18T11:03:33Z" - }, { "name": "CVE-2025-24813-POC", "full_name": "Alaatk/CVE-2025-24813-POC", @@ -152,6 +152,15 @@ "forks_count": 0, "created_at": "2025-03-21T18:05:27Z" }, + { + "name": "CVE-2025-24813-Scanner", + "full_name": "Mattb709/CVE-2025-24813-Scanner", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", + "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-04-12T19:12:39Z" + }, { "name": "CVE-2025-24813-PoC", "full_name": "tonyarris/CVE-2025-24813-PoC", @@ -161,6 +170,15 @@ "forks_count": 0, "created_at": "2025-03-22T15:16:41Z" }, + { + "name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-04-12T17:38:02Z" + }, { "name": "CVE-2025-24813", "full_name": "manjula-aw/CVE-2025-24813", @@ -206,15 +224,6 @@ "forks_count": 1, "created_at": "2025-04-06T19:36:48Z" }, - { - "name": "CVE-2025-24813-Scanner", - "full_name": "Mattb709/CVE-2025-24813-Scanner", - "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", - "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-12T19:12:39Z" - }, { "name": "lab-cve-2025-24813", "full_name": "ps-interactive/lab-cve-2025-24813", @@ -259,14 +268,5 @@ "stargazers_count": 0, "forks_count": 0, "created_at": "2025-03-19T14:32:01Z" - }, - { - "name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-12T17:38:02Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2496.json b/exploits/2025/CVE-2025-2496.json new file mode 100644 index 0000000..e8dc10f --- /dev/null +++ b/exploits/2025/CVE-2025-2496.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2025-24963", + "full_name": "0xdeviner/CVE-2025-24963", + "html_url": "https://github.com/0xdeviner/CVE-2025-24963", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-23T08:01:49Z" + } +] \ No newline at end of file